Abstract
Wadi and Zainal recently proposed a high definition image encryption algorithm based on a modified AES-128 block cipher in (Wirel Pers Commun 79(2):811–829, 2014). In this paper, we show that the core component of their image encryption algorithm, a modified AES-128 cipher, is insecure against impossible differential attack. The proposed impossible differential attack on the full rounds of the modified AES-128 cipher has a time complexity of around \(2^{88.74}\) encryptions with \(2^{114.06}\) chosen plaintexts and \(2^{99}\) bytes of memory, in contrast to the expected security of \(2^{128}\). The existence of such an attack disproves the claims made by the designers that their modified AES-128 cipher improves the security of the AES cipher and that it can subsequently be used to construct a secure image encryption scheme. The root cause of this attack, some other issues with the modified AES cipher and possible solutions are described to serve as important remarks in designing a secure image encryption scheme.






Similar content being viewed by others
References
Pareek, N. K., Patidar, V., & Sud, K. K. (2003). Discrete chaotic cryptography using external key. Physics Letters A, 309(1–2), 75–82.
Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24(9), 926–934.
Patidar, V., Pareek, N. K., Purohit, G., & Sud, K. K. (2010). Modified substitution-diffusion image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 15(10), 2755–2765.
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S. M., & Mosavi, M. R. (2014). A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools and Applications, 71(3), 1469–1497.
Wang, X., & Guo, K. (2014). A new image alternate encryption algorithm based on chaotic map. Nonlinear Dynamics, 76(4), 1943–1950.
Ahmad, J., & Hwang, S. O. (2015). A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications. doi:10.1007/s11042-015-2973-y.
Khan, M. (2015). A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dynamics, 82(1), 527–533.
Daemen, J. & Rijmen, V. (2000). Rijndael for AES. Proceedings of the AES Candidate Conference, 2000, 343–348.
Shahid, Z., Chaumont, M., & Puech, W. (2011). Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Transactions on Circuits and Systems for Video Technology, 21(5), 565–576.
Pinto, M., Puech, W., & Subsol, G. (2013). Protection of JPEG compressed e-comics by selective encryption. Proceedings of the ICIP, 2013, 4588–4592.
Szczepanski, J., Amigó, J. M., Michalek, T., & Kocarev, L. (2005). Cryptographically secure substitutions based on the approximation of mixing maps. IEEE Transactions on Circuits and Systems I: Regular Papers, 52(2), 443–453.
Zhang, Y., Xiao, D., Wen, W., & Nan, H. (2014). Cryptanalysis of image scrambling based on chaotic sequences and Vigenére cipher. Nonlinear Dynamics, 78(1), 235–240.
Zeng, L., Liu, R., Zhang, L. Y., Liu, Y. & Wong, K.-W. (2015). Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher. Multimedia Tools and Applications. doi:10.1007/s11042-015-2511-y.
Solak, E., & Çokal, (2009). Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps. Physics Letters A, 373(15), 1352–1356.
Solak, E., & Çokal, (2010). Algebraic break of image ciphers based on discretized chaotic map lattices. Information Sciences, 181(1), 227–233.
Yap, W.-S., Phan, R. C.-W., Yau, W.-C., & Heng, S.-H. (2015). Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dynamics, 80(3), 1483–1491.
Alvarez, G., Montoya, F., Romera, M., & Pastor, G. (2003). Cryptanalysis of an ergodic chaotic cipher. Physics Letters A, 311(2–3), 172–179.
Arroyo, D., Alvarez, G., Li, S., Li, C., & Nunez, J. (2008). Cryptanalysis of a discrete-time synchronous chaotic encryption system. Physics Letters A, 372(7), 1034–1039.
Rhouma, R., Solak, E., Arroyo, D., Li, S., Alvarez, G., & Belghith, S. (2009). Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key”. Physics Letters A, 373(37), 3398–3400.
Ahmad, J., Hwang, S. O., & Ali, A. (2015). An experimental comparison of chaotic and non-chaotic image encryption schemes. Wireless Personal Communications, 84(2), 901–918.
Wadi, S. M., & Zainal, N. (2014). High definition image encryption algorithm based on AES modification. Wireless Personal Communications, 79(2), 811–829.
Biham, E., Biryukov, A. & Shamir, A. (1999). Miss in the middle attacks on IDEA and Khufu. Proceedings of the FSE, 1999, 124–138.
Biham, E., & Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1), 3–72.
Bahrak, B., & Aref, M. R. (2008). Impossible differential attack on seven-round AES-128. IET Information Security, 2(2), 28–32.
Phan, R. C.-W. (2002). Classes of impossible differentials of advanced encryption standard. IEE Electronics Letters, 38(11), 508–510.
Dunkelman, O., & Keller, N. (2010). The effects of the omission of last round’s MixColumns on AES. Information Processing Letters, 110(8–9), 304–308.
Bernstein, D. J., & Schwabe, P. (2008). New AES software speed records. Proceedings of the INDOCRYPT, 2008, 322–336.
Matsui, M. (2006). How far can we go on the x64 processors? Proceedings of the FSE, 2006, 341–358.
Rebeiro, C., Selvakumar, A. D., & Devi, A. S. L. (2006). Bitslice implementation of AES. Proceedings of the CANS, 2006, 203–212.
Matsui, M., & Nakajima, J. (2007). On the power of bitslice implementation on Intel Core2 processor. Proceedings of the CHES, 2007, 121–134.
Acknowledgments
We would like to thank the anonymous reviewers for helpful comments. Wun-She Yap would like to acknowledge UTAR for financially funding his research through the UTAR Research Fund number UTARRF 6200/Y43. Raphael Phan acknowledges the financial support by the Ministry of Education’s Fundamental Research Grant Scheme (FRGS) under the project ProvAdverse.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yap, WS., Phan, R.CW. & Goi, BM. Cryptanalysis of a High-Definition Image Encryption Based on AES Modification. Wireless Pers Commun 88, 685–699 (2016). https://doi.org/10.1007/s11277-016-3192-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3192-1