Cryptanalyzing two image encryption algorithms based on a first-order time-delay system

09/24/2021
by   Sheng Liu, et al.
0

Security is a key problem for the transmission, interchange and storage process of multimedia systems and applications. In 2018, M. Li et al. proposed in-depth security analysis on an image encryption algorithm based on a first-order time-delay system (IEATD) and gave a specific chosen-plaintext attack on it. Moreover, an enhanced version called as IEACD was designed to fix the reported security defects. This paper analyzes the essential structures of the two algorithms and evaluates their real security performances: 1) no efficient nonlinear operations are adopted to assure the sensibility of keystream; 2) the equivalent secret key of IEATD can be efficiently recovered from one known plain-image and the corresponding cipher-image; 3) IEACD can still be efficiently cracked with a chosen-plaintext attack. Both rigorous theoretical analyses and detailed experimental results are provided to demonstrate effectiveness of the advanced cryptanalytic methods.

READ FULL TEXT

page 5

page 8

research
12/30/2019

Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps

Recently, an image block encryption algorithm was proposed based on some...
research
12/23/2004

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher

In ISNN'04, a novel symmetric cipher was proposed, by combining a chaoti...
research
11/06/2017

Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

This paper analyzes the security of an image encryption algorithm propos...
research
10/19/2019

Cryptanalysis of a Chaos-Based Fast Image Encryption Algorithm for Embedded Systems

Fairly recently, a new encryption scheme for embedded systems based on c...
research
10/11/2018

Combined Image Encryption and Steganography Algorithm in the Spatial Domain

In recent years, steganography has emerged as one of the main research a...
research
03/28/2019

Universal chosen-ciphertext attack for a family of image encryption schemes

During the past decades, there is a great popularity employing nonlinear...
research
08/11/2023

Security of XCB and HCTR

Tweakable Enciphering Scheme (TES) is a length preserving scheme which p...

Please sign up or login with your details

Forgot password? Click here to reset