期刊文献+

对一种基于比特置乱的超混沌图像加密算法的选择明文攻击 被引量:8

Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos
下载PDF
导出
摘要 最近,一种基于比特置乱的超混沌图像加密算法被提出,其核心思想为:首先,用混沌序列对明文图像进行像素置乱操作;然后,根据一个随机序列中相邻两个元素的大小关系对像素进行不同的比特位置乱;最后,把经过比特置乱后的序列与另一个混沌序列进行扩散、混淆运算得到最终的密文图像,从而使明文图像达到更好的加密效果。对该加密算法进行了安全性分析,发现该算法的安全性完全依赖于3个混沌序列,通过选择明文攻击依次破解出原算法中的3个混沌随机序列,恢复出了明文图像。理论分析和实验结果验证了所选择明文攻击策略的可行性,同时对该算法进行了改进,在改进算法中混沌系统的初始值与明文图像的SHA-256哈希值有关,从而使得密钥流与明文图像相关,因此算法可以抵抗选择明文的攻击。 Recently,an image encryption algorithm based on bit scrambling and hyperchaos was proposed,whose main idea is as follows.First,a chaotic sequence is used to scramble pixel values of plaintext image.Then,according to the size of two adjacent elements in a random sequence,internal bit of each pixel is scrambled.In the end,the final ciphertext image is obtained by the diffusion and confusion of the scrambling sequence,and chaotic sequence,and plain image information can be well hidden.In this paper,the security of the above encryption algorithm were analyzed.It is found that the security of the algorithm depends entirely on three chaotic sequences by choosing plaintext attack.The three chaotic random sequences in the original algorithm were obtained,thus the plaintext image was restored.Theoretical analysis and experimental results verify the feasibility of the chosen plaintext attack strategy.At the same time,the improved method was given.In the improved algorithm,the initial value of the chaotic system is related to the SHA-256 hash value of the plaintext image,so that the key stream is related to the plaintext image.Then the algorithm is resistant to the attack of chosen plaintext.
出处 《计算机科学》 CSCD 北大核心 2017年第11期273-278,共6页 Computer Science
基金 山东省自然科学基金(ZR2014FM032 ZR2017MEM019) 聊城大学自然科学基金(318011606)资助
关键词 超混沌图像加密 密码分析 比特位置乱 选择明文攻击 SHA-256哈希值 Hyperchaotic image encryption, Cryptanalysis , Bit scrambling , Chosen plaintext attack, SHA-256 hash value
  • 相关文献

参考文献5

二级参考文献53

  • 1黄峰,冯勇.利用图像分割思想的二维混沌映射及图像加密算法[J].光学精密工程,2007,15(7):1096-1103. 被引量:15
  • 2王培荣,徐喆,付冲,朱伟勇,王兴伟.复合混沌数字图像加密算法[J].通信学报,2006,27(z1):285-289. 被引量:6
  • 3郭建胜,金晨辉.对基于广义猫映射的一个图像加密系统的已知图像攻击[J].通信学报,2005,26(2):131-135. 被引量:29
  • 4陈刚,赵晓宇,李均利.一种自适应的图像加密算法(英文)[J].软件学报,2005,16(11):1975-1982. 被引量:36
  • 5HUANG E FENG Y. An image encryption approach based on a new two-dimensional map[A]. Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2006[C]. CA, USA, 2006. 125-130.
  • 6MENG J L, PANG H J, GAO W Q. New color image encryption algorithm based on chaotic sequences ranking[Al. Proceedings of In- ternational Conference on Intelligent Information Hiding and Multi- media Signal Processing 2008[C]. Harbin, China, 2008. 1348-1351.
  • 7HANG H Y. A new image scrambling algorithm based on queue transformation[A]. Proceedings of the Sixth International Conference on Machine Learning and Cybernetics 2007[C]. Hong Kong, China, 2007. 1526-1530.
  • 8SHANG Z W, REN H E, ZHANG J. A block location scrambling algorithm of digital image based on arnold transformation[A]. Pro- ceedings of the 9th International Conference for Young Computer Scientists 2008[C]. Hunan, China, 2008. 2942-2947.
  • 9BIBHUDENDRA A, SARAT K P, GANAPATI P. Image encryption by novel cryptosystem using matrix transformation[A]. Proceedings of First International Conference on Emerging Trends in Engineering and Technology 2008[C]. Nagpur, Maharashtra, 2008.77-81.
  • 10WANG F C, BAI S, ZHU G B, et al. An image encryption "algorithm based on N-Dimension affine transformation[A]. Proceedings of the Eighth IEEE/AC1S International Conference on Computer and Infor- mation Science 20091C1. Shanghai, China, 2009. 579-585.

共引文献82

同被引文献43

引证文献8

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部