Skip to main content

Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation

  • Conference paper
Security in Computing and Communications (SSCC 2014)

Abstract

Recently Hussain et al. proposed an image encryption algorithm which has three independent phases: (1) total pixel shuffling performed, in spatial domain, with permutation sequences extracted from chaotic skew tent map, (2) diffusion carried out using random codes generated from same chaotic map, and (3) extra confusion induced with substitution-box transformation. Though, the encryption algorithm achieves optimal scores of NPCR/UACI and exhibits great encryption strength. But, a careful analysis unveils its inherent security flaws, leaving it vulnerable to cryptographic attack. In this paper, we analyze its security weaknesses and proposed a chosen plaintext-attack with inverse S-box to break the algorithm completely. It is shown that the plain-image can be recovered successfully without knowing the secret key. The computer simulation of attack highlights the ineptness of Hussain et al. algorithm and shows that it is not commendable to deploy it for practical encryption of digital images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York (1996)

    MATH  Google Scholar 

  2. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of applied cryptography CRC Press (1997)

    Google Scholar 

  3. Wang, Y., Wong, K., Liao, X., Xiang, T., Chen, G.: A Chaos-based Image Encryption Algorithm with Variable Control Parameters. Chaos, Solitons & Fractals 41(4), 1773–1783 (2009)

    Article  MATH  Google Scholar 

  4. Ahmad, M., Farooq, O.: Chaos based PN sequence generator for cryptographic applications. In: International Conference on Multimedia, Signal Processing and Communication Technologies, pp. 83–86 (2011)

    Google Scholar 

  5. Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Applied Soft Computing 11(1), 514–522 (2011)

    Article  Google Scholar 

  6. Ye, R.: A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications 284(22), 5290–5298 (2011)

    Article  Google Scholar 

  7. Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. Computers and Mathematics with Applications 59(10), 3320–3327 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  8. Hermassi, H., Rhouma, R., Belghith, S.: Improvement of an image encryption algorithm based on hyper-chaos. Telecommunication Systems 52(2), 539–549 (2013)

    Google Scholar 

  9. Fu, C., Chen, J., Zou, H., Meng, W., Zhan, Y., Yu, Y.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express 20(3), 2363–2378 (2012)

    Article  Google Scholar 

  10. Seyed, M.S., Mirzakuchaki, S.: A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Processing 92(5), 1202–1215 (2012)

    Article  Google Scholar 

  11. Kanso, A., Ghebleh, M.: A novel image encryption algorithm based on a 3D chaotic map. Communications in Nonlinear Science and Numerical Simulation 17(7), 2943–2959 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  12. Ahmad, M., Farooq, O.: A Multi-Level Blocks Scrambling Based Chaotic Image Cipher. In: Ranka, S., Banerjee, A., Biswas, K.K., Dua, S., Mishra, P., Moona, R., Poon, S.-H., Wang, C.-L. (eds.) IC3 2010. CCIS, vol. 94, pp. 171–182. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. El-Latif, A.A.A., Niu, X.: A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU-International Journal of Electronics and Communications 67(2), 136–143 (2013)

    Article  Google Scholar 

  14. Enayatifar, R., Abdullah, A.H., Isnin, I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering 56, 83–93 (2014)

    Article  Google Scholar 

  15. Hussain, I., Shah, T., Gondal, M.A.: Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation. Journal of Vibration and Control (2013), doi:10.1177/1077546313482960

    Google Scholar 

  16. Hermassi, H., Rhouma, R., Belghith, S.: Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software 85(9), 2133–2144 (2012)

    Article  Google Scholar 

  17. Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  18. Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a New Substitution-Diffusion based Image Cipher. Communication in Nonlinear Science and Numerical Simulation 15(7), 1887–1892 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  19. Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing 91(4), 949–954 (2011)

    Article  MATH  Google Scholar 

  20. Rhouma, R., Belghith, S.: Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons & Fractals 41(4), 1718–1722 (2009)

    Article  MATH  Google Scholar 

  21. Wang, X., He, G.: Cryptanalysis on a novel image encryption method based on total shuffling scheme. Optics Communications 284(24), 5804–5807 (2011)

    Article  Google Scholar 

  22. Ahmad, M.: Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem. In: Aluru, S., Bandyopadhyay, S., Catalyurek, U.V., Dubhashi, D.P., Jones, P.H., Parashar, M., Schmidt, B. (eds.) IC3 2011. CCIS, vol. 168, pp. 81–91. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  23. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A 372(38), 5973–5978 (2008)

    Article  MATH  Google Scholar 

  24. Özkaynak, F., Özer, A.B., Yavuz, S.: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications 285(2), 4946–4948 (2012)

    Article  Google Scholar 

  25. Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications 283(2), 232–236 (2010)

    Article  Google Scholar 

  26. Wang, X., Liu, L.: Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics 73(1-2), 795–800 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  27. Tu, G., Liao, X., Xiang, T.: Cryptanalysis of a color image encryption algorithm based on chaos. Optik-International Journal for Light and Electron Optics 124(22), 5411–5415 (2013)

    Article  Google Scholar 

  28. Rhouma, R., Belghith, S.: Cryptanalysis of a Chaos-based Cryptosystem on DSP. Communication in Nonlinear Science and Numerical Simulation 16(2), 876–884 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  29. Ahmad, M., Khan, P.M., Ansari, M.Z.: A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 540–550. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  30. Khan, M., Shah, T., Mahmood, H., Gondal, M.A., Hussain, I.: A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dynamics 70(3), 2303–2311 (2012)

    Article  MathSciNet  Google Scholar 

  31. Kerckhoffs’s principle, http://crypto-it.net/eng/theory/kerckhoffs.html (last access on May 12, 2014)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sharma, P.K., Ahmad, M., Khan, P.M. (2014). Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44966-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44965-3

  • Online ISBN: 978-3-662-44966-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics