scispace - formally typeset
Journal ArticleDOI

Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption

TLDR
It is demonstrated that several statistical tests, commonly used to assess the security of chaos-based encryption schemes, are insufficient metrics for security analysis.
Abstract
Over the past years, an enormous variety of different chaos-based image and video encryption algorithms have been proposed and published. While any algorithm published undergoes some more or less strict experimental security analysis, many of those schemes are being broken in subsequent publications. In this paper, we show that two main motivations for preferring chaos-based image encryption over classical strong cryptographic encryption, namely computational effort and security benefits, are highly questionable. We demonstrate that several statistical tests, commonly used to assess the security of chaos-based encryption schemes, are insufficient metrics for security analysis. We do this experimentally by constructing obviously insecure encryption schemes and demonstrating that they perform well and/or pass several of these tests. In conclusion, these tests can only give a necessary, but by no means a sufficient condition for security. As a consequence of this paper, several security analyses in related work are questionable; further, methodologies for the security assessment for chaos-based encryption schemes need to be entirely reconsidered.

read more

Citations
More filters
Journal ArticleDOI

Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy

TL;DR: IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data, and each security metric is questionable, which undermines the security credibility of IEAIE.
Journal ArticleDOI

When an attacker meets a cipher-image in 2018: A year in review

TL;DR: In this paper, the authors reviewed the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst.
Journal ArticleDOI

Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

TL;DR: The features of quantum walk are utilized to construct a new S-box method which plays a significant role in block cipher techniques for 5G-IoT technologies and a new robust video encryption mechanism is proposed.
Journal ArticleDOI

A visually secure image encryption scheme based on parallel compressive sensing

TL;DR: A visually secure encryption scheme is designed by using the parallel compressive sensing counter mode and embedding technique and Logistic-Tent system and 3-D Cat map are introduced to construct the measurement matrices and to disturb the order of the embedded information, respectively.
Journal ArticleDOI

DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things

TL;DR: A deep-learning-based image encryption and decryption network (DeepEDN) is proposed to fulfill the process of encrypting and decrypting the medical image and can achieve a high level of security with a good performance in efficiency.
References
More filters
ReportDOI

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

TL;DR: Some criteria for characterizing and selecting appropriate generators and some recommended statistical tests are provided, as a first step in determining whether or not a generator is suitable for a particular cryptographic application.
Journal ArticleDOI

Symmetric Ciphers Based on Two-Dimensional Chaotic Maps

TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Book ChapterDOI

Weaknesses in the Key Scheduling Algorithm of RC4

TL;DR: It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages.
Journal ArticleDOI

Image encryption using chaotic logistic map

TL;DR: The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

NPCR and UACI Randomness Tests for Image Encryption

TL;DR: The question of whether a given NPCR/UACI score is sufficiently high such that it is not discernible from ideally encrypted images is answered by comparing actual NPCR and UACI scores with corresponding critical values.
Related Papers (5)