Back to Search
Start Over
On the security of a class of diffusion mechanisms for image encryption
- Publication Year :
- 2018
-
Abstract
- The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex ynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic rimitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only O(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of our work are also discussed.<br />Comment: 16 pages, 7 figures
- Subjects :
- Cryptanalysis
Diffusion
Image encryption
Plaintext attack
Software
Control and Systems Engineering
Information Systems
Human-Computer Interaction
Computer Science Applications
Computer Vision and Pattern Recognition
Electrical and Electronic Engineering
FOS: Computer and information sciences
Computer Science - Cryptography and Security
Theoretical computer science
Computer science
Cryptography
Information System
02 engineering and technology
Encryption
law.invention
Multiple encryption
law
Computer Science Applications1707 Computer Vision and Pattern Recognition
0202 electrical engineering, electronic engineering, information engineering
Cryptosystem
Artificial Intelligence & Image Processing
Key schedule
Computer Science::Cryptography and Security
Cryptographic primitive
Deterministic encryption
Image encryption, Cryptanalysis, Diffusion, Plaintext attack, Permutation
Deniable encryption
Symmetric-key algorithm
56-bit encryption
020201 artificial intelligence & image processing
Cryptography and Security (cs.CR)
Key Wrap
Plaintext-aware encryption
Differential cryptanalysis
Permutation
NO
Watermarking attack
Block cipher
business.industry
020206 networking & telecommunications
Plaintext
Ciphertext indistinguishability
Probabilistic encryption
40-bit encryption
Key (cryptography)
business
Ciphertext-only attack
Subjects
Details
- Language :
- English
- Database :
- OpenAIRE
- Accession number :
- edsair.doi.dedup.....a7c404f6863779c394640064d7a1488f