Abstract
Recently, a chaotic image encryption algorithm based on the perceptron model was proposed. The present paper analyzes the security of the algorithm and finds that the equivalent secret key can be reconstructed with only one pair of known-plaintext/ciphertext, which is supported by both mathematical proof and experiment results. In addition, two other security defects are also reported.
Similar content being viewed by others
Notes
To make the presentation more concise and complete, some notations in the original paper [23] are modified, and some details of the algorithm are also amended under the condition that its security property is not influenced.
References
Álvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(8), 2129–2151 (2006)
Álvarez, G., Li, S.: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun. Nonlinear Sci. Numer. Simul. 14(11), 3743–3749 (2009)
Atkinson, K.E.: An Introduction to Numerical Analysis. Wiley, New York (1989)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)
Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Trans. Circuits Syst. II 58(2), 110–114 (2011)
Chen, Z., Ip, W.H., Chan, C.Y., Yung, K.L.: Two-level chaos-based video cryptosystem on H.263 codec. Nonlinear Dyn. 62(3), 647–664 (2010)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(6), 1259–1284 (1998)
Guo, D.H.: A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl. Intell. 10(1), 71–84 (1999)
Kerckhoffs, A.: La cryptographie militaire. J. Sci. Mil. 9(1), 5–38 (1883)
Leung, K.C., Li, S.L., Cheng, L.M., Chan, C.K.: A symmetric probabilistic encryption scheme based on CHNN without data expansion. Neural Process. Lett. 24(2), 93–105 (2006)
Li, C., Chen, M.Z.Q., Lo, K.T.: Breaking an image encryption algorithm based on chaos. Int. J. Bifurc. Chaos 21(7), 2067–2076 (2011)
Li, C., Li, S., Álvarez, G., Chen, G., Lo, K.T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1–2), 23–30 (2007)
Li, C., Li, S., Zhang, D., Chen, G.: Cryptanalysis of a chaotic neural network based multimedia encryption scheme. In: Lecture Notes in Computer Science, vol. 3333, pp. 418–425 (2004)
Li, C., Li, S., Zhang, D., Chen, G.: Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher. In: Lecture Notes in Computer Science, vol. 3497, pp. 630–636 (2005)
Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15(10), 3119–3151 (2005)
Lian, S.: A block cipher based on chaotic neural networks. Neurocomputing 72(4–6), 1296–1301 (2009)
Mislovaty, R., Klein, E., Kanter, I., Kinzel, W.: Public channel cryptography by synchronization of neural networks and chaotic maps. Phys. Rev. Lett. 91(11), 110401 (2003)
Rhouma, R., Belghith, S.: Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Phys. Lett. A 372(36), 5790–5794 (2008)
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22rev1a (2010). Available online at http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011)
Solak, E.: Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems. IEEE Trans. Circuits Syst. II, Express Briefs 51(10), 557–560 (2004)
Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)
Zhou, J., Au, O.C.: On the security of chaotic convolutional coder. IEEE Trans. Circuits Syst. I 58(3), 595–606 (2011)
Zhou, T., Liao, X., Chen, Y.: A novel symmetric cryptography based on chaotic signal generator and a clipped neural network. In: Lecture Notes in Computer Science, vol. 3174, pp. 639–644 (2004)
Acknowledgements
This research was supported by the National Natural Science Foundation of China (No. 61100216), Scientific Research Fund of Hunan Provincial Education Department (Nos. 11B124, 2011FJ2011), and Ningbo Natural Science Foundation (No. 2011A610194).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, Y., Li, C., Li, Q. et al. Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69, 1091–1096 (2012). https://doi.org/10.1007/s11071-012-0329-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-012-0329-y