کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
739405 | 1461642 | 2014 | 4 صفحه PDF | دانلود رایگان |

• The paper investigates the security of block-Cat-map based permutation.
• All the keystreams can be revealed by choosing eight images.
• Only the permutation can be cryptanalyzed by choosing seven special images.
Recently, an image encryption scheme is proposed using block-Cat-map based permutation and chaos based substitution. This paper investigates the security of the scheme. As for different images, the keys keep fixed, so the chaotic keystreams generated by they are also unchanged. Our target is to reveal these chaotic keystreams equivalent to the chaotic keys by using chosen plaintext attack. Security assessment shows that all the keystreams can be revealed by choosing eight images for the situation of only one round encryption. In addition, only the block-Cat-map based permutation can be cryptanalyzed by choosing seven special images.
Journal: Optics & Laser Technology - Volume 56, March 2014, Pages 313–316