Journal ArticleDOI
Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption
TLDR
It is demonstrated that several statistical tests, commonly used to assess the security of chaos-based encryption schemes, are insufficient metrics for security analysis.Abstract:
Over the past years, an enormous variety of different chaos-based image and video encryption algorithms have been proposed and published. While any algorithm published undergoes some more or less strict experimental security analysis, many of those schemes are being broken in subsequent publications. In this paper, we show that two main motivations for preferring chaos-based image encryption over classical strong cryptographic encryption, namely computational effort and security benefits, are highly questionable. We demonstrate that several statistical tests, commonly used to assess the security of chaos-based encryption schemes, are insufficient metrics for security analysis. We do this experimentally by constructing obviously insecure encryption schemes and demonstrating that they perform well and/or pass several of these tests. In conclusion, these tests can only give a necessary, but by no means a sufficient condition for security. As a consequence of this paper, several security analyses in related work are questionable; further, methodologies for the security assessment for chaos-based encryption schemes need to be entirely reconsidered.read more
Citations
More filters
Journal ArticleDOI
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
TL;DR: IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data, and each security metric is questionable, which undermines the security credibility of IEAIE.
Journal ArticleDOI
When an attacker meets a cipher-image in 2018: A year in review
TL;DR: In this paper, the authors reviewed the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst.
Journal ArticleDOI
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario
Ahmed A. Abd El-Latif,Bassem Abd-El-Atty,Wojciech Mazurczyk,Carol Fung,Salvador E. Venegas-Andraca +4 more
TL;DR: The features of quantum walk are utilized to construct a new S-box method which plays a significant role in block cipher techniques for 5G-IoT technologies and a new robust video encryption mechanism is proposed.
Journal ArticleDOI
A visually secure image encryption scheme based on parallel compressive sensing
TL;DR: A visually secure encryption scheme is designed by using the parallel compressive sensing counter mode and embedding technique and Logistic-Tent system and 3-D Cat map are introduced to construct the measurement matrices and to disturb the order of the embedded information, respectively.
Journal ArticleDOI
DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things
TL;DR: A deep-learning-based image encryption and decryption network (DeepEDN) is proposed to fulfill the process of encrypting and decrypting the medical image and can achieve a high level of security with a good performance in efficiency.
References
More filters
ReportDOI
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
TL;DR: Some criteria for characterizing and selecting appropriate generators and some recommended statistical tests are provided, as a first step in determining whether or not a generator is suitable for a particular cryptographic application.
Journal ArticleDOI
Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Book ChapterDOI
Weaknesses in the Key Scheduling Algorithm of RC4
TL;DR: It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages.
Journal ArticleDOI
Image encryption using chaotic logistic map
TL;DR: The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.
NPCR and UACI Randomness Tests for Image Encryption
TL;DR: The question of whether a given NPCR/UACI score is sufficiently high such that it is not discernible from ideally encrypted images is answered by comparing actual NPCR and UACI scores with corresponding critical values.
Related Papers (5)
Some basic cryptographic requirements for chaos-based cryptosystems
Gonzalo Alvarez,Shujun Li +1 more