Abstract
Recently Hussain et al. proposed an image encryption algorithm which has three independent phases: (1) total pixel shuffling performed, in spatial domain, with permutation sequences extracted from chaotic skew tent map, (2) diffusion carried out using random codes generated from same chaotic map, and (3) extra confusion induced with substitution-box transformation. Though, the encryption algorithm achieves optimal scores of NPCR/UACI and exhibits great encryption strength. But, a careful analysis unveils its inherent security flaws, leaving it vulnerable to cryptographic attack. In this paper, we analyze its security weaknesses and proposed a chosen plaintext-attack with inverse S-box to break the algorithm completely. It is shown that the plain-image can be recovered successfully without knowing the secret key. The computer simulation of attack highlights the ineptness of Hussain et al. algorithm and shows that it is not commendable to deploy it for practical encryption of digital images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York (1996)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of applied cryptography CRC Press (1997)
Wang, Y., Wong, K., Liao, X., Xiang, T., Chen, G.: A Chaos-based Image Encryption Algorithm with Variable Control Parameters. Chaos, Solitons & Fractals 41(4), 1773–1783 (2009)
Ahmad, M., Farooq, O.: Chaos based PN sequence generator for cryptographic applications. In: International Conference on Multimedia, Signal Processing and Communication Technologies, pp. 83–86 (2011)
Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Applied Soft Computing 11(1), 514–522 (2011)
Ye, R.: A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications 284(22), 5290–5298 (2011)
Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. Computers and Mathematics with Applications 59(10), 3320–3327 (2010)
Hermassi, H., Rhouma, R., Belghith, S.: Improvement of an image encryption algorithm based on hyper-chaos. Telecommunication Systems 52(2), 539–549 (2013)
Fu, C., Chen, J., Zou, H., Meng, W., Zhan, Y., Yu, Y.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express 20(3), 2363–2378 (2012)
Seyed, M.S., Mirzakuchaki, S.: A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Processing 92(5), 1202–1215 (2012)
Kanso, A., Ghebleh, M.: A novel image encryption algorithm based on a 3D chaotic map. Communications in Nonlinear Science and Numerical Simulation 17(7), 2943–2959 (2012)
Ahmad, M., Farooq, O.: A Multi-Level Blocks Scrambling Based Chaotic Image Cipher. In: Ranka, S., Banerjee, A., Biswas, K.K., Dua, S., Mishra, P., Moona, R., Poon, S.-H., Wang, C.-L. (eds.) IC3 2010. CCIS, vol. 94, pp. 171–182. Springer, Heidelberg (2010)
El-Latif, A.A.A., Niu, X.: A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU-International Journal of Electronics and Communications 67(2), 136–143 (2013)
Enayatifar, R., Abdullah, A.H., Isnin, I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering 56, 83–93 (2014)
Hussain, I., Shah, T., Gondal, M.A.: Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation. Journal of Vibration and Control (2013), doi:10.1177/1077546313482960
Hermassi, H., Rhouma, R., Belghith, S.: Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software 85(9), 2133–2144 (2012)
Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)
Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a New Substitution-Diffusion based Image Cipher. Communication in Nonlinear Science and Numerical Simulation 15(7), 1887–1892 (2010)
Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing 91(4), 949–954 (2011)
Rhouma, R., Belghith, S.: Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons & Fractals 41(4), 1718–1722 (2009)
Wang, X., He, G.: Cryptanalysis on a novel image encryption method based on total shuffling scheme. Optics Communications 284(24), 5804–5807 (2011)
Ahmad, M.: Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem. In: Aluru, S., Bandyopadhyay, S., Catalyurek, U.V., Dubhashi, D.P., Jones, P.H., Parashar, M., Schmidt, B. (eds.) IC3 2011. CCIS, vol. 168, pp. 81–91. Springer, Heidelberg (2011)
Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A 372(38), 5973–5978 (2008)
Özkaynak, F., Özer, A.B., Yavuz, S.: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications 285(2), 4946–4948 (2012)
Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications 283(2), 232–236 (2010)
Wang, X., Liu, L.: Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics 73(1-2), 795–800 (2013)
Tu, G., Liao, X., Xiang, T.: Cryptanalysis of a color image encryption algorithm based on chaos. Optik-International Journal for Light and Electron Optics 124(22), 5411–5415 (2013)
Rhouma, R., Belghith, S.: Cryptanalysis of a Chaos-based Cryptosystem on DSP. Communication in Nonlinear Science and Numerical Simulation 16(2), 876–884 (2011)
Ahmad, M., Khan, P.M., Ansari, M.Z.: A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique. In: MartÃnez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 540–550. Springer, Heidelberg (2014)
Khan, M., Shah, T., Mahmood, H., Gondal, M.A., Hussain, I.: A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dynamics 70(3), 2303–2311 (2012)
Kerckhoffs’s principle, http://crypto-it.net/eng/theory/kerckhoffs.html (last access on May 12, 2014)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sharma, P.K., Ahmad, M., Khan, P.M. (2014). Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-44966-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44965-3
Online ISBN: 978-3-662-44966-0
eBook Packages: Computer ScienceComputer Science (R0)