Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
Alvarez, G and Li, SJ (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption Communications in Nonlinear Science and Numerical Simulation, 14 (11). pp. 3743-3749.
CNSNS2009.pdf - Accepted version Manuscript
Available under License : See the attached licence file.
This paper describes the security weakness of a recently proposed image encryption algorithm based on a logistic-like new chaotic map. We show that the chaotic map’s distribution is far from ideal, thus making it a bad candidate as a pseudo-random stream generator. As a consequence, the images encrypted with this algorithm are shown to be breakable through different attacks of variable complexity.
|Divisions :||Faculty of Engineering and Physical Sciences > Computing Science|
|Date :||November 2009|
|Identification Number :||10.1016/j.cnsns.2009.02.033|
|Uncontrolled Keywords :||Chaos-based cryptography, Cryptanalysis, Image encryption, Logistic map, LOOK-UP TABLE, EXTERNAL KEY, SECURITY, SCHEME, CRYPTOGRAPHY, SYSTEMS, CIPHER, CRYPTOSYSTEMS, TRANSMISSION, MAPS|
|Related URLs :|
|Additional Information :||NOTICE: this is the author’s version of a work that was accepted for publication in Communications in Nonlinear Science and Numerical Simulation. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Communications in Nonlinear Science and Numerical Simulation, 14 (11), November 2009, DOI 10.1016/j.cnsns.2009.02.033.|
|Depositing User :||Symplectic Elements|
|Date Deposited :||16 May 2012 21:59|
|Last Modified :||23 Sep 2013 19:26|
Actions (login required)
Downloads per month over past year