9 research outputs found

    Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

    Get PDF
    This paper performs a thorough security analysis of a chaotic image encryption algorithm based on autoblocking and electrocardiography from the view point of modern cryptography. The algorithm uses electrocardiography (ECG) signals to generate the initial key for a chaotic system and applies an autoblocking method to divide a plain image into blocks of certain sizes suitable for subsequent encryption. The designers claimed that the proposed algorithm is “strong and flexible enough for practical applications”. We find it is vulnerable to the known plaintext attack: based on one pair of a known plain-image and its corresponding cipher-image, an adversary is able to derive a mask image, which can be used as an equivalent secret key to successfully decrypt other cipher images encrypted under the same key with a non-negligible probability of 1/256. Using this as a typical counterexample, we summarize some security defects existing in many image encryption algorithms

    Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy

    Get PDF
    Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g. the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data.Comment: 9 pages, 6 figures, IEEE Access, 201

    Cryptanalysis of an Image Cipher using Multi entropy Measures and the Countermeasures

    Get PDF
    The use of same keys or equivalent keys should not be occurred in cryptographic communications because a cipher system utilising such keys to secure messages can be attacked even it possesses excellent cryptographic characteristics for extracting intelligible information from encrypted messages. Identification of crypts formed with such keys is an important task of traffic analysis of cryptographic communications to check the applicability of two-messages-on-same-key (TMSK) attack. To avoid its applicability, adequate safeguards are required. In the paper, we cryptanalyze stream encryption based cipher system and propose an intelligent identification methodology using multi-entropy measures and soft decision criteria for identification of encrypted images of same or equivalent keys. Experimental test results show that the crypts formed with same keys can be identified successfully with high precision. We also present the countermeasures against TMSK attack

    Design and smartphone implementation of chaotic duplex H.264-codec video communications

    Get PDF
    In this paper, a chaotic duplex H.264-codec-based secure video communication scheme is designed and its smartphone implementation is also carried out. First, an improved self- synchronous chaotic stream cipher algorithm equipped with a sinusoidal modulation, a multipli- cation, a modulo operation and a round down operation (SCSCA-SMMR) is developed. Using the sinusoidal modulation and multiplication, the improved algorithm can resist the divide-and- conquer attack by traversing multiple nonzero component initial conditions (DCA-TMNCIC). Meanwhile, also by means of the round down operation and modulo operation, on the premise that the DCA-TMNCIC does not work, the original keys cannot be further deciphered only by the known-plaintext attack, the chosen-plaintext attack and the chosen-ciphertext attack, respectively. Then, the Android low-level multimedia support infrastructure MediaCodec class is used to access low-level media encoder/decoder components and the H.264 hardware encod- ing/decoding is performed on real-time videos, so the chaotic video encryption and decryption can be realized in real-time by smartphones. Security analysis and smartphone experimental results verify the effectiveness of the proposed method

    Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes

    Get PDF
    In this paper, a cryptanalysis method that combines a chosen-ciphertext attack with a divide-and-conquer attack by traversing multiple non-zero component initial conditions (DCA- TMNCIC) is proposed. The method is used for security analysis of n-D (n=3,4,5,6,7,8) self- synchronous chaotic stream ciphers that employ a product of two chaotic variables and three chaotic variables (n-D SCSC-2 and n-D SCSC-3), taking 3-D SCSC-2 as a typical example for cryptanalysis. For resisting the combinational effect of the chosen-ciphertext attack and DCA- TMNCIC, several improved chaotic cipher schemes are designed, including 3-D SCSC based on a nonlinear nominal system (3-D SCSC-NNS) and n-D SCSC based on sinusoidal modulation (n-D SCSC-SM (n=3,4,5,6,7,8)). Theoretical security analysis validates the improved schemes

    Network analysis of chaotic dynamics in fixed-precision digital domain

    Full text link
    When implemented in the digital domain with time, space and value discretized in the binary form, many good dynamical properties of chaotic systems in continuous domain may be degraded or even diminish. To measure the dynamic complexity of a digital chaotic system, the dynamics can be transformed to the form of a state-mapping network. Then, the parameters of the network are verified by some typical dynamical metrics of the original chaotic system in infinite precision, such as Lyapunov exponent and entropy. This article reviews some representative works on the network-based analysis of digital chaotic dynamics and presents a general framework for such analysis, unveiling some intrinsic relationships between digital chaos and complex networks. As an example for discussion, the dynamics of a state-mapping network of the Logistic map in a fixed-precision computer is analyzed and discussed.Comment: 5 pages, 9 figure

    Cryptanalyzing An Image Encryption Algorithm Based on Autoblocking and Electrocardiography

    No full text
    corecore