Loading web-font TeX/Main/Regular
Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map | IEEE Journals & Magazine | IEEE Xplore

Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map


Abstract:

This article conducts a security analysis of an image encryption algorithm that employs 2-D lag-complex logistic map (LCLM) as a pseudorandom number generator (PRNG). Thi...Show More

Abstract:

This article conducts a security analysis of an image encryption algorithm that employs 2-D lag-complex logistic map (LCLM) as a pseudorandom number generator (PRNG). This algorithm uses the sum of all pixel values in the plain image as the initial value for the PRNG, thereby influencing the randomization of basic encryption operations. However, it is observed that certain factors lead to the generation of identical pseudorandom sequences for different plain images. Capitalizing on this vulnerability, we propose a chosen-plaintext attack strategy that effectively cracks the six encryption steps through a divide-and-conquer approach. By exploiting weaknesses inherent in the 2-D LCLM, the number of required chosen plain images is significantly reduced to 5\cdot \log_{2}(MN)+955·log2(MN)+95, where MNMN represents the total pixel count of the plain image.
Published in: IEEE MultiMedia ( Volume: 31, Issue: 1, Jan.-March 2024)
Page(s): 99 - 109
Date of Publication: 22 January 2024

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.