Paper 2024/1334

Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map

George Teseleanu
Abstract

In 2023, Mfungo et al. presented an image encryption scheme that relies on a series of diffusion techniques and uses a chaotic map to generate three secret keys. Note that two out of three keys are dynamically generated based on the size of the original image, while the remaining key is static. The authors claim that their proposal offers $149$ bits of security. Unfortunately, we found a chosen plaintext attack that requires $2$ oracle queries and has a worse case complexity of $\mathcal O(2^{32})$. If the attacker has access to $1$ encryption oracle query and $1$ decryption oracle query, we can lower the complexity to $\mathcal O(2^{18.58})$. Encrypting an image with Mfungo et al.'s scheme has a worst case complexity of $\mathcal O(2^{33})$. Therefore, both our attacks are faster than encrypting an image. Our attacks are feasible because the dynamic keys remain unchanged for different plaintext images of the same size, and the static key remains the same for all images.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. ICISSP 2024 (Post Publication Paper)
Keywords
image encryption schemechaos based encryptioncryptanalysis
Contact author(s)
george teseleanu @ yahoo com
History
2024-08-30: approved
2024-08-26: received
See all versions
Short URL
https://ia.cr/2024/1334
License
Creative Commons Attribution-NonCommercial-ShareAlike
CC BY-NC-SA

BibTeX

@misc{cryptoeprint:2024/1334,
      author = {George Teseleanu},
      title = {Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1334},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1334}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.