Breaking an image encryption scheme based on Arnold map and Lucas series

  • PDF / 2,309,246 Bytes
  • 23 Pages / 439.37 x 666.142 pts Page_size
  • 26 Downloads / 187 Views

DOWNLOAD

REPORT


Breaking an image encryption scheme based on Arnold map and Lucas series Imad El Hanouti 1

1

& Hakim El Fadili & Khalid Zenkouar

2

Received: 9 September 2019 / Revised: 30 July 2020 / Accepted: 2 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Recently, a novel image encryption based on Arnold scrambling and Lucas series has been proposed in the literature. The scheme design is based on permutation-substitution operations, where Arnold map is used to permute pixels of the image for T rounds, and Lucas sequence is used to mask the image and substitute pixel’s values. The authors of the cryptosystem have already tested their system against several statistical tests to show its robustness from a statistical view. This cryptanalytic paper scrutinizes the security of this cryptosystem in order to evaluate its immunity against conventional attacks. The results and methods adopted in this paper show that besides the statistical tests, we may need a deep cryptanalysis of every newly proposed cryptosystem before possible adoption in real applications. Those security results should be considered in further proposals. Keywords Cryptanalysis . Image encryption . Equivalent keys . Chosen-plaintext attack . Arnold map . Lucas series

1 Introduction 1.1 Motivation and incitement The rapid growth and development of modern telecommunications has pushed the limits of interconnection and information transmission. As a result, so many types of data have become more susceptible to be transmitted over networks without further processing or changing in their structure [16]. Multimedia data is one type of data that is widely exchanged over public

* Imad El Hanouti [email protected]; [email protected]

1

Computer Science and Interdisciplinary Physics Laboratory (LIPI), SMBA University, Fez, Morocco

2

Laboratory of Intelligent Systems and Application (LSIA), FST, SMBA University, Fez, Morocco

Multimedia Tools and Applications

networks and seldom used by the public community [8, 20]. A simple scenario of an eavesdropper spying on the network traffic would perceive the massive amount of confidential information that could be collected about people and organizations. That’s why, in recent years, the security of data generally and multimedia data especially becomes a serious and important concern. Cryptographic protocols are one underlying layer for securing data transmissions over public networks. Cryptography is, no doubt, still the best approach to secure data and protect the confidentiality of people. Modern cryptography is based on the idea of confusion and diffusion depicted by Claud Shanon in 1945 [33]. Confusion refers to making the relationship between the key and the ciphertext as complex as possible while diffusion refers to the property that the redundancy in the statistics of the plaintext is dissipated in the statistics of the ciphertext. Multimedia data and especially image data by its proper intrinsic characteristics such as bulk data, a strong correlat