Deciphering an image cipher based on mixed transformed logistic maps
From MaRDI portal
Publication:5744121
Abstract: Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based on transformed logistic maps and proves that the image cipher can be deciphered efficiently under two different conditions: 1) two pairs of known plain-images and the corresponding cipher-images with computational complexity of ; 2) two pairs of chosen plain-images and the corresponding cipher-images with computational complexity of , where is the number of pixels in the plain-image. In contrast, the required condition in the previous deciphering method is eighty-seven pairs of chosen plain-images and the corresponding cipher-images with computational complexity of . In addition, three other security flaws existing in most Logistic-map-based ciphers are also reported.
Recommendations
- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
- An efficient image encryption scheme based on logistic maps
- An image encryption algorithm based on logistic chaos sequences
- Cryptanalysis and improvement on a cryptosystem based on a chaotic map
- An image encryption algorithm based on chaotic map and matrix decomposition
Cites work
- scientific article; zbMATH DE number 481378 (Why is no real title available?)
- A NOVEL FAST IMAGE ENCRYPTION SCHEME BASED ON 3D CHAOTIC BAKER MAPS
- A symmetric image encryption scheme based on 3D chaotic cat maps
- Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation
- Breaking a novel image encryption scheme based on improved hyperchaotic sequences
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Cryptanalysis of Fridrich's chaotic image encryption
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
Cited in
(10)- Counteracting dynamical degradation of a class of digital chaotic systems via unscented Kalman filter and perturbation
- Finite precision logistic map between computational efficiency and accuracy with encryption applications
- Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials
- Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features
- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
- Generalized smooth transition map between tent and logistic maps
- Beta Chaotic Map Based Image Encryption Using Genetic Algorithm
- Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
- Security analysis of some diffusion mechanisms used in chaotic ciphers
- Counteracting dynamical degradation of digital chaotic Chebyshev map via perturbation
This page was built for publication: Deciphering an image cipher based on mixed transformed logistic maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5744121)