Paper 2023/1877

Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps

George Teseleanu, IMAR
Abstract

In 2019, Essaid et al. introduced a chaotic map-based encryption scheme for color images. Their approach employs three improved chaotic maps to dynamically generate the key bytes and matrix required by the cryptosystem. It should be noted that these parameters are dependent on the size of the source image. According to the authors, their method offers adequate security (i.e. $279$ bits) for transmitting color images over unsecured channels. However, we show in this paper that this is not the case. Specifically, we present two cryptanalytic attacks that undermine the security of Essaid et al.'s encryption scheme. In the case of the chosen plaintext attack, we require only two chosen plaintexts to completely break the scheme. The second attack is a a chosen ciphertext attack, which requires two chosen ciphertexts and compared to the first one has a rough complexity of $2^{24}$. The attacks are feasible due to the fact that the key bits and matrix generated by the algorithm remain unaltered for distinct plaintext images.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. ICISSP 2024
Keywords
image encryption schemechaos based encryptioncryptanalysis
Contact author(s)
george teseleanu @ yahoo com
History
2023-12-06: approved
2023-12-06: received
See all versions
Short URL
https://ia.cr/2023/1877
License
Creative Commons Attribution-NonCommercial-ShareAlike
CC BY-NC-SA

BibTeX

@misc{cryptoeprint:2023/1877,
      author = {George Teseleanu},
      title = {Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and {1D} Chaotic Maps},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/1877},
      year = {2023},
      url = {https://eprint.iacr.org/2023/1877}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.