您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2016, Vol. 51 ›› Issue (5): 67-71.doi: 10.6040/j.issn.1671-9352.2.2015.310

• • 上一篇    下一篇

对结合超混沌序列和移位运算图像密码的攻击

朱从旭1,卢庆1,2   

  1. 1. 中南大学信息科学与工程学院, 湖南 长沙 410083;2.湖南省临湘市公安局, 湖南 临湘 414300
  • 收稿日期:2015-08-17 出版日期:2016-05-20 发布日期:2016-05-16
  • 作者简介:朱从旭(1963— ),男,博士,教授,主要从事混沌密码与混沌保密通信研究. E-mail: zhucx@csu.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(61073187,61161006)

Attack on an image cipher by combining hyper chaotic sequences and shift operation

ZHU Cong-xu1, LU Qing1,2   

  1. 1. School of Information Science and Engineering, Central South University, Changsha 410083, Hunan, China;
    2. Linxiang City Public Security Bureau of Hunan Province, Linxiang 414300, Hunan, China
  • Received:2015-08-17 Online:2016-05-20 Published:2016-05-16

摘要: 混沌密码系统已展现了若干非传统的优良特性,同时从数学理论上对混沌密码系统开展严密的密码分析对促进其进步具有至关重要的意义。对一种基于超混沌序列和移位运算的图像加密算法进行了密码分析,该算法的核心思想是利用改进的超混沌序列对图像先后实施置乱、扩散和混淆处理。运用选择明文攻击方法,成功破解了该算法中用于像素位置置乱以及像素值扩散和混淆的等效密钥,从而能利用破解的等效密钥解密出目标明文。理论分析和实验结果验证了本文选择明文攻击策略的可行性。简要讨论了提高该密码算法安全性的一些改进措施。

关键词: 超混沌序列, 密码分析, 移位运算, 选择明文攻击, 混沌图像密码

Abstract: A chaos-based cryptosystem has exhibited some unconventionally excellent properties. At the same time, it is of vital significance for its advancement to give a mathematically rigorous cryptanalysis. In this study, we analyze the security of an image encryption algorithm, whose main idea is to shift the images pixel positions by using one of the improved hyperchaotic sequences, diffuse and confuse the image's pixel values by using shift cipher and other improved hyperchaotic sequences. By applying chosen plaintext attacks, we show that all the equivalent keys can be revealed, which can be exploited to reveal the plain image. Both mathematical analysis and experimental results are presented and the feasibility of the proposed chosen plaintext attack strategies is verified. Finally, some possible improved methods to increase the security of the image encryption algorithm are discussed briefly.

Key words: chaotic image cipher, cryptanalysis, chosen plaintext attack, hyper chaotic sequences, shift operation

中图分类号: 

  • TP309
[1] GAO T G, CHEN Z Q. A new image encryption algorithm based on hyper-chaos[J]. Physics Letters A, 2008, 372(4):394-400.
[2] MAZLOOM S, EFTEKHARI-MOGHADAM A M. Color image encryption based on coupled nonlinear chaotic map[J]. Chaos, Solitons and Fractals, 2009, 42(3):1745-1754.
[3] YE G D, WONG K W. An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dynamics, 2012, 69(4):2079-2087.
[4] ZHU C X. A novel image encryption scheme based on improved hyperchaotic sequences[J]. Optics Communications, 2012, 285(1):29-37.
[5] ZHANG Y S, XIAO D, SHU Y L, et al. A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations [J]. Signal Processing: Image Communication, 2013, 28(3):292-300.
[6] WANG X Y, XU D H. A novel image encryption scheme based on Brownian motion and PWLCM chaotic system[J]. Nonlinear Dynamics, 2014, 75(1-2):345-353.
[7] LI C Q, ZHANG L Y, OU R, et al. Breaking a novel colour image encryption algorithm based on chaos[J]. Nonlinear Dynamics, 2012, 70(4):2383-2388.
[8] ZHANG Y S, XIAO D. Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack[J]. Nonlinear Dynamics, 2013, 72(4):751-756.
[9] ZHU C X, LIAO C L, DENG X H. Breaking and improving an image encryption scheme based on total shuffling scheme[J]. Nonlinear Dynamics, 2013, 71(1-2):25-34.
[10] WANG X Y, LUAN D P, BAO X M. Cryptanalysis of an image encryption algorithm using Chebyshev generator[J]. Digital Signal Processing, 2014, 25(2):244-247.
[11] ZHU C X, XU S Y, HU Y P, et al. Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system[J]. Nonlinear Dynamics, 2015, 79(2):1511-1518.
[12] 廖琪男,卢守东,孙宪波. 结合超混沌序列和移位密码的数字图像加密算法[J]. 小型微型计算机系统, 2015, 36(2):332-337. LIAO Qinan, LU Shoudong, SUN Xianbo. Digital image encryption algorithm by combining hyper chaotic sequences and shift cipher[J]. Journal of Chinese Computer Systems, 2015, 36(2):332-337.
[1] 殷勍,王念平. Piccolo结构抵抗差分和线性密码分析能力评估[J]. 山东大学学报(理学版), 2016, 51(3): 132-142.
[2] 古春生1,2,吴访升2,景征骏2,3,于志敏2. 矩阵环上快速公钥密码算法的安全分析[J]. J4, 2013, 48(09): 22-28.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!