首页 | 本学科首页   官方微博 | 高级检索  
     

对一种混沌图像加密算法的安全分析和改进
引用本文:朱淑芹,王文宏,孙忠贵.对一种混沌图像加密算法的安全分析和改进[J].计算机工程与应用,2019,55(1):115-122.
作者姓名:朱淑芹  王文宏  孙忠贵
作者单位:聊城大学 计算机学院,山东 聊城,2520592;聊城大学 数学与系统科学学院,山东 聊城,252059
基金项目:山东省自然科学基金;山东省自然科学基金;聊城大学自然科学研究项目
摘    要:对一种简单、敏感的超混沌图像加密算法进行了安全分析,发现该算法的安全性表面上依赖于两个随机序列SP]和K](其中SP]的生成与明文图像和序列K]都相关)。但是,实际上原加密系统的安全性只依赖于随机序列K],而随机序列K]的生成只依赖混沌系统的初始值,与待加密的图像无关。因此,运用选择明文攻击的方法破解出了算法中的随机序列K],从而解密出目标明文图像;同时指出原算法不能抵抗主动攻击的缺陷;最后对原算法进行了改进,使其克服了原算法存在的缺陷。理论分析和实验结果验证了该选择明文攻击策略的可行性和改进算法的有效性。

关 键 词:超混沌图像加密  密码分析  选择明文攻击  主动攻击  SHA-256哈希值

Security Analysis and Improvement of Chaotic Image Encryption Algorithm
ZHU Shuqin,WANG Wenhong,SUN Zhonggui.Security Analysis and Improvement of Chaotic Image Encryption Algorithm[J].Computer Engineering and Applications,2019,55(1):115-122.
Authors:ZHU Shuqin  WANG Wenhong  SUN Zhonggui
Affiliation:1.School of Computer Science, Liaocheng University, Liaocheng, Shandong 252059, China 2.School of Mathematics and System Science, Liaocheng University, Liaocheng, Shandong 252059, China
Abstract:Based on the security analysis of a simple and sensitive hyperchaotic image encryption algorithm, it finds that the security of the algorithm relies on two random sequences SP] and K](where the generation of SP] is related to the plaintext image and the sequence K]). However, in fact, the security of the original encryption system only depends on the random sequence K], and the generation of the random sequence K] depends only on the initial value of the chaotic system and is independent of the image to be encrypted. Therefore, by using chosen plaintext attack, the random sequence K] is broken out, thus decrypting the target plaintext image. At the same time, the defect that the original algorithm can not resist the active attack is pointed out. Finally, the original algorithm is improved to overcome the shortcomings of the original algorithm. Theoretical analysis and experimental results verify the feasibility of the chosen plaintext attack strategy and the effectiveness of the improved algorithm.
Keywords:hyperchaotic image encryption  cryptanalysis  chosen plaintext attack  active attack  SHA-256 Hash value  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号