Improving security of an image encryption algorithm based on chaotic circular shift

Weihai Li*, Yuan Yuan

*Corresponding author for this work

Research output: Chapter in Book/Published conference outputConference publication

Abstract

An image encryption algorithm based on chaotic circular bit shift is proposed recently. This paper analyses the security of this algorithm and point out that the key space is not as large as they alleged and the algorithm can not resist chosenplaintext attack or difference attack. The amount of chosenplaintexts to carry out an attack is very few. This paper also introduces two methods to improve its security by changing chaotic sequences generators, altering orders of permutation and substitution, and applying feedback link mode. The improved algorithm has variable key space and has very good avalanche effect to resist chosen-plaintext attacks, chosen-ciphertext attacks, or difference attacks. The computation cost of improved algorithm is very low.

Original languageEnglish
Title of host publicationConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
PublisherIEEE
Pages3694-3698
Number of pages5
ISBN (Print)9781424427949
DOIs
Publication statusPublished - 1 Dec 2009
Event2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009 - San Antonio, TX, United Kingdom
Duration: 11 Oct 200914 Oct 2009

Conference

Conference2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
Country/TerritoryUnited Kingdom
CitySan Antonio, TX
Period11/10/0914/10/09

Keywords

  • Attack
  • Chaotic-based encryption
  • Circular bit shift
  • Image encryption
  • Security

Fingerprint

Dive into the research topics of 'Improving security of an image encryption algorithm based on chaotic circular shift'. Together they form a unique fingerprint.

Cite this