Suppr超能文献

基于二维超混沌映射的图像加密算法的密码分析

Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map.

作者信息

Zhang Chengrui, Chen Junxin, Chen Dongming

机构信息

Software College, Northeastern University, Shenyang 110169, China.

School of Software, Dalian University of Technology, Dalian 116621, China.

出版信息

Entropy (Basel). 2022 Oct 28;24(11):1551. doi: 10.3390/e24111551.

Abstract

Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation-diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (CPA) and the chosen-ciphertext attack (CCA). According to our analysis, we found the two complex diffusion processes could be simplified into two simple diffusions and a modular addition operation. Based on this, the equivalent key can be obtained with CPA and CCA. Detailed theoretical derivations and the results of experiments confirmed the feasibility of our attack methods. When the image size was 256×256, the running time of the attacks was less than 2 hours on a laptop with a 2.59 GHz Intel Core i7 and 16 GB DDR3 memory. Other sizes of images were also tested, and some rules were found. In addition, the probability of other attacks has also been discussed, and some suggestions for improvements are given. The source codes are publicly available and can be found online.

摘要

最近,提出了一种基于二维超混沌映射的图像加密方案。它采用置换-扩散架构,由置换、前向扩散和后向扩散三个步骤组成。在本文中,我们使用选择明文攻击(CPA)和选择密文攻击(CCA)破解了该密码。根据我们的分析,我们发现两个复杂的扩散过程可以简化为两个简单的扩散和一个模加运算。基于此,可以通过CPA和CCA获得等效密钥。详细的理论推导和实验结果证实了我们攻击方法的可行性。当图像大小为256×256时,在配备2.59 GHz英特尔酷睿i7和16 GB DDR3内存的笔记本电脑上,攻击的运行时间不到2小时。还测试了其他尺寸的图像,并发现了一些规律。此外,还讨论了其他攻击的概率,并给出了一些改进建议。源代码是公开可用的,可以在网上找到。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/adbfead5b3da/entropy-24-01551-g0A1.jpg

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验