• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于二维超混沌映射的图像加密算法的密码分析

Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map.

作者信息

Zhang Chengrui, Chen Junxin, Chen Dongming

机构信息

Software College, Northeastern University, Shenyang 110169, China.

School of Software, Dalian University of Technology, Dalian 116621, China.

出版信息

Entropy (Basel). 2022 Oct 28;24(11):1551. doi: 10.3390/e24111551.

DOI:10.3390/e24111551
PMID:36359641
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9689893/
Abstract

Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation-diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (CPA) and the chosen-ciphertext attack (CCA). According to our analysis, we found the two complex diffusion processes could be simplified into two simple diffusions and a modular addition operation. Based on this, the equivalent key can be obtained with CPA and CCA. Detailed theoretical derivations and the results of experiments confirmed the feasibility of our attack methods. When the image size was 256×256, the running time of the attacks was less than 2 hours on a laptop with a 2.59 GHz Intel Core i7 and 16 GB DDR3 memory. Other sizes of images were also tested, and some rules were found. In addition, the probability of other attacks has also been discussed, and some suggestions for improvements are given. The source codes are publicly available and can be found online.

摘要

最近,提出了一种基于二维超混沌映射的图像加密方案。它采用置换-扩散架构,由置换、前向扩散和后向扩散三个步骤组成。在本文中,我们使用选择明文攻击(CPA)和选择密文攻击(CCA)破解了该密码。根据我们的分析,我们发现两个复杂的扩散过程可以简化为两个简单的扩散和一个模加运算。基于此,可以通过CPA和CCA获得等效密钥。详细的理论推导和实验结果证实了我们攻击方法的可行性。当图像大小为256×256时,在配备2.59 GHz英特尔酷睿i7和16 GB DDR3内存的笔记本电脑上,攻击的运行时间不到2小时。还测试了其他尺寸的图像,并发现了一些规律。此外,还讨论了其他攻击的概率,并给出了一些改进建议。源代码是公开可用的,可以在网上找到。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/042e3913c457/entropy-24-01551-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/adbfead5b3da/entropy-24-01551-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/593044b52278/entropy-24-01551-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/0a8c3e925760/entropy-24-01551-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/6546c441c50a/entropy-24-01551-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/ed4b9f87ebc0/entropy-24-01551-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/6b3a6bec24fc/entropy-24-01551-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/adea66725fb8/entropy-24-01551-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/5518bd464a10/entropy-24-01551-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/2e6a61fb4cb2/entropy-24-01551-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/f2dad56b0e5b/entropy-24-01551-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/042e3913c457/entropy-24-01551-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/adbfead5b3da/entropy-24-01551-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/593044b52278/entropy-24-01551-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/0a8c3e925760/entropy-24-01551-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/6546c441c50a/entropy-24-01551-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/ed4b9f87ebc0/entropy-24-01551-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/6b3a6bec24fc/entropy-24-01551-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/adea66725fb8/entropy-24-01551-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/5518bd464a10/entropy-24-01551-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/2e6a61fb4cb2/entropy-24-01551-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/f2dad56b0e5b/entropy-24-01551-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5349/9689893/042e3913c457/entropy-24-01551-g008.jpg

相似文献

1
Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map.基于二维超混沌映射的图像加密算法的密码分析
Entropy (Basel). 2022 Oct 28;24(11):1551. doi: 10.3390/e24111551.
2
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map.基于二维超混沌映射的图像加密算法的密码分析
Entropy (Basel). 2023 Feb 21;25(3):395. doi: 10.3390/e25030395.
3
Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map.基于二维无限坍缩映射的图像加密算法安全性分析
Entropy (Basel). 2022 Jul 25;24(8):1023. doi: 10.3390/e24081023.
4
Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos.基于位平面提取和多重混沌的图像加密密码系统的安全性分析与改进
Entropy (Basel). 2021 Apr 22;23(5):505. doi: 10.3390/e23050505.
5
Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding.基于超混沌和动态DNA编码的安全图像加密算法
Entropy (Basel). 2020 Jul 15;22(7):772. doi: 10.3390/e22070772.
6
Cryptanalysis of a New Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps.基于多重离散动力映射的新型混沌图像加密技术的密码分析
Entropy (Basel). 2021 Nov 26;23(12):1581. doi: 10.3390/e23121581.
7
Cryptanalysis and Improvement of a Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.基于明文相关置换和扩散的混沌映射图像加密系统的密码分析与改进
Entropy (Basel). 2020 May 24;22(5):589. doi: 10.3390/e22050589.
8
Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos.基于DNA编码和时空混沌的图像加密算法破解
Entropy (Basel). 2019 Mar 5;21(3):246. doi: 10.3390/e21030246.
9
A Symmetric Plaintext-Related Color Image Encryption System Based on Bit Permutation.一种基于位排列的对称明文相关彩色图像加密系统。
Entropy (Basel). 2018 Apr 13;20(4):282. doi: 10.3390/e20040282.
10
A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.一种基于简单混沌映射的图像加密系统,该系统同时使用与明文相关的置换和扩散。
Entropy (Basel). 2018 Jul 18;20(7):535. doi: 10.3390/e20070535.

引用本文的文献

1
A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application.一种鲁棒的忆阻器增强多项式超混沌映射及其多通道图像加密应用
Micromachines (Basel). 2023 Nov 12;14(11):2090. doi: 10.3390/mi14112090.
2
Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption.利用动态向量级操作和二维增强逻辑模块化映射实现高效混沌图像加密。
Entropy (Basel). 2023 Jul 31;25(8):1147. doi: 10.3390/e25081147.
3
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map.

本文引用的文献

1
A deeper look into cybersecurity issues in the wake of Covid-19: A survey.新冠疫情后对网络安全问题的深入研究:一项调查。
J King Saud Univ Comput Inf Sci. 2022 Nov;34(10):8176-8206. doi: 10.1016/j.jksuci.2022.08.003. Epub 2022 Aug 11.
2
Cross-Modality LGE-CMR Segmentation Using Image-to-Image Translation Based Data Augmentation.基于图像到图像翻译的数据增强的跨模态LGE-CMR分割
IEEE/ACM Trans Comput Biol Bioinform. 2023 Jul-Aug;20(4):2367-2375. doi: 10.1109/TCBB.2022.3140306. Epub 2023 Aug 9.
3
From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice.
基于二维超混沌映射的图像加密算法的密码分析
Entropy (Basel). 2023 Feb 21;25(3):395. doi: 10.3390/e25030395.
从混沌到伪随机性:二维耦合映射格子的一个案例研究
IEEE Trans Cybern. 2023 Feb;53(2):1324-1334. doi: 10.1109/TCYB.2021.3129808. Epub 2023 Jan 13.
4
On the Security of a Class of Diffusion Mechanisms for Image Encryption.一类用于图像加密的扩散机制的安全性研究。
IEEE Trans Cybern. 2018 Apr;48(4):1163-1175. doi: 10.1109/TCYB.2017.2682561. Epub 2017 Mar 28.