Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes
نویسندگان
چکیده
In recent decades, there has been considerable popularity in employing nonlinear dynamics and permutation-substitution structures for image encryption. Three procedures generally exist such encryption schemes: the key schedule module producing elements, permutation scrambling substitution pixel modification. This paper cryptanalyzes a family of schemes that adopt pixel-level modular addition-based substitution. The security analysis first reveals common defect studied schemes. Specifically, mapping from differentials ciphertexts to those plaintexts is found be linear independent schedules, techniques rounds. On this theory basis, universal chosen-ciphertext attack further proposed. Experimental results demonstrate proposed can recover without or any elements. Related cryptographic discussions are also given.
منابع مشابه
A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack
We introduce a new methodology for achieving security against adaptive chosen-ciphertext attack (CCA) for public-key encryption schemes, which we call the oblivious decryptors model. The oblivious decryptors model generalizes both the two-key model of Naor and Yung, as well the Cramer–Shoup encryption schemes. The key ingredient in our new paradigm is Sahai’s notion of Simulation-Sound NIZK pro...
متن کاملNew Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack
The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack (CCA) try to make it infeasible for an attacker to forge “valid” ciphertexts. This is achieved by either encoding the plaintext with some redundancy before encrypting or by appending a MAC to the ciphertext. We suggest schemes which are provably secure against CCA, and yet every...
متن کاملA Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols
Several security protocols (PGP, PEM, MOSS, S/MIME, PKCS#7, CMS, etc.) have been developed to provide confidentiality and authentication of electronic mail. These protocols are widely used and trusted for private communication over the Internet. We point out a potentially serious security hole in these protocols: any encrypted message can be decrypted using a one-message, adaptive chosen-cipher...
متن کاملDesign and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite practical, and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions. These appear to be the first publickey encryption schemes in the literature that are simultaneously practical and provably secure. This paper is a sig...
متن کاملHomomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authenticity, and investigate relations between them. In particular, we show that it is possible to give a natural definition of IND-CCA for homomorphic authenticated encryption, unlike the case of homomorp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Multimedia
سال: 2021
ISSN: ['1520-9210', '1941-0077']
DOI: https://doi.org/10.1109/tmm.2020.3011315