首页 | 本学科首页   官方微博 | 高级检索  
     

基于变步长约瑟夫遍历和DNA动态编码的图像加密算法的安全性分析
引用本文:冯伟,张靖,秦振涛,何怡刚.基于变步长约瑟夫遍历和DNA动态编码的图像加密算法的安全性分析[J].电子与信息学报,2022,44(10):3635-3642.
作者姓名:冯伟  张靖  秦振涛  何怡刚
作者单位:1.攀枝花学院数学与计算机学院 攀枝花 6170002.武汉大学电气与自动化学院 武汉 430072
基金项目:国家自然科学基金(51977153, 51637004),教育部科技发展中心项目(2018A0105)
摘    要:近年来,不断有新的图像加密算法被提出,其安全性却未得到充分的分析和验证。该文对一种最新报道的图像加密算法的安全性进行了分析。所分析算法通过基于变步长约瑟夫遍历的像素置乱、基于DNA动态编码的像素替换及像素行列扩散来完成图像加密。分析表明,该算法的秘密密钥设计不具有实用性,加密过程也存在缺陷。在选择明文攻击条件下,对该算法的加密过程进行了密码分析,并提出了相应的攻击算法。仿真实验和理论分析确认了所提攻击算法的有效性与可行性。最后,针对所分析算法及部分图像加密算法中存在的问题,提出了改进建议。

关 键 词:图像加密  安全性  密码分析  选择明文攻击
收稿时间:2021-08-06

Cryptanalysis of Image Encryption Algorithm Based on Variable Step Length Josephus Traversing and DNA Dynamic Encoding
FENG Wei,ZHANG Jing,QIN Zhentao,HE Yigang.Cryptanalysis of Image Encryption Algorithm Based on Variable Step Length Josephus Traversing and DNA Dynamic Encoding[J].Journal of Electronics & Information Technology,2022,44(10):3635-3642.
Authors:FENG Wei  ZHANG Jing  QIN Zhentao  HE Yigang
Affiliation:1.School of Mathematics and Computer Science, Panzhihua University, Panzhihua 617000, China2.School of Electrical Engineering and Automation, Wuhan University, Wuhan 430072, China
Abstract:In recent years, new image encryption algorithms have been continuously proposed, but their security has not been fully analyzed and verified. The security of a newly reported image encryption algorithm is analyzed in this paper. The analyzed algorithm achieves the image encryption through pixel scrambling based on variable step length Josephus traversing, pixel substitution based on DNA dynamic encoding, and pixel diffusion in row and column directions. Analysis shows that the secret key design of this algorithm is not practical, and its encryption process also has defects. Under the condition of chosen-plaintext attack, the encryption process of this algorithm is cryptanalyzed, and a corresponding attack algorithm is proposed. Simulation experiments and theoretical analysis confirm the effectiveness and feasibility of the proposed attack algorithm. Finally, in view of issues in the analyzed algorithm and some image encryption algorithms, several suggestions for improvement are given.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号