Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding

Published: 01 February 2024 Publication History

Abstract

Recently, an image encryption algorithm using Quantum Chaotic Map and DNA Coding (QCMDC-IEA) has been reported. It consists of two main components: pixel-level permutation and DNA domain substitution. To support its ability to withstand various attacks, several security analyses and experimental simulations were presented. However, after careful cryptanalysis, we found that QCMDC-IEA has inherent fatal security problems. Although formally using complex chaos and DNA encoding, the chaos-based sequences used for encryption in QCMDC-IEA are independent of a plain image such that it suffers from the defect of the existence of an equivalent key. Moreover, the lack of confusion and diffusion in DNA domain encryption makes it vulnerable to cryptographic attacks. DNA domain encryption is then essentially a 2-bit data substitution process, so it can be equivalently simplified. On this basis, we propose an attack method to crack QCMDC-IEA, which first obtains an equivalent permutation key by differential cryptanalysis, and then eliminates the DNA domain substitution based on a chosen-plaintext attack using only four special plain images and their corresponding cipher images, and finally recovers the original plain images. Our attack method takes full advantage of the security defects in QCMDC-IEA and achieves complete decipherment with low complexity, thus better revealing its intrinsic security mechanism. To improve the security performance, some security enhancement suggestions are recommended for similar cryptosystems. Both theoretical analysis and experimental simulation results show that the proposed cryptographic attack method is effective and feasible for QCMDC-IEA with low attack complexity. Therefore, the cryptanalysis work in this paper can provide some theoretical hints for improving the security of a class of image encryption algorithms based on DNA coding and chaos.

References

[1]
Bao B., Wang Z., Hua Z., Chen M., Bao H., Regime transition and multi-scroll hyperchaos in a discrete neuron model, Nonlinear Dynamics 111 (14) (2023) 13499–13512.
[2]
Cao C., Cen Z., Feng X., Wang Z., Zhu Y., Straightforward guess and determine analysis based on genetic algorithm, Journal of Systems Science and Complexity 35 (5) (2022) 1988–2003.
[3]
Chai X., Fu J., Gan Z., Lu Y., Zhang Y., Han D., Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission, IEEE Internet of Things Journal 10 (8) (2023) 7380–7392.
[4]
Chai X., Wang Y., Chen X., Gan Z., Zhang Y., TPE-GAN: Thumbnail preserving encryption based on GAN with key, IEEE Signal Processing Letters 29 (2022) 972–976.
[5]
Chen J., Chen L., Zhou Y., Cryptanalysis of a DNA-based image encryption scheme, Information Sciences 520 (2020) 130–141.
[6]
Chen L., Li C., Li C., Security measurement of a medical communication scheme based on chaos and DNA coding, Journal of Visual Communication and Image Representation 83 (2022).
[7]
Chen X., Mou J., Cao Y., Yan H., Jahanshahi H., A chaotic color image encryption scheme based on improved arnold scrambling and dynamic DNA encoding, Multimedia Tools and Applications (2023).
[8]
Ding Y., Liu W., Wang H., Sun K., A new class of discrete modular memristors and application in chaotic systems, The European Physical Journal Plus 138 (7) (2023).
[9]
Feng W., Qin Z., Zhang J., Ahmad M., Cryptanalysis and improvement of the image encryption scheme based on feistel network and dynamic DNA encoding, IEEE Access 9 (2021) 145459–145470.
[10]
Gao Z., Wu Q., Liao L., Su B., Gao X., Fu S., Li Z., Wang Y., Qin Y., Experimental demonstration of synchronous privacy enhanced chaotic temporal phase en/decryption for high speed secure optical communication, Optics Express 30 (17) (2022) 31209.
[11]
Hu M., Li J., Di X., Quantum image encryption scheme based on 2D S i n e 2 - logistic chaotic map, Nonlinear Dynamics 111 (3) (2022) 2815–2839.
[12]
Hua Z., Liu X., Zheng Y., Yi S., Zhang Y., Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing, IEEE Transactions on Circuits and Systems for Video Technology (2023) 1.
[13]
Jiang Z., Ding Q., Second-order side-channel analysis based on orthogonal transform nonlinear regression, Entropy 25 (3) (2023) 505.
[14]
Jiang N., Zhao A., Liu S., Zhang Y., Peng J., Qiu K., Injection-locking chaos synchronization and communication in closed-loop semiconductor lasers subject to phase-conjugate feedback, Optics Express 28 (7) (2020) 9477.
[15]
Kerckhoffs A., La cryptographie militaire, Journal des Sciences Militaires 9 (4) (1883) 5–38.
[16]
Lai Q., Hu G., Erkan U.g., Toktas A., A novel pixel-split image encryption scheme based on 2D salomon map, Expert Systems with Applications 213 (2023).
[17]
Lai Q., Zhang H., Kuate P.D.K., Xu G., Zhao X.-W., Analysis and implementation of no-equilibrium chaotic system with application in image encryption, Applied Intelligence 52 (10) (2022) 11448–11471.
[18]
Li M., Wang P., Yue Y., Liu Y., Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross–chaotic map, Journal of Real-Time Image Processing 18 (6) (2021) 2135–2149.
[19]
Li H., Yu S., Feng W., Chen Y., Zhang J., Qin Z., Zhu Z., Wozniak M., Exploiting dynamic vector-level operations and a 2D-enhanced logistic modular map for efficient chaotic image encryption, Entropy 25 (8) (2023) 1147.
[20]
Liang X., Zhang C., Luo Y., Wang X., Qiu K., Secure encryption and key management for OFDM-PON based on chaotic Hilbert motion, Journal of Lightwave Technology 41 (6) (2023) 1619–1625.
[21]
Liu S., Li C., Hu Q., Cryptanalyzing two image encryption algorithms based on a first-order time-delay system, IEEE MultiMedia 29 (1) (2022) 74–84.
[22]
Liu W., Sun K., He S., Wang H., The parallel chaotification map and its application, IEEE Transactions on Circuits and Systems. I. Regular Papers (2023) 1–10.
[23]
Liu X., Sun K., Wang H., He S., A class of novel discrete memristive chaotic map, Chaos, Solitons & Fractals 174 (2023).
[24]
Lu D., Li M., Liao Y., Tao G., Cai H., Verifiable privacy-preserving queries on multi-source dynamic DNA datasets, IEEE Transactions on Cloud Computing 11 (2) (2023) 1927–1939.
[25]
Lu X., Xie E.Y., Li C., Periodicity analysis of the logistic map over ring Z3n, International Journal of Bifurcation and Chaos 33 (5) (2023),.
[26]
Luo Y., Zhang C., Wang X., Liang X., Qiu K., Robust key update with controllable accuracy using support vector machine for secure OFDMA-PON, Journal of Lightwave Technology 41 (14) (2023) 4663–4671.
[27]
Ma Y., Li C., Ou B., Cryptanalysis of an image block encryption algorithm based on chaotic maps, Journal of Information Security and Applications 54 (2020).
[28]
Man Z., Li J., Di X., Sheng Y., Liu Z., Double image encryption algorithm based on neural network and chaos, Chaos, Solitons & Fractals 152 (2021).
[29]
Man Z., Li J., Di X., Zhang R., Li X., Sun X., Research on cloud data encryption algorithm based on bidirectional activation neural network, Information Sciences 622 (2023) 629–651.
[30]
Su Y., Wang X., Xu M., Zou C., Liu H., A three-dimensional (3D) space permutation and diffusion technique for chaotic image encryption using merkel tree and DNA code, Sensing and Imaging 24 (1) (2023).
[31]
Tang Z., Chai X., Lu Y., Wang B., Tan Y., An end-to-end screen shooting resilient blind watermarking scheme for medical images, Journal of Information Security and Applications 76 (2023).
[32]
Teng L., Wang X., Yang F., Xian Y., Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion, Nonlinear Dynamics 105 (2) (2021) 1859–1876.
[33]
Wang X., Zhao M., An image encryption algorithm based on hyperchaotic system and DNA coding, Optics and Laser Technology 143 (2021).
[34]
Wen H., Chen R., Yang J., Zheng T., Wu J., Lin W., Jian H., Lin Y., Ma L., Liu Z., Zhang C., Security analysis of a color image encryption based on bit-level and chaotic map, Multimedia Tools and Applications (2023).
[35]
Wen H., Chen Z., Zheng J., Huang Y., Li S., Ma L., Lin Y., Liu Z., Li R., Liu L., Lin W., Yang J., Zhang C., Yang H., Design and embedded implementation of secure image encryption scheme using DWT and 2D-LASM, Entropy 24 (10) (2022) 1332.
[36]
Wen H., Huang Y., Lin Y., High-quality color image compression-encryption using chaos and block permutation, Journal of King Saud University - Computer and Information Sciences 35 (8) (2023).
[37]
Wen H., Kang S., Wu Z., Lin Y., Huang Y., Dynamic RNA coding color image cipher based on chain feedback structure, Mathematics 11 (14) (2023) 3133.
[38]
Wen H., Lin Y., Cryptanalyzing an image cipher using multiple chaos and DNA operations, Journal of King Saud University - Computer and Information Sciences 35 (7) (2023).
[39]
Wen H., Liu Z., Lai H., Zhang C., Liu L., Yang J., Lin Y., Li Y., Liao Y., Ma L., Chen Z., Li R., Secure DNA-coding image optical communication using non-degenerate hyperchaos and dynamic secret-key, Mathematics 10 (17) (2022) 3180.
[40]
Wen H., Wu J., Ma L., Liu Z., Lin Y., Zhou L., Jian H., Lin W., Liu L., Zheng T., Zhang C., Secure optical image communication using double random transformation and memristive chaos, IEEE Photonics Journal 15 (1) (2023) 1–11.
[41]
Wu T., Zeng W., Liu Y., Song S., Zhao L., Chen C., Zhang C., Guo L., Secure turbulence-resistant coherent free-space optical communications via chaotic region-optimized probabilistic constellation shaping, Optics Letters 48 (3) (2023) 684–687.
[42]
Ye G., Liu M., Yap W.-S., Goi B.-M., Reversible image hiding algorithm based on compressive sensing and deep learning, Nonlinear Dynamics 111 (14) (2023) 13535–13560.
[43]
Zhang Y.-Q., Huang H.-F., Wang X.-Y., Huang X.-H., A secure image encryption scheme based on genetic mutation and MLNCML chaotic system, Multimedia Tools and Applications 80 (13) (2021) 19291–19305.
[44]
Zhang J., Huo D., Image encryption algorithm based on quantum chaotic map and DNA coding, Multimedia Tools and Applications 78 (11) (2019) 15605–15621.
[45]
Zhang Y., Zhou W., Zhao R., Zhang X., Cao X., F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption, IEEE Transactions on Multimedia (2022) 1–15.
[46]
Zhou S., Qiu Y., Wang X., Zhang Y., Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic S-box, Nonlinear Dynamics 111 (10) (2023) 9571–9589.
[47]
Zhou S., Wang X., Zhang Y., Novel image encryption scheme based on chaotic signals with finite-precision error, Information Sciences 621 (2023) 782–798.
[48]
Zou C., Wang X., Zhou C., Xu S., Huang C., A novel image encryption algorithm based on DNA strand exchange and diffusion, Applied Mathematics and Computation 430 (2022).

Cited By

View all
  • (2024)Alternative method to reveal encoded images via Gaussian distribution functionsIntegration, the VLSI Journal10.1016/j.vlsi.2024.10216696:COnline publication date: 1-May-2024
  • (2024)Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functionsExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.123583249:PBOnline publication date: 1-Sep-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal  Volume 237, Issue PB
Mar 2024
1582 pages

Publisher

Pergamon Press, Inc.

United States

Publication History

Published: 01 February 2024

Author Tags

  1. Image encryption
  2. Quantum chaotic map
  3. Chaotic encryption
  4. Cryptanalysis
  5. DNA coding

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Alternative method to reveal encoded images via Gaussian distribution functionsIntegration, the VLSI Journal10.1016/j.vlsi.2024.10216696:COnline publication date: 1-May-2024
  • (2024)Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functionsExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.123583249:PBOnline publication date: 1-Sep-2024

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media