Security analysis of an audio data encryption scheme based on key chaining and DNA encoding

by   Imad El Hanouti, et al.

Fairly recently, a new encryption scheme for audio data encryption has been proposed by Naskar, P.K., et al. The cryptosystem is based on substitution-permutation encryption structure using DNA encoding at the substitution stage, in which the key generation is based on a key chaining algorithm that generates new key block for every plain block using a logistic chaotic map. After some several statistical tests done by the authors of the scheme, they claimed that their cryptosystem is robust and can resist conventional cryptanalysis attacks. Negatively, in this paper we show the opposite: the scheme is extremely weak against chosen ciphertext and plaintext attacks thus only two chosen plaintexts of 32 byte size are sufficient to recover the equivalent key used for encryption. The cryptosystem's shuffling process design is vulnerable which allow us recovering the unknown original plaintext by applying repeated encryptions. Our study proves that the scheme is extremely weak and should not be used for any information security or cryptographic concern. Lessons learned from this cryptanalytic paper are then outlined in order to be considered in further designs and proposals.



There are no comments yet.


page 15


Breaking an image encryption scheme based on Arnold map and Lucas series

Fairly recently, a novel image encryption based on Arnold scrambling and...

Image Encryption Decryption Using Chaotic Logistic Mapping and DNA Encoding

In this paper we have proposed a method that uses chaotic logistic mappi...

An Evaluation and Enhancement of Seredynski-Bouvry CA-based Encryption Scheme

In this paper, we study a block cipher based on cellular automata, propo...

Insufficient properties of image encryption algorithms

We analyze the security of recently proposed image encryption scheme [1]...

Cryptanalysis of a Chaos-Based Fast Image Encryption Algorithm for Embedded Systems

Fairly recently, a new encryption scheme for embedded systems based on c...

An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN

A secure and reliable image encryption scheme is presented in this study...

A Lattice Based Joint Encryption, Encoding and Modulation Scheme

A new nonlinear Rao-Nam like symmetric key encryption scheme is presente...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.