计算机科学 ›› 2018, Vol. 45 ›› Issue (4): 178-181, 189.doi: 10.11896/j.issn.1002-137X.2018.04.030

• 信息安全 • 上一篇    下一篇

针对基于感知器模型的混沌图像加密算法的选择明文攻击

朱淑芹,王文宏,李俊青   

  1. 聊城大学计算机学院 山东 聊城252059,聊城大学计算机学院 山东 聊城252059,聊城大学计算机学院 山东 聊城252059
  • 出版日期:2018-04-15 发布日期:2018-05-11
  • 基金资助:
    本文受国家自然科学基金面上项目(61573178),聊城大学校基金(318011606),山东省自然科学基金(ZR2017MEM019)资助

Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model

ZHU Shu-qin, WANG Wen-hong and LI Jun-qing   

  • Online:2018-04-15 Published:2018-05-11

摘要: 对一种基于感知器模型的混沌图像加密算法进行了安全性分析,发现该算法的本质就是根据等效密钥流来改变明文图像像素值的比特位,从而得到密文图像。而等效密钥流与明文图像和对应的密文图像没有任何关系,因此运用选择明文攻击的方法破解出了算法中的等效密钥流,解密出了目标明文图像;同时指出了原算法存在的另外两个安全缺陷;最后对原算法进行了改进,弥补了其缺陷。理论分析和实验结果均证实了所提出的选择明文攻击策略的可行性以及改进算法的有效性。

关键词: 混沌图像加密,密码分析,等效密钥,选择明文攻击

Abstract: This paper analyzed the security of a chaotic image encryption algorithm based on preceptron model and found that the essence of the algorithm is to change the value of bits of the plaintext image according to the equivalent key stream to get the cipher image.However,there is no relation between the equivalent key stream and the plain text image or the corresponding cipher text image.By applying chosen plaintext attacks,this paper found that the equivalent key can be cracked,which can be further exploited to decrypt the target plain image.In addition,two other security defects were also reported.Finally,the original algorithm was improved to overcome the shortcomings of the original algorithm.Both mathematical analysis and experimental results show that the feasibility of the proposed chosen plaintext attack strategies and the effectiveness of the improved algorithm are verified.

Key words: Chaotic image encryption,Cryptanalysis,Equivalent key,Chosen plaintext attack

[1] SHANNON C E.Communication theory of secrecy system[J].Bell System Technical Journal,1949,28(11):656-715.
[2] SCHIENER B.Applied cryptography:protocols,algorithms and source code in C [M].New York:John Wiley and Sons,1996:30-40.
[3] BAPTISTA M S.Cryptography with chaos[J].Physics Letters A,1998,240(1/2):50-54.
[4] LIU H J,WANG X Y.Color image encryption based on one-time keys and robust chaotic maps[J].Computers and Mathematics with Applications,2010,59(10):3320-3327.
[5] WANG X Y,TENG L,QIN X.A novel colour image encryption algorithm based on chaos[J].Signal Processing,2012,92(4):1101-1108.
[6] HAN F Y,ZHU C X.New permutation-substitution image en-cryption scheme based on chaos[J].Journal of Wuhan University(Natural Science Edition),2014,60(5):447-452.(in Chinese) 韩凤英,朱从旭.新型置换和替代结构的图像混沌加密算法[J].武汉大学学报(理学版),2014,60(5):447-452.
[7] LIU Q,LI P Y,ZHANG M C,et al.Image encryption algorithm based on chaos system having markov portion[J].Journal of Electronics & Information Technology,2014,36(6):1271-1277.(in Chinese) 刘泉,李佩玥,章明朝,等.基于可Markov分割混沌系统的图像加密算法[J].电子与信息学报,2014,36(6):1271-1277.
[8] LIU H J,WANG X Y.Color image encryption using spatial bit-level permutation and high-dimension chaotic system[J].Optics Communications,2011,284(16/17):3895-3903.
[9] LIU H J,WANG X Y.Image encryption using DNA complementary rule and chaotic maps[J].Applied Soft Computing,2012,12(5):1457-1466.
[10] ANCHAL J,NAVIN R.A robust image encryption algorithmresistant to attacks using DNA and chaotic logistic maps[J].Multimedia Tools Applications,2015,29(1):1-18.
[11] HUANG X L,YE G D.An image encryption algorithm based on hyper-chaos and DNA sequence[J].Multimedia Tools Applications,2014,72(1):57-70.
[12] KUMAR M,IQBAL A,KUMAR P.A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography[J].Signal Processing,2016,125(C):187-202.
[13] AHMAD J,KHAN M A,HWANG S O,et al.A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices[J].Neural Computing and Applications,2017,8(1):953-967.
[14] WANG X Y,YANG L,LIU R,et al.A chaotic image encryption algorithm based on perceptron Model[J].Nonlinear Dynamics,2010,62(3):615-621.
[15] WILLIAM S,等.密码编码学与网络安全:原理与实践[M].杨明,等译.北京:电子工业出版社,2001:50-60.
[16] RHOUMA R,BELGHITH S.Cryptanalysis of a new image encryption algorithm based on hyper-chaos [J].Physics Letters A,2008,372(38):5973-5978.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 编辑部. 新网站开通,欢迎大家订阅![J]. 计算机科学, 2018, 1(1): 1 .
[2] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75, 88 .
[3] 夏庆勋,庄毅. 一种基于局部性原理的远程验证机制[J]. 计算机科学, 2018, 45(4): 148 -151, 162 .
[4] 厉柏伸,李领治,孙涌,朱艳琴. 基于伪梯度提升决策树的内网防御算法[J]. 计算机科学, 2018, 45(4): 157 -162 .
[5] 王欢,张云峰,张艳. 一种基于CFDs规则的修复序列快速判定方法[J]. 计算机科学, 2018, 45(3): 311 -316 .
[6] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[7] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[8] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[9] 刘琴. 计算机取证过程中基于约束的数据质量问题研究[J]. 计算机科学, 2018, 45(4): 169 -172 .
[10] 钟菲,杨斌. 基于主成分分析网络的车牌检测方法[J]. 计算机科学, 2018, 45(3): 268 -273 .