Improving security of an image encryption algorithm based on chaotic circular shift

Weihai Li, Yuan Yuan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

An image encryption algorithm based on chaotic circular bit shift is proposed recently. This paper analyses the security of this algorithm and point out that the key space is not as large as they alleged and the algorithm can not resist chosenplaintext attack or difference attack. The amount of chosenplaintexts to carry out an attack is very few. This paper also introduces two methods to improve its security by changing chaotic sequences generators, altering orders of permutation and substitution, and applying feedback link mode. The improved algorithm has variable key space and has very good avalanche effect to resist chosen-plaintext attacks, chosen-ciphertext attacks, or difference attacks. The computation cost of improved algorithm is very low.

Original languageEnglish
Title of host publicationProceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
Pages3694-3698
Number of pages5
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009 - San Antonio, TX, United States
Duration: 11 Oct 200914 Oct 2009

Publication series

NameConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
ISSN (Print)1062-922X

Conference

Conference2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
Country/TerritoryUnited States
CitySan Antonio, TX
Period11/10/0914/10/09

Keywords

  • Attack
  • Chaotic-based encryption
  • Circular bit shift
  • Image encryption
  • Security

Fingerprint

Dive into the research topics of 'Improving security of an image encryption algorithm based on chaotic circular shift'. Together they form a unique fingerprint.

Cite this