Show simple item record

AuthorAlanazi, Ammar S.
AuthorMunir, Noor
AuthorKhan, Majid
AuthorAsif, Muhammad
AuthorHussain, Iqtadar
Available date2025-02-19T10:47:52Z
Publication Date2021
Publication NameIEEE Access
ResourceScopus
Identifierhttp://dx.doi.org/10.1109/ACCESS.2021.3092512
ISSN21693536
URIhttp://hdl.handle.net/10576/63177
AbstractIn current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an image encryption technique based on multiple chaotic S-box was offered. This encryption method was based on the concept of confusion only produced by the implementation of the S-box. The concept of confusion utilized in the understudy technique can be smashed by using just one chosen-plaintext attack and a chosen-ciphertext attack. This article presents a detailed structure of two types of cryptographic attacks on the diffusion-based encryption scheme. The proposed attacks are successfully performed to retrieve the key with very little execution time by using just one chosen image which indicates the vulnerability of multiple chaotic S-boxes-based cryptosystems. The retrieved data is passed through some statistical analysis such as correlation, histogram, and entropy to check the correctness of recovered data.
SponsorCorresponding author: Ammar S. Alanazi (salanazi@kacst.edu.sa) This work was supported in part by King Abdulaziz City for Science and Technology. This work did not involve human subjects or animals in its research.
Languageen
PublisherInstitute of Electrical and Electronics Engineers Inc.
Subjectchaotic encryption
chosen-plaintext attack
Cryptanalysis
image encryption
shuffling
substitution box
TitleCryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
TypeArticle
Pagination93795-93802
Volume Number9
dc.accessType Open Access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record