{"title":"Breaking an image encryption scheme based on chaotic synchronization phenomenon","authors":"Sushmita Singh, Musheer Ahmad, Dhruv Malik","doi":"10.1109/IC3.2016.7880215","DOIUrl":null,"url":null,"abstract":"In recent past, Volos et al proposed an image encryption scheme based on true random bits generator in [Signal Processing 93, 1328–1340, 2013]. The TRBG uses two mutually coupled double scroll chaotic systems that are synchronized via complete chaotic synchronization and inverse π-lag synchronization techniques. The numerical simulations demonstrated the effectiveness of chaotic true random bits generator through FIPS-140-2 randomness test suite. The proposed generator is applied with an aim to secure the digital images by framing an image encryption process based on the effective TRBG. The statistical analyses conform to the required encryption standards and quality. But, Volos et al image encryption scheme inherently holds a number of vulnerabilities that make it possible to break the encryption scheme. This paper proposes the break of the Volos et al image encryption scheme by exploiting these vulnerabilities to evidence that their scheme lacks security. It is practically shown by applying the chosen-plaintext and known-plaintext attacks which successfully recovers the plaintext-image from the encrypted image without knowing the secret key. The idea is to show the ineligibility of the encryption scheme for use in practical image security applications.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Ninth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2016.7880215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In recent past, Volos et al proposed an image encryption scheme based on true random bits generator in [Signal Processing 93, 1328–1340, 2013]. The TRBG uses two mutually coupled double scroll chaotic systems that are synchronized via complete chaotic synchronization and inverse π-lag synchronization techniques. The numerical simulations demonstrated the effectiveness of chaotic true random bits generator through FIPS-140-2 randomness test suite. The proposed generator is applied with an aim to secure the digital images by framing an image encryption process based on the effective TRBG. The statistical analyses conform to the required encryption standards and quality. But, Volos et al image encryption scheme inherently holds a number of vulnerabilities that make it possible to break the encryption scheme. This paper proposes the break of the Volos et al image encryption scheme by exploiting these vulnerabilities to evidence that their scheme lacks security. It is practically shown by applying the chosen-plaintext and known-plaintext attacks which successfully recovers the plaintext-image from the encrypted image without knowing the secret key. The idea is to show the ineligibility of the encryption scheme for use in practical image security applications.