当前位置: X-MOL 学术J. Real-Time Image Proc. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross‑chaotic map
Journal of Real-Time Image Processing ( IF 2.9 ) Pub Date : 2021-04-01 , DOI: 10.1007/s11554-021-01091-1
Ming Li , Pengcheng Wang , Yange Yue , Yanfang Liu

Recently, a new secure image encryption scheme was proposed based on a novel 2D sine–cosine cross‑chaotic map. The authors claimed that the encryption scheme they proposed was secure enough to resist all the existing cryptanalytic attacks. However, the multi-round original cryptosystem with permutation–bit diffusion structure (PBDS) was found to have three security vulnerabilities and was proved to be equivalent to the one-round cryptosystem with PBDS, which would lead to the original cryptosystem being successfully cracked by chosen-plaintext attack (CPA). Subsequently, two efficient and feasible attack schemes were proposed in this paper, and they require \(\left\lceil {\log_{2} W \times H} \right\rceil + 1\) and \(\left\lceil {\log_{256} W \times H} \right\rceil + 1\) times of CPA in total, respectively. Simulation and experimental results have verified the effectiveness and feasibility of the two attack schemes.



中文翻译:

基于新型二维正弦-余弦交叉混沌映射的安全图像加密方案的密码学分析

最近,基于新颖的二维正弦-余弦交叉混沌映射,提出了一种新的安全图像加密方案。作者声称,他们提出的加密方案足够安全,可以抵抗所有现有的密码分析攻击。但是,发现具有置换位扩散结构(PBDS)的多轮原始密码系统具有三个安全漏洞,并被证明与具有PBDS的单轮密码系统等效,这将导致原始密码系统被成功破解。选择明文攻击(CPA)。随后,本文提出了两种有效可行的攻击方案,它们需要\(\ left \ lceil {\ log_ {2} W \ times H} \ right \ rceil + 1 \)\(\ left \ lceil { \ log_ {256} W \ times H} \ right \ rceil + 1 \)每次转化费用的总计次数。仿真和实验结果验证了这两种攻击方案的有效性和可行性。

更新日期:2021-04-01
down
wechat
bug