期刊文献+

一种图像加密算法的密码学分析 被引量:5

Cryptanalysis on an Image Encryption Scheme
下载PDF
导出
摘要 针对一种基于Cat映射和Lu混沌映射的图像加密方案进行密码学分析,提出三种不同的密码学攻击,即选择密文攻击,选择明文攻击和已知明文攻击。该加密方案利用Cat映射实现像素置乱,并将像素置乱后的矩阵与Lu混沌映射产生的随机矩阵进行异或运算实现图像灰度值的改变。由于该算法存在与密钥等价的等价密钥矩阵,即只要破解出等价密钥矩阵就可以恢复由该算法加密的加密图像,且等价密钥矩阵不随明文图像的改变而改变,使其难以抵抗各种攻击。仿真实验实现了对该算法的三种密码学攻击。 An image encryption scheme based on cat map and Lu chaotic map was proposed recently,where the cat map was utilized to shuffle the pixel positions of the plain- image and the Lu chaotic map was adopted to generate pseudo- random sequences to change the pixels gray values of the shuffled image by bitwise XOR operation. In this paper,we give three kinds of cryptanalysis on this image encryption scheme,including chosen ciphertext attack,chosen plaintext attack and known plaintext attack. In the proposed scheme,the cipher- image is independent on the plain- image and there exists a secret matrix equivalent to the secret parameters. We break the proposed encryption scheme by finding the equivalent secret matrix theoretically. Simulation experiments realize the three kinds of attacks as well.
机构地区 汕头大学数学系
出处 《网络新媒体技术》 2015年第6期37-42,54,共7页 Network New Media Technology
关键词 CAT映射 Lu混沌映射 密码学分析 选择密文攻击 选择明文攻击 已知明文攻击 Cat map Lu chaotic map cryptanalysis chosen ciphertext attack chosen plaintext attack known plaintext attack
  • 相关文献

参考文献1

二级参考文献6

  • 1Yen J C,Guo J I.A New Chaotic Key-Based Design for Image Encryption and Decryption[C]// Proc IEEE Int Conference Circuits and Systems,2000,4:49-52,2000.
  • 2Scharinger J.Fast Encryption of Image Data Using Chaotic Kolmogorov Flows[J].Electron Imageing,1998,7(2):318-325.
  • 3Fridrich J.Symmetric Ciphers Based on Two-Dimensional Chaotic Maps[J].Int J Bifurcat Chaos,1998,8(6):1259-84.
  • 4Li SJ,Zheng X,Mou X,and Cai Y.Chaotic Encryption Scheme for Real-Time Digital Video[C]//Proc SPIE on Electronic Imaging,San Jose,CA,USA,vol.4666,2002.
  • 5Chen G R,Mao Y B and Chui C K.A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps.Chaos,Solitons and Fractals,2004,21:749-761.
  • 6Lu J,Chen G.A New Chaotic Attractor Coined.Int J of Bifurcation and Chaos,2002,12(3):659-661.

共引文献8

同被引文献38

  • 1谢国波,丁煜明.基于Logistic映射的可变置乱参数的图像加密算法[J].微电子学与计算机,2015,32(4):111-115. 被引量:16
  • 2曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 3赵晓宇,陈刚,张亶,王肖虹,董光昌.Decryption of pure-position permutation algorithms[J].Journal of Zhejiang University Science,2004,5(7):803-809. 被引量:3
  • 4Robert Matthews.??ON THE DERIVATION OF A 'CHAOTIC' ENCRYPTION ALGORITHM(J)Cryptologia . 1989 (1)
  • 5Shannon CE.Communication Theory of Secrecy System. Bell System Technical Journal, The . 1949
  • 6Stinson D R.Cryptography: Theory and Practice. . 1995
  • 7Chengqing Li,Shujun Li,Guanrong Chen,Gang Chen,Lei Hu.Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J. Appl. Signal Process . 2005
  • 8Guoji Zhang,Qing Liu.??A novel image encryption method based on total shuffling scheme(J)Optics Communications . 2011 (12)
  • 9Xingyuan Wang,Guoxiang He.??Cryptanalysis on a novel image encryption method based on total shuffling scheme(J)Optics Communications . 2011 (24)
  • 10Yong Wang,Kwok-Wo Wong,Xiaofeng Liao,Tao Xiang,Guanrong Chen.??A chaos-based image encryption algorithm with variable control parameters(J)Chaos, Solitons and Fractals . 2008 (4)

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部