Cryptanalysis of genetic algorithm-based encryption scheme
- PDF / 959,112 Bytes
- 18 Pages / 439.642 x 666.49 pts Page_size
- 52 Downloads / 249 Views
Cryptanalysis of genetic algorithm-based encryption scheme Kuan-Wai Wong1 Bok-Min Goi1
· Wun-She Yap1 · Denis C.-K. Wong1 · Raphael C.-W. Phan2 ·
Received: 14 June 2019 / Revised: 19 March 2020 / Accepted: 5 June 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Genetic algorithm, a technique inspired by evolutionary biology to mimic the process of natural selection, has been applied in the image encryption due to the confusion and diffusion properties of mutation and crossover processes involved in the genetic algorithm. In this paper, we analyze the security of the image encryption designed based on genetic algorithms. We perform a known plaintext attack on Biswas et al. image encryption scheme designed based on chaotic maps and genetic algorithms. We show that the encryption scheme is not as secure as claimed by Biswas et al. since the proposed attack reduces the claimed 448bit security to 264.28-bit security. The proposed attack and its analysis can be utilized and extended to other image encryption schemes designed based on genetic algorithms. Keywords Chaotic map · Genetic algorithm · Encryption · Known plaintext attack · Pseudorandom bit sequence generator
1 Introduction Due to the rapid advancement of computer technologies and networks, transmission of image data can be conducted over an insecure communication channel easily. The protection on the image data is getting more and more important. Image encryption is one of the best alternatives to increase the data security by turning a plain-image to become unreadable using encryption algorithm. Since images have high redundancy and high correlation between the pixels, therefore the conventional way of text encryption methods such as Data Encryption Standard (DES) [16], Advanced Encryption (AES) [4] and International Data
This research was supported by Universiti Tunku Abdul Rahman (UTAR) under UTAR Research Fund (UTARRF) no. 6200/W60. Kuan-Wai Wong
[email protected] 1
Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Selangor, Malaysia
2
School of IT, Monash University, Selangor, Malaysia
Multimedia Tools and Applications
Encryption Algorithm (IDEA) [15] are no longer suitable for image encryption. In order to overcome these shortcomings, a secure image encryption algorithm must possess confusion and diffusion properties [20]. Confusion can be achieved by disrupting the relationship between cipher-image and the secret key (e.g. substitution) whereas diffusion can lower the redundancy of the plain-image by spreading it over the cipher-image. The most popular encryption structure is confusion-diffusion design that proposed by Fridrich [9]. One of the popular image encryption methods is based on genetic algorithms which was proposed by Holland [12, 13]. This is a method that mimics the natural evolution and selection. Genetic algorithms involve three operations: selection, crossover and mutation. Selection is a process of selecting a portion of the existing population in order to
Data Loading...