51 Hits in 4.5 sec

Cryptanalyzing two image encryption algorithms based on a first-order time-delay system

Sheng Liu, Chengqing Li, Qiao Hu
2021 IEEE Multimedia  
Li et al. proposed in-depth security analysis on an image encryption algorithm based on a first-order time-delay system (IEATD) and gave a specific chosen-plaintext attack on it.  ...  ; 2) the equivalent secret key of IEATD can be efficiently recovered from one known plain-image and the corresponding cipher-image; 3) IEACD can still be efficiently cracked with a chosen-plaintext attack  ...  In [4] , an image encryption algorithm based on a time-delay Ikeda system (IEATD) was proposed.  ... 
doi:10.1109/mmul.2021.3114589 fatcat:dwckzjma2vfipoawywky3l4554

AI Makes Crypto Evolve

Behrouz Zolfaghari, Takeshi Koshiba
2022 Applied System Innovation  
While it is pertinent to investigate this dichotomy from both sides, the first side has already been studied. In this review, we focused on AIIC.  ...  The recent literature reveals a dichotomy formed by a coevolution between cryptography and Artificial Intelligence (AI).  ...  The model relies on leakage delays and time varying delays; it is used to develop a color image encryption algorithm.  ... 
doi:10.3390/asi5040075 fatcat:dmn2j73gc5cehnjdkimf3xpx6m

Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy

Chengqing Li, Dongdong Lin, Bingbing Feng, Jinhu Lu, Feng Hao
2018 IEEE Access  
Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed.  ...  Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g. the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information  ...  CONCLUSION This paper analyzed the security of a chaotic image encryption algorithm based on information entropy, IEAIE.  ... 
doi:10.1109/access.2018.2883690 fatcat:d532x4igfraipladodq5ksxcnm

An improved chaotic cryptosystem based on circular bit shift and XOR operations

Shu-Jiang Xu, Xiu-Bo Chen, Ru Zhang, Yi-Xian Yang, Yu-Cui Guo
2012 Physics Letters A  
A type of chaotic encryption scheme by combining circular bit shift with XOR operations was proposed in 2006 based on iterating chaotic maps.  ...  To strengthen the performance of the focused type of scheme, a new improved scheme based on Chen's chaotic system is proposed in this Letter.  ...  Among these algorithms, the chaos-based cryptography has given a new and efficient way to develop fast and secure image encryption algorithms.  ... 
doi:10.1016/j.physleta.2012.01.040 fatcat:5iljmdkblfbrphnrmsxzi7xrlm

Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography

Chengqing Li, Dongdong Lin, Jinhu Lu, Feng Hao
2018 IEEE Multimedia  
We find it is vulnerable to the known plaintext attack: based on one pair of a known plain-image and its corresponding cipher-image, an adversary is able to derive a mask image, which can be used as an  ...  The Ye-Huang algorithm uses electrocardiography (ECG) signals to generate the initial key for a chaotic system and applies an autoblocking method to divide a plain image into blocks of certain sizes suitable  ...  Image encryption algorithm based on autoblocking and electrocardiography (IEAE) The encryption object of IEAE is a gray-scale image of size M × N, denoted by I = {I i, j } M,N i=1, j=1 .  ... 
doi:10.1109/mmul.2018.2873472 fatcat:ruadvdqaazgx3aho7weklk67fu

Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques

Nikos Sklavos, Alexandros Papakonstantinou, Spyros Theoharis, Odysseas Koufopavlou
2002 VLSI design (Print)  
With a system clock of up to 8 MHz and a power supply of 5 V the two chips were tested and evaluated comparing with the software implementation of the IDEA algorithm.  ...  In order to evaluate the asynchronous design a synchronous version of the algorithm was also designed. VHDL hardware description language was used in order to describe the algorithm.  ...  In general terms, there are two types of key-based encryption algorithms: Symmetric and public key ones.  ... 
doi:10.1080/1065514021000012066 fatcat:vzs6b6d27vf7vgp3qxnrpfrati


2001 Microelectronics, Microsystems and Nanotechnology  
With a system clock of up to 8 MHz and a power supply of 5 V the two chips were tested and evaluated comparing with the software implementation of the IDEA algorithm.  ...  In order to evaluate the asynchronous design a synchronous version of the algorithm was also designed. VHDL hardware description language was used in order to describe the algorithm.  ...  In general terms, there are two types of key-based encryption algorithms: Symmetric and public key ones.  ... 
doi:10.1142/9789812810861_0072 fatcat:wt2anloou5ga7nhiy26i3ie4au

The Dichotomy of Neural Networks and Cryptography: War and Peace

Behrouz Zolfaghari, Takeshi Koshiba
2022 Applied System Innovation  
This side of the dichotomy can be interpreted as a war declared by neural networks. On the other hand, neural networks and cryptographic algorithms can mutually support each other.  ...  Neural networks can be used against cryptosystems; they can play roles in cryptanalysis and attacks against encryption algorithms and encrypted data.  ...  Hsiao et al. proposed a different system, training a NN to analyze the output of multiple time-delay chaotic system in order to approximate its output and synchronize a second multiple time-delay chaotic  ... 
doi:10.3390/asi5040061 fatcat:6p5evyj7h5dvfckt6qzmqbzipi

Universal chosen-ciphertext attack for a family of image encryption schemes [article]

Junxin Chen, Lei Chen, Yicong Zhou
2019 arXiv   pre-print
During the past decades, there is a great popularity employing nonlinear dynamics and permutation-substitution architecture for image encryption.  ...  There are three primary procedures in such encryption schemes, the key schedule module for producing encryption factors, permutation for image scrambling and substitution for pixel modification.  ...  The cipher employing a first-order time-delay system was recently broken by Li [34] through chosenplaintext attack, and Wang cryptanalyzed two bit-level encryption schemes developed in [32] , [33]  ... 
arXiv:1903.11987v1 fatcat:3uepf4snirgg3plrpksjxvltae

A Probabilistic Chaotic Image Encryption Scheme

Ali Kanso, Mohammad Ghebleh, Mazen Bou Khuzam
2022 Mathematics  
This paper proposes a probabilistic image encryption scheme that improves on existing deterministic schemes by using a chaining mode of chaotic maps in a permutation-masking process.  ...  These random numbers ensure the generation of distinct cipher images for the same plain image encryption, even if it is encrypted multiple times with the same key, thereby adding some security features  ...  In [7], an image encryption scheme based on spatiotemporal chaotic systems is proposed to overcome drawbacks that exist in some schemes based on 1-dimensional chaotic systems.  ... 
doi:10.3390/math10111910 fatcat:stuocfk75bfsxguxetu6yimiie

Synchronization of Chaotic System Using a Brain-Imitated Neural Network Controller and Its Applications for Secure Communications

Chih-Min Lin, Duc-Hung Pham, Tuan-Tu Huynh
2021 IEEE Access  
In the first application, a new image encryption algorithm is proposed to enhance security for information transmission, then several standard images are applied for the chaotic synchronization of image  ...  The 3-dimensional (3D) Genesio chaotic system is used for audio and image secure communication systems to show the potency and performance of the proposed algorithm.  ...  However, several encryption algorithms can be cryptanalyzed because of weaknesses in terms of security such as a 1D logistic map-based color image encryption method using the low dimensional logistic map  ... 
doi:10.1109/access.2021.3080696 fatcat:ypu5sh6wt5d5rafdtmp3omifgm

A Color Image Encryption Scheme combining Hyperchaos and Genetic Codes

Hira Nazir, Imran Sarwar Bajwa, Saima Abdullah, Rafaqut Kazmi, Muhammad Sami ullah
2022 IEEE Access  
A highly secured encryption was proposed by [44] , which combines two chaotic systems and four cryptographic phases namely diffusion based on XOR, substitution based on Sboxes, diffusion based on a chaotic  ...  The values of initial conditions and control parameters for discrete time chaotic systems are based on optimization algorithms.  ... 
doi:10.1109/access.2022.3143096 fatcat:2z2uwkalf5hwpdx36hnjirq4kq

A Fractal Based Image Cipher Using Knuth Shuffle Method and Dynamic Diffusion

Shafali Agarwal
2019 International Journal of Computer Networks & Communications  
This paper proposes a fractal-based image encryption algorithm which follows permutation-substitution structure to maintain confusion and diffusion properties.  ...  In the permutation phase, the Knuth shuffle method is applied to a noisy plain image to change the index value of each pixel.  ...  The system has two major phases, i.e. secret key generation to encrypt/decrypt the data/image/audio/video and the other is the encryption/decryption process.  ... 
doi:10.5121/ijcnc.2019.11405 fatcat:zailn6jl4vbw3jdhtw7duwiiau

On the security of the Yen–Guo's domino signal encryption algorithm (DSEA)

Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
2006 Journal of Systems and Software  
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos.  ...  recovered from a number of continuous bytes of only one known/chosen plaintext and the corresponding ciphertext.  ...  The present paper gives the cryptanalysis results on a new Yen-Guo encryption scheme called DSEA (Yen and Guo, 2003) , which has not been cryptanalyzed before.  ... 
doi:10.1016/j.jss.2005.04.021 fatcat:3kmtybk7nner5jc4in7lkojzk4

A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy

Chong Fu, Jun-Bin Huang, Ning-Ning Wang, Qi-Bin Hou, Wei-Min Lei
2014 Entropy  
In this paper, a symmetric chaosbased image cipher with a 3D cat map-based spatial bit-level permutation strategy is proposed.  ...  Abstract:Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results.  ...  In 1998, Fridrich [1] and Scharinger [2] proposed the first two chaos-based image encryption schemes with confusion-diffusion (or permutation-substitution) architecture, which are two essential properties  ... 
doi:10.3390/e16020770 fatcat:5aosprxq2jf7fhrovv3rp3b4mi
« Previous Showing results 1 — 15 out of 51 results