248 research outputs found
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Recently, an image scrambling encryption algorithm of pixel bit based on
chaos map was proposed. Considering the algorithm as a typical binary image
scrambling/permutation algorithm exerting on plaintext of size ,
this paper proposes a novel optimal method to break it with some
known/chosen-plaintexts. The spatial complexity and computational complexity of
the attack are only and respectively,
where is the number of known/chosen-plaintexts used. The method can be
easily extended to break any permutation-only encryption scheme exerting on
plaintext of size and with different levels of values. The
corresponding spatial complexity and computational complexity are only
and respectively. In addition, some
specific remarks on the performance of the image scrambling encryption
algorithm are presented.Comment: 11 pages, 6 figure
Network analysis of chaotic dynamics in fixed-precision digital domain
When implemented in the digital domain with time, space and value discretized
in the binary form, many good dynamical properties of chaotic systems in
continuous domain may be degraded or even diminish. To measure the dynamic
complexity of a digital chaotic system, the dynamics can be transformed to the
form of a state-mapping network. Then, the parameters of the network are
verified by some typical dynamical metrics of the original chaotic system in
infinite precision, such as Lyapunov exponent and entropy. This article reviews
some representative works on the network-based analysis of digital chaotic
dynamics and presents a general framework for such analysis, unveiling some
intrinsic relationships between digital chaos and complex networks. As an
example for discussion, the dynamics of a state-mapping network of the Logistic
map in a fixed-precision computer is analyzed and discussed.Comment: 5 pages, 9 figure
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for
multimedia transmission named "Multimedia Cryptography System" (MCS). No
cryptanalytic results have been reported so far. This paper presents a
differential attack to break MCS, which requires only seven chosen plaintexts.
The complexity of the attack is O(N), where is the size of plaintext.
Experimental results are also given to show the real performance of the
proposed attack.Comment: 22 pages, 5 figure
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
Recently Lin et al. proposed a method of using the underdetermined BSS (blind
source separation) problem to realize image and speech encryption. In this
paper, we give a cryptanalysis of this BSS-based encryption and point out that
it is not secure against known/chosen-plaintext attack and chosen-ciphertext
attack. In addition, there exist some other security defects: low sensitivity
to part of the key and the plaintext, a ciphertext-only differential attack,
divide-and-conquer (DAC) attack on part of the key. We also discuss the role of
BSS in Lin et al.'s efforts towards cryptographically secure ciphers.Comment: 8 pages, 10 figures, IEEE forma
- …