CRYPTANALYSIS OF FRIDRICH'S CHAOTIC IMAGE ENCRYPTION
نویسندگان
چکیده
منابع مشابه
Cryptanalysis of Fridrich's Chaotic Image Encryption
We cryptanalyze Fridrich’s chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret permutation that is used to shuffle the pixels of a round input. We demonstrate the effectiveness of our attack with examples and simulation results. We also show that our proposed...
متن کاملCryptanalysis of a Chaotic Image Encryption Method
The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In ISCAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one plainimage, and its security to brute-force ciphertext-only attack is overestimated by the author...
متن کاملOn the cryptanalysis of Fridrich's chaotic image encryption scheme
Utilizing complex dynamics of chaotic maps and systems in encryption was studied comprehensively in the past two and a half decades. In 1989, Fridrich’s chaotic image encryption scheme was designed by iterating chaotic position permutation and value substitution some rounds, which received intensive attention in the field of chaos-based cryptography. In 2010, Solak et al. proposed a chosen-ciph...
متن کاملImproved Cryptanalysis of CMC Chaotic Image Encryption Scheme
Recently, chaos has attracted much attention in the field of cryptography. To study the security with a known image of a symmetric image encryption scheme, the attack algorithm of equivalent key is given. We give the known image attacks under different other conditions to obtain the equivalent key. The concrete step and complexity of the attack algorithm is given. So the symmetric image encrypt...
متن کاملCryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map
With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Bifurcation and Chaos
سال: 2010
ISSN: 0218-1274,1793-6551
DOI: 10.1142/s0218127410026563