1. On the security of a class of diffusion mechanisms for image encryption
- Author
-
Gianluca Setti, Leo Yu Zhang, Fabio Pareschi, Yushu Zhang, Kwok-Wo Wong, Yuansheng Liu, Riccardo Rovatti, DIP. DI ELETTRONICA,INFORMATICA,SISTEMISTICA-DEIS, DIPARTIMENTO DI INGEGNERIA DELL'ENERGIA ELETTRICA E DELL'INFORMAZIONE 'GUGLIELMO MARCONI', Facolta' di INGEGNERIA, Da definire, AREA MIN. 09 - Ingegneria industriale e dell'informazione, Zhang, Leo Yu, Liu, Yuansheng, Pareschi, Fabio, Zhang, Yushu, Wong, Kwok-Wo, Rovatti, Riccardo, and Setti, Gianluca
- Subjects
Cryptanalysis ,Diffusion ,Image encryption ,Plaintext attack ,Software ,Control and Systems Engineering ,Information Systems ,Human-Computer Interaction ,Computer Science Applications ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Theoretical computer science ,Computer science ,Cryptography ,Information System ,02 engineering and technology ,Encryption ,law.invention ,Multiple encryption ,law ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,Artificial Intelligence & Image Processing ,Key schedule ,Computer Science::Cryptography and Security ,Cryptographic primitive ,Deterministic encryption ,Image encryption, Cryptanalysis, Diffusion, Plaintext attack, Permutation ,Deniable encryption ,Symmetric-key algorithm ,56-bit encryption ,020201 artificial intelligence & image processing ,Cryptography and Security (cs.CR) ,Key Wrap ,Plaintext-aware encryption ,Differential cryptanalysis ,Permutation ,NO ,Watermarking attack ,Block cipher ,business.industry ,020206 networking & telecommunications ,Plaintext ,Ciphertext indistinguishability ,Probabilistic encryption ,40-bit encryption ,Key (cryptography) ,business ,Ciphertext-only attack - Abstract
The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex ynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic rimitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only O(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of our work are also discussed., Comment: 16 pages, 7 figures
- Published
- 2018