Skip to main content

Advertisement

Log in

Cryptanalysis of genetic algorithm-based encryption scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Genetic algorithm, a technique inspired by evolutionary biology to mimic the process of natural selection, has been applied in the image encryption due to the confusion and diffusion properties of mutation and crossover processes involved in the genetic algorithm. In this paper, we analyze the security of the image encryption designed based on genetic algorithms. We perform a known plaintext attack on Biswas et al. image encryption scheme designed based on chaotic maps and genetic algorithms. We show that the encryption scheme is not as secure as claimed by Biswas et al. since the proposed attack reduces the claimed 448-bit security to 264.28-bit security. The proposed attack and its analysis can be utilized and extended to other image encryption schemes designed based on genetic algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. We assume worse case scenario to obtain the worse case time complexity of the proposed attack

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron C 66 (10):806–816

    Article  Google Scholar 

  2. Biham E, Kocher PC (1994) A known plaintext attack on the PKZIP stream cipher. In: International workshop on fast software encryption. Springer, Berlin, pp 144–153

  3. Biswas K, Muthukkumarasamy V, Singh K (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sensors J 15(5):2801–2809

    Article  Google Scholar 

  4. Daemen J, Rijmen V (2013) The design of rijndael: AES-the advanced encryption standard. Springer Science & Business Media, Berlin

    MATH  Google Scholar 

  5. Das S, Mondal SN, Sanyal MK (2018) Image encryption based on arnold cat map and GA operator. In: Intelligent engineering informatics. Springer, Berlin, pp 19–28

  6. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Article  Google Scholar 

  7. Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51(9):1066–1077

    Article  Google Scholar 

  8. Fang Q, Liu Y, Zhao X (2008) A chaos-based secure cluster protocol for wireless sensor networks. Kybernetika 44(4):522–533

    MathSciNet  MATH  Google Scholar 

  9. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(06):1259–1284

    Article  MathSciNet  Google Scholar 

  10. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools and Appl 75(8):4753–4769

    Article  Google Scholar 

  11. Hassan MAS, Abuhaiba ISI (2011) Image encryption using differential evolution approach in frequency domain. Signal Image Process Inter J (SIPIJ) 2 (1):51–69

    Article  Google Scholar 

  12. Holland JH (1975) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence USA: University of Michigan

  13. Holland JH (1992) Genetic algorithms. Sci Am 267(1):66–73

    Article  Google Scholar 

  14. Kumar J, Nirmala S (2012) Encryption of images based on genetic algorithm–a new approach. In: Advances in computer science, engineering & applications. Springer, Berlin, pp 783–791

  15. Lai X, Massey JL (1990) A proposal for a new block encryption standard. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 389–404

  16. National Bureau of Standards (1977) Data encryption standard. U.S. department of commerce, FIPS-pub.46

  17. Nematzadeh H, Enayatifar R, Motameni H, Guimarães FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24–32

    Article  Google Scholar 

  18. Premkumar R, Anand S (2018) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl, 1–17

  19. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184

    Article  Google Scholar 

  20. Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28(4):656–715

    Article  MathSciNet  Google Scholar 

  21. Sivanandam S, Deepa S (2008) Genetic algorithms. In: Introduction to genetic algorithms. Springer, Berlin, pp 15–37

  22. Wang X, Xu D (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78(4):2975–2984

    Article  MathSciNet  Google Scholar 

  23. Yap WS, Phan RCW, Goi BM, Yau WC, Heng SH (2016) On the effective subkey space of some image encryption algorithms using external key. J Vis Commun Image Represent 40:51–57

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuan-Wai Wong.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This research was supported by Universiti Tunku Abdul Rahman (UTAR) under UTAR Research Fund (UTARRF) no. 6200/W60.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wong, KW., Yap, WS., Wong, D.CK. et al. Cryptanalysis of genetic algorithm-based encryption scheme. Multimed Tools Appl 79, 25259–25276 (2020). https://doi.org/10.1007/s11042-020-09191-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09191-z

Keywords

Navigation