首页 | 本学科首页   官方微博 | 高级检索  
     

针对基于感知器模型的混沌图像加密算法的选择明文攻击
引用本文:朱淑芹,王文宏,李俊青.针对基于感知器模型的混沌图像加密算法的选择明文攻击[J].计算机科学,2018,45(4):178-181, 189.
作者姓名:朱淑芹  王文宏  李俊青
作者单位:聊城大学计算机学院 山东 聊城252059,聊城大学计算机学院 山东 聊城252059,聊城大学计算机学院 山东 聊城252059
基金项目:本文受国家自然科学基金面上项目(61573178),聊城大学校基金(318011606),山东省自然科学基金(ZR2017MEM019)资助
摘    要:对一种基于感知器模型的混沌图像加密算法进行了安全性分析,发现该算法的本质就是根据等效密钥流来改变明文图像像素值的比特位,从而得到密文图像。而等效密钥流与明文图像和对应的密文图像没有任何关系,因此运用选择明文攻击的方法破解出了算法中的等效密钥流,解密出了目标明文图像;同时指出了原算法存在的另外两个安全缺陷;最后对原算法进行了改进,弥补了其缺陷。理论分析和实验结果均证实了所提出的选择明文攻击策略的可行性以及改进算法的有效性。

关 键 词:混沌图像加密  密码分析  等效密钥  选择明文攻击
收稿时间:2017/1/18 0:00:00
修稿时间:2017/3/10 0:00:00

Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model
ZHU Shu-qin,WANG Wen-hong and LI Jun-qing.Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model[J].Computer Science,2018,45(4):178-181, 189.
Authors:ZHU Shu-qin  WANG Wen-hong and LI Jun-qing
Affiliation:School of Computer Science,Liaocheng University,Liaocheng,Shandong 252059,China,School of Computer Science,Liaocheng University,Liaocheng,Shandong 252059,China and School of Computer Science,Liaocheng University,Liaocheng,Shandong 252059,China
Abstract:This paper analyzed the security of a chaotic image encryption algorithm based on preceptron model and found that the essence of the algorithm is to change the value of bits of the plaintext image according to the equivalent key stream to get the cipher image.However,there is no relation between the equivalent key stream and the plain text image or the corresponding cipher text image.By applying chosen plaintext attacks,this paper found that the equivalent key can be cracked,which can be further exploited to decrypt the target plain image.In addition,two other security defects were also reported.Finally,the original algorithm was improved to overcome the shortcomings of the original algorithm.Both mathematical analysis and experimental results show that the feasibility of the proposed chosen plaintext attack strategies and the effectiveness of the improved algorithm are verified.
Keywords:Chaotic image encryption  Cryptanalysis  Equivalent key  Chosen plaintext attack
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号