We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map

Abstract: This paper analyzes security performance of an image encryption algorithm using 2D lag-complex Logistic map (LCLM), which adopts it as a pseudo-random number generator, and uses the sum of all pixel values of the plain-image as its initial value to control the random combination of the basic encryption operations. However, multiple factors make the final pseudo-random sequences controlling the encryption process may be the same for different plain-images. Based on this point, we proposed a chosen-plaintext attack by attacking the six encryption steps with a strategy of divide and conquer. Using the pitfalls of 2D-LCLM, the number of required chosen plain-images is further reduced to $5\cdot\log_2(MN)+95$, where $\mathit{MN}$ is the number of pixels of the plain-image.
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
MSC classes: 94A60
Cite as: arXiv:2208.06774 [cs.CR]
  (or arXiv:2208.06774v1 [cs.CR] for this version)

Submission history

From: Chengqing Li [view email]
[v1] Sun, 14 Aug 2022 04:08:22 GMT (326kb,D)

Link back to: arXiv, form interface, contact.