13 research outputs found
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic
signal and a clipped neural network (CNN) for encryption. The present paper
analyzes the security of this chaotic cipher against chosen-plaintext attacks,
and points out that this cipher can be broken by a chosen-plaintext attack.
Experimental analyses are given to support the feasibility of the proposed
attack.Comment: LNCS style, 7 pages, 1 figure (6 sub-figures
Using Echo State Networks for Cryptography
Echo state networks are simple recurrent neural networks that are easy to
implement and train. Despite their simplicity, they show a form of memory and
can predict or regenerate sequences of data. We make use of this property to
realize a novel neural cryptography scheme. The key idea is to assume that
Alice and Bob share a copy of an echo state network. If Alice trains her copy
to memorize a message, she can communicate the trained part of the network to
Bob who plugs it into his copy to regenerate the message. Considering a
byte-level representation of in- and output, the technique applies to arbitrary
types of data (texts, images, audio files, etc.) and practical experiments
reveal it to satisfy the fundamental cryptographic properties of diffusion and
confusion.Comment: 8 pages, ICANN 201
Cryptanalysis of an image encryption scheme based on the Hill cipher
This paper studies the security of an image encryption scheme based on the
Hill cipher and reports its following problems: 1) there is a simple necessary
and sufficient condition that makes a number of secret keys invalid; 2) it is
insensitive to the change of the secret key; 3) it is insensitive to the change
of the plain-image; 4) it can be broken with only one known/chosen-plaintext;
5) it has some other minor defects.Comment: 10 pages, three figure
Energy saving chaotic sequence based encryption, authentication and hashing for M2M communication of IoT device
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energy-efficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices
Energy saving chaotic sequence based encryption, authentication and hashing for M2M communication of IoT device
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energy-efficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices
Entropy in Image Analysis III
Image analysis can be applied to rich and assorted scenarios; therefore, the aim of this recent research field is not only to mimic the human vision system. Image analysis is the main methods that computers are using today, and there is body of knowledge that they will be able to manage in a totally unsupervised manner in future, thanks to their artificial intelligence. The articles published in the book clearly show such a future
Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices
Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT difusion: a robust data encryption approach
In recent years, numerous image encryption schemes have been developed that demonstrate
diferent levels of efectiveness in terms of robust security and real-time applications. While a few
of them outperform in terms of robust security, others perform well for real-time applications
where less processing time is required. Balancing these two aspects poses a challenge, aiming to
achieve efcient encryption without compromising security. To address this challenge, the proposed
research presents a robust data security approach for encrypting grayscale images, comprising fve
key phases. The frst and second phases of the proposed encryption framework are dedicated to
the generation of secret keys and the confusion stage, respectively. While the level-1, level-2, and
level-2 difusions are performed in phases 3, 4, and 5, respectively, The proposed approach begins
with secret key generation using chaotic maps for the initial pixel scrambling in the plaintext image,
followed by employing the Fibonacci Transformation (FT) for an additional layer of pixel shufing.
To enhance security, Tribonacci Transformation (TT) creates level-1 difusion in the permuted image.
Level-2 difusion is introduced to further strengthen the difusion within the plaintext image,
which is achieved by decomposing the difused image into eight-bit planes and implementing XOR
operations with corresponding bit planes that are extracted from the key image. After that, the
discrete wavelet transform (DWT) is employed to develop secondary keys. The DWT frequency subband (high-frequency sub-band) is substituted using the substitution box process. This creates further
difusion (level 3 difusion) to make it difcult for an attacker to recover the plaintext image from an
encrypted image. Several statistical tests, including mean square error analysis, histogram variance
analysis, entropy assessment, peak signal-to-noise ratio evaluation, correlation analysis, key space
evaluation, and key sensitivity analysis, demonstrate the efectiveness of the proposed work. The
proposed encryption framework achieves signifcant statistical values, with entropy, correlation,
energy, and histogram variance values standing at 7.999, 0.0001, 0.0156, and 6458, respectively.
These results contribute to its robustness against cyberattacks. Moreover, the processing time of
the proposed encryption framework is less than one second, which makes it more suitable for realworld applications. A detailed comparative analysis with the existing methods based on chaos,
DWT, Tribonacci transformation (TT), and Fibonacci transformation (FT) reveals that the proposed
encryption scheme outperforms the existing ones