Comments on an image encryption scheme based on a chaotic Tent map
نویسنده
چکیده
Recently an image encryption scheme based on a chaotic Tent map has been proposed by Li et al. [1]. This comment shows that this scheme is broken and no secure application can be found for it. The recent paper by Li et al. [1] proposed a chaotic image encryption based on a Tent map and evaluated its security through statistical analyses. It is true that when an image encryption scheme is designed, the security is generally evaluated through statistical analyses [2, 3], and a cryptanalysis procedure is not commonly employed to assess image encryption schemes. However, before being applied to practical applications, where security is one of the important requirements, encryption schemes should be thoroughly analyzed using wellknown cryptanalysis procedures. In this paper, it is shown that the image encryption scheme in [1] is easily broken. In a nutshell, as described in Section 3 of [1], the encryption algorithm is c(i) = p(i)⊕x(i), for i = 1, 2, . . . , N , where c(i), p(i), and x(i) represent the i-th element of ciphertext, plaintext and expanded keystream, respectively; and N is the number of plaintext elements. The expanded keystream is a sequence of pseudorandom numbers generated by a Tent map given by following equations: xi = μxi−1, if xi−1 < 0.5, (1) xi = μ(1− xi−1), if xi−1 ≥ 0.5, (2) where μ is a control parameter and x0 is an initial seed. (μ, x0) is considered as secret key. Firstly, given a plaintext with all-zero elements, the encryption algorithm discloses the the expanded key stream, that is, a sequence generated by a chaotic Tent map. As long as the key is not changed, the retrieved expanded keystream decrypts all ciphertexts correctly. Secondly, the confidentiality of the key relies on the security of a chaotic tent map which has already been analyzed by G. Alvarez et al. [5]. In Sections
منابع مشابه
Image encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملCryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map
With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...
متن کاملAn Image Encryption Technique based on Chaotic S-Box and Arnold Transform
In recent years, chaos has been extensively used in cryptographic systems. In this regard, one dimensional chaotic maps gained increased attention because of their intrinsic simplicity and ease in application. Many image encryption algorithms that are based on chaotic substitution boxes (S-boxes) have been studied in the last few years but some of them appear to be vulnerable to robustness. We,...
متن کاملA Chaos-based Image Encryption Scheme Using Multimodal Skew Tent Maps
Chaotic multimodal skew tent maps are constructed to design an efficient chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, in which permuting the positions of image pixels incorporates with changing the grey values of image pixels to confuse the relationship between cipher-image and plain-image. In the permutation process, a multimodal skew tent map is utili...
متن کاملA Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme
In this paper, we present a novel approach to create the new chaotic map and propose an improved image encryption scheme based on it. Compared with traditional classic one-dimensional chaotic maps like Logistic Map and Tent Map, this newly created chaotic map demonstrates many better chaotic properties for encryption, implied by a much larger maximal Lyapunov exponent. Furthermore, the new chao...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1611.00381 شماره
صفحات -
تاریخ انتشار 2016