{"title":"一种基于逆二维混沌映射和相关扩散的图像加密方案的密码分析","authors":"K. Panwar, R. Purwar, Anchal Jain","doi":"10.1109/SPIN.2018.8474240","DOIUrl":null,"url":null,"abstract":"With increasing data transmission, image encryption schemes have also developed in recent years. Recently, an image encryption scheme has been proposed to overcome the flaws of fridrich architecture. In this paper, partial cryptanalysis of image encryption scheme has been performed in which combined confusion and diffusion is effectively separated as the crypto-system is independent of plain image. With chosen plain text attack, diffusion keys and permutation sequences can be generated. The encryption scheme is entirely dependent on external secret keys and has been found vulnerable.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Cryptanalysis of an Image Encryption Scheme using Reverse 2-dimensional Chaotic Map and Dependent Diffusion\",\"authors\":\"K. Panwar, R. Purwar, Anchal Jain\",\"doi\":\"10.1109/SPIN.2018.8474240\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With increasing data transmission, image encryption schemes have also developed in recent years. Recently, an image encryption scheme has been proposed to overcome the flaws of fridrich architecture. In this paper, partial cryptanalysis of image encryption scheme has been performed in which combined confusion and diffusion is effectively separated as the crypto-system is independent of plain image. With chosen plain text attack, diffusion keys and permutation sequences can be generated. The encryption scheme is entirely dependent on external secret keys and has been found vulnerable.\",\"PeriodicalId\":184596,\"journal\":{\"name\":\"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPIN.2018.8474240\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPIN.2018.8474240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis of an Image Encryption Scheme using Reverse 2-dimensional Chaotic Map and Dependent Diffusion
With increasing data transmission, image encryption schemes have also developed in recent years. Recently, an image encryption scheme has been proposed to overcome the flaws of fridrich architecture. In this paper, partial cryptanalysis of image encryption scheme has been performed in which combined confusion and diffusion is effectively separated as the crypto-system is independent of plain image. With chosen plain text attack, diffusion keys and permutation sequences can be generated. The encryption scheme is entirely dependent on external secret keys and has been found vulnerable.