{"title":"Cryptanalysis of an Image Encryption Scheme using Reverse 2-dimensional Chaotic Map and Dependent Diffusion","authors":"K. Panwar, R. Purwar, Anchal Jain","doi":"10.1109/SPIN.2018.8474240","DOIUrl":null,"url":null,"abstract":"With increasing data transmission, image encryption schemes have also developed in recent years. Recently, an image encryption scheme has been proposed to overcome the flaws of fridrich architecture. In this paper, partial cryptanalysis of image encryption scheme has been performed in which combined confusion and diffusion is effectively separated as the crypto-system is independent of plain image. With chosen plain text attack, diffusion keys and permutation sequences can be generated. The encryption scheme is entirely dependent on external secret keys and has been found vulnerable.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPIN.2018.8474240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
With increasing data transmission, image encryption schemes have also developed in recent years. Recently, an image encryption scheme has been proposed to overcome the flaws of fridrich architecture. In this paper, partial cryptanalysis of image encryption scheme has been performed in which combined confusion and diffusion is effectively separated as the crypto-system is independent of plain image. With chosen plain text attack, diffusion keys and permutation sequences can be generated. The encryption scheme is entirely dependent on external secret keys and has been found vulnerable.