Cryptanalysis of a new substitution-diffusion based image cipher

被引:137
|
作者
Rhouma, Rhouma [1 ]
Solak, Ercan [2 ]
Belghith, Safya [1 ]
机构
[1] Ecole Natl Ingenieurs Tunis, Syscom Lab, Tunis 1002, Tunisia
[2] Isik Univ, Izmir, Turkey
关键词
Chaos based cryptography; Diffusion; Substitution; Chosen plaintext attack; Known plaintext attack; 2-DIMENSIONAL CHAOTIC MAPS; HYPER-CHAOS; ALGORITHM;
D O I
10.1016/j.cnsns.2009.07.007
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
This paper introduces two different types of attacks on a recently proposed cryptosystem based on chaotic standard and logistic maps. In the two attacks, only a pair of (plaintext/ciphertext) was needed to totally break the cryptosystem. (c) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1887 / 1892
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis on classical cipher based on Indonesian language
    Marwati, R.
    Yulianti, K.
    4TH INTERNATIONAL SEMINAR OF MATHEMATICS, SCIENCE AND COMPUTER SCIENCE EDUCATION, 2018, 1013
  • [32] Algebraic Cryptanalysis of A NLFSR Based Stream Cipher
    Afzal, Mehreen
    Masood, Ashraf
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2603 - 2608
  • [33] A new approach of image encryption based on dynamic substitution and diffusion operations
    Essaid, M.
    Akharraz, I
    Saaidi, A.
    Mouhib, A.
    2019 4TH INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION BIG DATA, INTERNET OF THINGS & SECURITY (SYSCOBIOTS 2019), 2019, : 119 - 124
  • [34] A new diffusion and substitution based cryptosystem for securing medical image applications
    Mancy, L.
    Vigila, S. Maria Celestin
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (04) : 388 - 400
  • [35] A new quantum cryptanalysis method on block cipher Camellia
    Li, Yanjun
    Lin, Hao
    Liang, Meng
    Sun, Ying
    IET INFORMATION SECURITY, 2021, 15 (06) : 487 - 495
  • [36] A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers
    Jain, Ashish
    Chaudhari, Narendra S.
    NEURAL INFORMATION PROCESSING, PT II, 2015, 9490 : 206 - 215
  • [37] Cryptanalysis of an Image Cipher using Multi-entropy Measures and the Countermeasures
    Ratan, Ram
    Yadav, Arvind
    DEFENCE SCIENCE JOURNAL, 2020, 70 (04) : 425 - 439
  • [38] Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos
    Wen, Heping
    Lin, Yiting
    Yang, Lincheng
    Chen, Ruiting
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 250
  • [39] Algebraic Cryptanalysis of PRINCE Cipher Based on the Method of Syllogisms
    Lacko-Bartosova, Lucia
    INFORMATICS 2013: PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON INFORMATICS, 2013, : 56 - 60
  • [40] Biclique-based cryptanalysis of the block cipher SQUARE
    Mala, Hamid
    IET INFORMATION SECURITY, 2014, 8 (03) : 207 - 212