• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于二维无限坍缩映射的图像加密算法安全性分析

Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map.

作者信息

Shi Guanwen, Yu Simin, Wang Qianxue

机构信息

College of Automation, Guangdong University of Technology, Guangzhou 510006, China.

出版信息

Entropy (Basel). 2022 Jul 25;24(8):1023. doi: 10.3390/e24081023.

DOI:10.3390/e24081023
PMID:35893003
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9394294/
Abstract

This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation-diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation-diffusion structure, which comes after the original permutation, so these two permutations can be merged into one. Then, some theorems about round-down operation are summarized, and the encryption and decryption equations in the diffusion process are deduced and simplified accordingly. Since the chaotic sequences used in encryption algorithm are independent of the plaintext and ciphertext, there are equivalent keys. The original encryption algorithm with single-round, two-round, and multi-round of permutation-diffusion processes is cracked, and the data complexity of the cryptanalysis attacks is analyzed. Numerical simulation is carried out by MATLAB, and the experimental results and theoretical analysis show the effectiveness of the cryptanalysis attacks. Finally, some suggestions for improvement are given to overcome the shortcomings of the original encryption algorithm.

摘要

本文分析了基于二维(2D)无限坍缩映射的图像加密算法的安全性。该加密算法采用置换-扩散结构,可进行两轮或更多轮以实现更高的安全级别。通过密码分析发现,原扩散过程可分解为置换-扩散结构,该结构在原置换之后,因此这两个置换可合并为一个。然后,总结了一些关于向下取整运算的定理,并据此推导和简化了扩散过程中的加密和解密方程。由于加密算法中使用的混沌序列与明文和密文无关,存在等效密钥。破解了具有单轮、两轮和多轮置换-扩散过程的原加密算法,并分析了密码分析攻击的数据复杂度。利用MATLAB进行了数值模拟,实验结果和理论分析表明了密码分析攻击的有效性。最后,针对原加密算法的不足提出了一些改进建议。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/7c8e2776065d/entropy-24-01023-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/2c7efc8a01ff/entropy-24-01023-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/cdde658ec431/entropy-24-01023-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/367b3eede340/entropy-24-01023-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/c4eaae7cfc1d/entropy-24-01023-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/07113d48a907/entropy-24-01023-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/e7f49da805c5/entropy-24-01023-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/5e90acab52ee/entropy-24-01023-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/ae5175356a07/entropy-24-01023-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/71cf3cd19e25/entropy-24-01023-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/fcb02d42246e/entropy-24-01023-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/0bdc4a04f849/entropy-24-01023-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/7c8e2776065d/entropy-24-01023-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/2c7efc8a01ff/entropy-24-01023-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/cdde658ec431/entropy-24-01023-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/367b3eede340/entropy-24-01023-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/c4eaae7cfc1d/entropy-24-01023-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/07113d48a907/entropy-24-01023-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/e7f49da805c5/entropy-24-01023-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/5e90acab52ee/entropy-24-01023-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/ae5175356a07/entropy-24-01023-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/71cf3cd19e25/entropy-24-01023-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/fcb02d42246e/entropy-24-01023-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/0bdc4a04f849/entropy-24-01023-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2cac/9394294/7c8e2776065d/entropy-24-01023-g012.jpg

相似文献

1
Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map.基于二维无限坍缩映射的图像加密算法安全性分析
Entropy (Basel). 2022 Jul 25;24(8):1023. doi: 10.3390/e24081023.
2
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map.基于二维超混沌映射的图像加密算法的密码分析
Entropy (Basel). 2023 Feb 21;25(3):395. doi: 10.3390/e25030395.
3
Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos.基于位平面提取和多重混沌的图像加密密码系统的安全性分析与改进
Entropy (Basel). 2021 Apr 22;23(5):505. doi: 10.3390/e23050505.
4
A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.一种基于简单混沌映射的图像加密系统,该系统同时使用与明文相关的置换和扩散。
Entropy (Basel). 2018 Jul 18;20(7):535. doi: 10.3390/e20070535.
5
Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map.基于二维超混沌映射的图像加密算法的密码分析
Entropy (Basel). 2022 Oct 28;24(11):1551. doi: 10.3390/e24111551.
6
Cryptanalysis and Improvement of a Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.基于明文相关置换和扩散的混沌映射图像加密系统的密码分析与改进
Entropy (Basel). 2020 May 24;22(5):589. doi: 10.3390/e22050589.
7
Cryptanalysis of a New Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps.基于多重离散动力映射的新型混沌图像加密技术的密码分析
Entropy (Basel). 2021 Nov 26;23(12):1581. doi: 10.3390/e23121581.
8
Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding.基于双层动态反馈加密和 DWT 信息隐藏的安全图像通信。
PLoS One. 2024 Aug 27;19(8):e0300228. doi: 10.1371/journal.pone.0300228. eCollection 2024.
9
Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps.基于一维混沌映射组合的图像加密方案的改进密码分析与增强
Entropy (Basel). 2018 Nov 3;20(11):843. doi: 10.3390/e20110843.
10
Differential cryptanalysis of a medical image cryptosystem with multiple rounds.具有多轮的医学图像密码系统的差分密码分析
Comput Biol Med. 2015 Oct 1;65:69-75. doi: 10.1016/j.compbiomed.2015.07.024. Epub 2015 Aug 8.

引用本文的文献

1
FOPBIE: Multi-image cipher based on the random walk of fleet of pawns on the large hypothetical chessboard and chaotic system.基于大虚拟棋盘上棋子群随机游走和混沌系统的多图像密码
PLoS One. 2024 Jun 13;19(6):e0295060. doi: 10.1371/journal.pone.0295060. eCollection 2024.
2
A Novel Hyperchaotic 2D-SFCF with Simple Structure and Its Application in Image Encryption.一种结构简单的新型超混沌二维自反馈混沌函数及其在图像加密中的应用
Entropy (Basel). 2022 Sep 9;24(9):1266. doi: 10.3390/e24091266.

本文引用的文献

1
Research on Color Image Encryption Algorithm Based on Bit-Plane and Chen Chaotic System.基于位平面和陈氏混沌系统的彩色图像加密算法研究
Entropy (Basel). 2022 Jan 26;24(2):186. doi: 10.3390/e24020186.
2
An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values.一种使用具有与明文相关参数值的逻辑斯谛映射的图像加密算法。
Entropy (Basel). 2021 Oct 20;23(11):1373. doi: 10.3390/e23111373.
3
Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion.基于多位排列与扩散的超混沌图像加密
Entropy (Basel). 2021 Apr 23;23(5):510. doi: 10.3390/e23050510.
4
A New Algorithm for Digital Image Encryption Based on Chaos Theory.一种基于混沌理论的数字图像加密新算法。
Entropy (Basel). 2021 Mar 13;23(3):341. doi: 10.3390/e23030341.
5
Differential cryptanalysis of a medical image cryptosystem with multiple rounds.具有多轮的医学图像密码系统的差分密码分析
Comput Biol Med. 2015 Oct 1;65:69-75. doi: 10.1016/j.compbiomed.2015.07.024. Epub 2015 Aug 8.
6
An efficient and secure medical image protection scheme based on chaotic maps.基于混沌映射的高效安全医学图像保护方案。
Comput Biol Med. 2013 Sep;43(8):1000-10. doi: 10.1016/j.compbiomed.2013.05.005. Epub 2013 May 15.