Abstract
Genetic algorithm, a technique inspired by evolutionary biology to mimic the process of natural selection, has been applied in the image encryption due to the confusion and diffusion properties of mutation and crossover processes involved in the genetic algorithm. In this paper, we analyze the security of the image encryption designed based on genetic algorithms. We perform a known plaintext attack on Biswas et al. image encryption scheme designed based on chaotic maps and genetic algorithms. We show that the encryption scheme is not as secure as claimed by Biswas et al. since the proposed attack reduces the claimed 448-bit security to 264.28-bit security. The proposed attack and its analysis can be utilized and extended to other image encryption schemes designed based on genetic algorithms.
Similar content being viewed by others
Notes
We assume worse case scenario to obtain the worse case time complexity of the proposed attack
References
Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron C 66 (10):806–816
Biham E, Kocher PC (1994) A known plaintext attack on the PKZIP stream cipher. In: International workshop on fast software encryption. Springer, Berlin, pp 144–153
Biswas K, Muthukkumarasamy V, Singh K (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sensors J 15(5):2801–2809
Daemen J, Rijmen V (2013) The design of rijndael: AES-the advanced encryption standard. Springer Science & Business Media, Berlin
Das S, Mondal SN, Sanyal MK (2018) Image encryption based on arnold cat map and GA operator. In: Intelligent engineering informatics. Springer, Berlin, pp 19–28
Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93
Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51(9):1066–1077
Fang Q, Liu Y, Zhao X (2008) A chaos-based secure cluster protocol for wireless sensor networks. Kybernetika 44(4):522–533
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(06):1259–1284
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools and Appl 75(8):4753–4769
Hassan MAS, Abuhaiba ISI (2011) Image encryption using differential evolution approach in frequency domain. Signal Image Process Inter J (SIPIJ) 2 (1):51–69
Holland JH (1975) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence USA: University of Michigan
Holland JH (1992) Genetic algorithms. Sci Am 267(1):66–73
Kumar J, Nirmala S (2012) Encryption of images based on genetic algorithm–a new approach. In: Advances in computer science, engineering & applications. Springer, Berlin, pp 783–791
Lai X, Massey JL (1990) A proposal for a new block encryption standard. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 389–404
National Bureau of Standards (1977) Data encryption standard. U.S. department of commerce, FIPS-pub.46
Nematzadeh H, Enayatifar R, Motameni H, Guimarães FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24–32
Premkumar R, Anand S (2018) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl, 1–17
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184
Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28(4):656–715
Sivanandam S, Deepa S (2008) Genetic algorithms. In: Introduction to genetic algorithms. Springer, Berlin, pp 15–37
Wang X, Xu D (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78(4):2975–2984
Yap WS, Phan RCW, Goi BM, Yau WC, Heng SH (2016) On the effective subkey space of some image encryption algorithms using external key. J Vis Commun Image Represent 40:51–57
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This research was supported by Universiti Tunku Abdul Rahman (UTAR) under UTAR Research Fund (UTARRF) no. 6200/W60.
Rights and permissions
About this article
Cite this article
Wong, KW., Yap, WS., Wong, D.CK. et al. Cryptanalysis of genetic algorithm-based encryption scheme. Multimed Tools Appl 79, 25259–25276 (2020). https://doi.org/10.1007/s11042-020-09191-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09191-z