首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于复合混沌序列的图像加密算法安全分析
引用本文:胡迎春,禹思敏.一种基于复合混沌序列的图像加密算法安全分析[J].计算机应用研究,2021,38(6):1849-1854,1864.
作者姓名:胡迎春  禹思敏
作者单位:广东工业大学 自动化学院,广州510006
基金项目:国家自然科学基金资助项目(61532020,61671161)
摘    要:针对一种基于复合混沌序列的图像加密算法进行了安全分析,该加密算法采用置换—正向扩散—逆向扩散三级加密,由于正向扩散和逆向扩散采用了相同的一维扩散序列,可将正向扩散和逆向扩散两级加密简化为一级扩散加密,进而将置换—正向扩散—逆向扩散三级加密简化为置换—扩散两级加密;此外,该加密算法生成的混沌序列与明文、密文图像无关,可根据选择明文攻击获取其对应的等效扩散密钥和等效置换密钥.理论分析与数值仿真实验结果表明了该分析方法的有效性;针对原加密算法存在的安全漏洞,提出了若干改进建议以提高其安全性能.

关 键 词:图像混沌加密  混沌映射  选择明文攻击  等效密钥
收稿时间:2020/9/28 0:00:00
修稿时间:2021/5/11 0:00:00

Security analysis of compound chaotic sequence-based image encryption algorithm
Huyingchun and Yusimin.Security analysis of compound chaotic sequence-based image encryption algorithm[J].Application Research of Computers,2021,38(6):1849-1854,1864.
Authors:Huyingchun and Yusimin
Affiliation:Guangdong University of Technology,
Abstract:This paper analyzed the security of an image encryption algorithm based on compound chaotic sequence, the proposed algorithm adopted three-level encryption structure of permutation-forward diffusion-reverse diffusion. Due to the forward diffusion and the reverse diffusion used the same one-dimensional diffusion sequence, therefore, this paper simplified the two-level encryption structure of the forward diffusion and reverse diffusion to one-level diffusion encryption structure, further, simplified the three-level encryption structure of permutation-forward diffusion-reverse diffusion to two-level encryption structure of permutation and diffusion. Moreover, the chaotic sequences generated by the encryption algorithm were independent of the plaintext images or ciphertext images, consequently, it could crack the corresponding equivalent diffusion keys and equivalent permutation keys by chosen-plaintext attack. Theoretical analysis and numerical simulation experiment results verify the effectiveness of the analytical method. Finally, this paper proposed some improved suggestions for the original encryption algorithm to promote the security.
Keywords:image chaotic encryption  chaotic mapping  chosen-plaintext attack  equivalent secret keys
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号