71 research outputs found
Deciphering a novel image cipher based on mixed transformed Logistic maps
Since John von Neumann suggested utilizing Logistic map as a random number
generator in 1947, a great number of encryption schemes based on Logistic map
and/or its variants have been proposed. This paper re-evaluates the security of
an image cipher based on transformed logistic maps and proves that the image
cipher can be deciphered efficiently under two different conditions: 1) two
pairs of known plain-images and the corresponding cipher-images with
computational complexity of ; 2) two pairs of chosen plain-images
and the corresponding cipher-images with computational complexity of ,
where is the number of pixels in the plain-image. In contrast, the required
condition in the previous deciphering method is eighty-seven pairs of chosen
plain-images and the corresponding cipher-images with computational complexity
of . In addition, three other security flaws existing in most
Logistic-map-based ciphers are also reported.Comment: 10 pages, 2 figure
Cryptanalysis of a computer cryptography scheme based on a filter bank
This paper analyzes the security of a recently-proposed signal encryption
scheme based on a filter bank. A very critical weakness of this new signal
encryption procedure is exploited in order to successfully recover the
associated secret key.Comment: 6 pages, 1 figur
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
Recently, a chaotic image encryption algorithm based on information entropy
(IEAIE) was proposed. This paper scrutinizes the security properties of the
algorithm and evaluates the validity of the used quantifiable security metrics.
When the round number is only one, the equivalent secret key of every basic
operation of IEAIE can be recovered with a differential attack separately. Some
common insecurity problems in the field of chaotic image encryption are found
in IEAIE, e.g. the short orbits of the digital chaotic system and the invalid
sensitivity mechanism built on information entropy of the plain image. Even
worse, each security metric is questionable, which undermines the security
credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for
illustrating common pitfalls in designing secure communication method for image
data.Comment: 9 pages, 6 figures, IEEE Access, 201
- …