Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

by   Chengqing Li, et al.

This paper analyzes the security of an image encryption algorithm proposed by Ye and Huang [IEEE MultiMedia, vol. 23, pp. 64-71, 2016]. The Ye-Huang algorithm uses electrocardiography (ECG) signals to generate the initial key for a chaotic system and applies an autoblocking method to divide a plain image into blocks of certain sizes suitable for subsequent encryption. The designers claim that the proposed algorithm is "strong and flexible enough for practical applications". In this paper, we perform a thorough analysis of their algorithm from the view point of modern cryptography. We find it is vulnerable to the known plaintext attack: based on one pair of a known plain-image and its corresponding cipher-image, an adversary is able to derive a mask image, which can be used as an equivalent secret key to successfully decrypt other cipher-images encrypted under the same key with a non-negligible probability of 1/256. Using this as a typical counterexample, we summarize security defects in the design of the Ye-Huang algorithm. The lessons are generally applicable to many other image encryption schemes.


Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps

Recently, an image block encryption algorithm was proposed based on some...

Cryptanalyzing two image encryption algorithms based on a first-order time-delay system

Security is a key problem for the transmission, interchange and storage ...

A Novel Image Encryption Scheme Based on Different Block Sizes for Grayscale and Color Images

In this paper, two image encryption schemes are proposed for grayscale a...

Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks

The security of learnable image encryption schemes for image classificat...

A new chaotic image encryption algorithm based on transversals in a Latin square

There are some good combinatorial structures suitable for image encrypti...

A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

The study of sending and receiving secret messages is called cryptograph...

When an attacker meets a cipher-image in 2018: A Year in Review

This paper aims to review the encountered technical contradictions when ...

Please sign up or login with your details

Forgot password? Click here to reset