期刊文献+

基于变步长约瑟夫遍历和DNA动态编码的图像加密算法的安全性分析 被引量:6

Cryptanalysis of Image Encryption Algorithm Based on Variable Step Length Josephus Traversing and DNA Dynamic Encoding
在线阅读 下载PDF
导出
摘要 近年来,不断有新的图像加密算法被提出,其安全性却未得到充分的分析和验证。该文对一种最新报道的图像加密算法的安全性进行了分析。所分析算法通过基于变步长约瑟夫遍历的像素置乱、基于DNA动态编码的像素替换及像素行列扩散来完成图像加密。分析表明,该算法的秘密密钥设计不具有实用性,加密过程也存在缺陷。在选择明文攻击条件下,对该算法的加密过程进行了密码分析,并提出了相应的攻击算法。仿真实验和理论分析确认了所提攻击算法的有效性与可行性。最后,针对所分析算法及部分图像加密算法中存在的问题,提出了改进建议。 In recent years,new image encryption algorithms have been continuously proposed,but their security has not been fully analyzed and verified.The security of a newly reported image encryption algorithm is analyzed in this paper.The analyzed algorithm achieves the image encryption through pixel scrambling based on variable step length Josephus traversing,pixel substitution based on DNA dynamic encoding,and pixel diffusion in row and column directions.Analysis shows that the secret key design of this algorithm is not practical,and its encryption process also has defects.Under the condition of chosen-plaintext attack,the encryption process of this algorithm is cryptanalyzed,and a corresponding attack algorithm is proposed.Simulation experiments and theoretical analysis confirm the effectiveness and feasibility of the proposed attack algorithm.Finally,in view of issues in the analyzed algorithm and some image encryption algorithms,several suggestions for improvement are given.
作者 冯伟 张靖 秦振涛 何怡刚 FENG Wei;ZHANG Jing;QIN Zhentao;HE Yigang(School of Mathematics and Computer Science,Panzhihua University,Panzhihua 617000,China;School of Electrical Engineering and Automation,Wuhan University,Wuhan 430072,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2022年第10期3635-3642,共8页 Journal of Electronics & Information Technology
基金 国家自然科学基金(51977153,51637004) 教育部科技发展中心项目(2018A0105)。
关键词 图像加密 安全性 密码分析 选择明文攻击 Image encryption Security Cryptanalysis Chosen-plaintext attack
  • 相关文献

参考文献6

二级参考文献40

  • 1郭建胜,金晨辉.对基于广义猫映射的一个图像加密系统的已知图像攻击[J].通信学报,2005,26(2):131-135. 被引量:29
  • 2STRUKOV D B, SNIDER G S, STEWART D R, et al. Memristor-the missing circuit element[J]. Nature, 2008, 453(5): 80-83.
  • 3CHUA L O. The missing memristor found[J]. IEEE Transactions on Circuit Theory, 1971, 18(5): 507-519.
  • 4VAYNSHTEYN M and LANIS A. Applications of electrochemical elements in systems of artificial intelligence[J] Natural Science, 2013, 11(10): 45-51.
  • 5ELLA G. TiO2-based memristors and ReRAM materials, mechanisms and models[J]. Semiconductor Science and Technology, 2014, 29(10): 104004-104014.
  • 6SHIN S, KIM K, and KANG S M. Memristor applications for.programmable[J]. IEEE Transactions on Nanotechnology, 2011, 10(2): 266-274.
  • 7Ebong I E and Mazumder P. CMOS and memristor-based[J]. Proceedings of the IEEE, 2012, 100(6): 2050-2060.
  • 8LI Zhijun and ZENG Yicheng. Memristor oscillator based on twin-T network[J].Chinese Physics B, 2013, 22(4): 040502-6.
  • 9VENTRA D M, PERSHIN Y V, and CHUA L O. Circuit elements with memory[J]. Proceedings of the IEEE, 2009, 97(10): 1717-1724.
  • 10MUTHUSWAMY B. Implementing memristor based chaotic circuits[J]. International Journal of Bifurcation and Chaos, 2010, 20(8): 1335-1346.

共引文献165

同被引文献42

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部