Advanced Search
Volume 44 Issue 10
Oct.  2022
Turn off MathJax
Article Contents
FENG Wei, ZHANG Jing, QIN Zhentao, HE Yigang. Cryptanalysis of Image Encryption Algorithm Based on Variable Step Length Josephus Traversing and DNA Dynamic Encoding[J]. Journal of Electronics & Information Technology, 2022, 44(10): 3635-3642. doi: 10.11999/JEIT210791
Citation: FENG Wei, ZHANG Jing, QIN Zhentao, HE Yigang. Cryptanalysis of Image Encryption Algorithm Based on Variable Step Length Josephus Traversing and DNA Dynamic Encoding[J]. Journal of Electronics & Information Technology, 2022, 44(10): 3635-3642. doi: 10.11999/JEIT210791

Cryptanalysis of Image Encryption Algorithm Based on Variable Step Length Josephus Traversing and DNA Dynamic Encoding

doi: 10.11999/JEIT210791
Funds:  The National Natural Science Foundation of China (51977153, 51637004), The Science and Technology Development Center Project of Chinese Ministry of Education (2018A0105)
  • Received Date: 2021-08-06
  • Rev Recd Date: 2022-03-29
  • Available Online: 2022-04-21
  • Publish Date: 2022-10-19
  • In recent years, new image encryption algorithms have been continuously proposed, but their security has not been fully analyzed and verified. The security of a newly reported image encryption algorithm is analyzed in this paper. The analyzed algorithm achieves the image encryption through pixel scrambling based on variable step length Josephus traversing, pixel substitution based on DNA dynamic encoding, and pixel diffusion in row and column directions. Analysis shows that the secret key design of this algorithm is not practical, and its encryption process also has defects. Under the condition of chosen-plaintext attack, the encryption process of this algorithm is cryptanalyzed, and a corresponding attack algorithm is proposed. Simulation experiments and theoretical analysis confirm the effectiveness and feasibility of the proposed attack algorithm. Finally, in view of issues in the analyzed algorithm and some image encryption algorithms, several suggestions for improvement are given.
  • loading
  • [1]
    ÖZKAYNAK F. Brief review on application of nonlinear dynamics in image encryption[J]. Nonlinear Dynamics, 2018, 92(2): 305–313. doi: 10.1007/s11071-018-4056-x
    [2]
    FENG Wei, HE Yigang, LI Hongmin, et al. Image encryption algorithm based on discrete logarithm and memristive chaotic system[J]. The European Physical Journal Special Topics, 2019, 228(10): 1951–1967. doi: 10.1140/epjst/e2019-800209-3
    [3]
    HUA Zhongyun, JIN Fan, XU Binxuan, et al. 2D logistic-sine-coupling map for image encryption[J]. Signal Processing, 2018, 149: 148–161. doi: 10.1016/j.sigpro.2018.03.010
    [4]
    陈艳浩, 刘中艳, 周丽宴. 基于差异混合掩码与混沌Gyrator变换的光学图像加密算法[J]. 电子与信息学报, 2019, 41(4): 888–895. doi: 10.11999/JEIT180456

    CHEN Yanhao, LIU Zhongyan, and ZHOU Liyan. Optical image encryption algorithm based on differential mixed mask and chaotic Gyrator transform[J]. Journal of Electronics &Information Technology, 2019, 41(4): 888–895. doi: 10.11999/JEIT180456
    [5]
    李付鹏, 刘敬彪, 王光义, 等. 基于混沌集的图像加密算法[J]. 电子与信息学报, 2020, 42(4): 981–987. doi: 10.11999/JEIT190344

    LI Fupeng, LIU Jingbiao, WANG Guangyi, et al. An image encryption algorithm based on chaos set[J]. Journal of Electronics &Information Technology, 2020, 42(4): 981–987. doi: 10.11999/JEIT190344
    [6]
    ZHAO Ruoyu, ZHANG Yushu, XIAO Xiangli, et al. TPE2: Three-pixel exact thumbnail-preserving image encryption[J]. Signal Processing, 2021, 183: 108019. doi: 10.1016/j.sigpro.2021.108019
    [7]
    肖成龙, 孙颖, 林邦姜, 等. 基于神经网络与复合离散混沌系统的双重加密方法[J]. 电子与信息学报, 2020, 42(3): 687–694. doi: 10.11999/JEIT190213

    XIAO Chenglong, SUN Ying, LIN Bangjiang, et al. Double encryption method based on neural network and composite discrete chaotic system[J]. Journal of Electronics &Information Technology, 2020, 42(3): 687–694. doi: 10.11999/JEIT190213
    [8]
    LI Hongmin, LI Tie, FENG Wei, et al. A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion[J]. Journal of Information Security and Applications, 2021, 61: 102844. doi: 10.1016/j.jisa.2021.102844
    [9]
    郭媛, 周艳艳, 敬世伟. 基于图像重组和比特置乱的多图像加密[J]. 光子学报, 2020, 49(4): 0410002. doi: 10.3788/gzxb20204904.0410002

    GUO Yuan, ZHOU Yanyan, and JING Shiwei. Multiple-image encryption based on image recombination and bit scrambling[J]. Acta Photonica Sinica, 2020, 49(4): 0410002. doi: 10.3788/gzxb20204904.0410002
    [10]
    LI Chengqing, ZHANG Yun, and XIE E Y. When an attacker meets a cipher-image in 2018: A year in review[J]. Journal of Information Security and Applications, 2019, 48: 102361. doi: 10.1016/j.jisa.2019.102361
    [11]
    闵富红, 王珠林, 王恩荣, 等. 新型忆阻器混沌电路及其在图像加密中的应用[J]. 电子与信息学报, 2016, 38(10): 2681–2688. doi: 10.11999/JEIT160178

    MIN Fuhong, WANG Zhulin, WANG Enrong, et al. New memristor chaotic circuit and its application to image encryption[J]. Journal of Electronics &Information Technology, 2016, 38(10): 2681–2688. doi: 10.11999/JEIT160178
    [12]
    FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259–1284. doi: 10.1142/S021812749800098X
    [13]
    WU Xiangjun, WANG Kunshu, WANG Xingyuan, et al. Color image DNA encryption using NCA map-based CML and one-time keys[J]. Signal Processing, 2018, 148: 272–287. doi: 10.1016/j.sigpro.2018.02.028
    [14]
    CHAI Xiuli, GAN Zhihua, YUAN Ke, et al. A novel image encryption scheme based on DNA sequence operations and chaotic systems[J]. Neural Computing and Applications, 2019, 31(1): 219–237. doi: 10.1007/s00521-017-2993-9
    [15]
    ZEFREH E Z. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions[J]. Multimedia Tools and Applications, 2020, 79(33): 24993–25022. doi: 10.1007/s11042-020-09111-1
    [16]
    JOLFAEI A, WU Xinwen, and MUTHUKKUMARASAMY V. On the security of permutation-only image encryption schemes[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(2): 235–246. doi: 10.1109/TIFS.2015.2489178
    [17]
    FENG Wei and HE Yigang. Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling[J]. IEEE Photonics Journal, 2018, 10(6): 7909215. doi: 10.1109/JPHOT.2018.2880590
    [18]
    PREISHUBER M, HÜTTER T, KATZENBEISSER S, et al. Depreciating motivation and empirical security analysis of chaos-based image and video encryption[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2137–2150. doi: 10.1109/TIFS.2018.2812080
    [19]
    CHEN Junxin, CHEN Lei, and ZHOU Yicong. Cryptanalysis of a DNA-based image encryption scheme[J]. Information Sciences, 2020, 520: 130–141. doi: 10.1016/j.ins.2020.02.024
    [20]
    牛莹, 张勋才. 基于变步长约瑟夫遍历和DNA动态编码的图像加密算法[J]. 电子与信息学报, 2020, 42(6): 1383–1391. doi: 10.11999/JEIT190849

    NIU Ying and ZHANG Xuncai. Image encryption algorithm of based on variable step length Josephus traversing and DNA dynamic coding[J]. Journal of Electronics &Information Technology, 2020, 42(6): 1383–1391. doi: 10.11999/JEIT190849
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)  / Tables(4)

    Article Metrics

    Article views (529) PDF downloads(93) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return