Cryptanalysis of Fridrich's chaotic image encryption
dc.authorid | 0000-0002-8448-9987 | |
dc.authorid | 0000-0001-5838-4615 | |
dc.contributor.author | Solak, Ercan | en_US |
dc.contributor.author | Çokal, Cahit | en_US |
dc.contributor.author | Yıldız, Olcay Taner | en_US |
dc.contributor.author | Bıyıkoğlu, Türker | en_US |
dc.date.accessioned | 2015-01-15T23:01:35Z | |
dc.date.available | 2015-01-15T23:01:35Z | |
dc.date.issued | 2010-05 | |
dc.department | Işık Üniversitesi, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
dc.department | Işık University, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Işık Üniversitesi, Fen Edebiyat Fakültesi, Matematik Bölümü | en_US |
dc.department | Işık University, Faculty of Arts and Sciences, Department of Mathematics | en_US |
dc.description.abstract | We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret permutation that is used to shuffle the pixels of a round input. We demonstrate the effectiveness of our attack with examples and simulation results. We also show that our proposed attack can be generalized to other well-known chaotic image encryption algorithms. | en_US |
dc.description.sponsorship | Scientific and Technological Research Council of Turkey (TUBITAK) [106E143]; Turkish Academy of Sciences [TUBA-GEBIP/2009] | en_US |
dc.description.sponsorship | Ercan Solak and Cahit Cokal were supported by The Scientific and Technological Research Council of Turkey (TUBITAK) under Project No. 106E143. Turker Biyikoglu was supported by Turkish Academy of Sciences through Young Scientist Award Program (TUBA-GEBIP/2009). | en_US |
dc.description.version | Publisher's Version | en_US |
dc.identifier.citation | Solak, E., Çokal, C., Yıldız, O. T. & Bıyıkoğlu, T. (2010). Cryptanalysis of Fridrich's chaotic image encryption. International Journal of Bifurcation and Chaos, 20(5), 1405-1413. doi:10.1142/S0218127410026563 | en_US |
dc.identifier.doi | 10.1142/S0218127410026563 | |
dc.identifier.endpage | 1413 | |
dc.identifier.issn | 0218-1274 | |
dc.identifier.issn | 1793-6551 | |
dc.identifier.issue | 5 | |
dc.identifier.scopus | 2-s2.0-77954602172 | |
dc.identifier.scopusquality | Q1 | |
dc.identifier.startpage | 1405 | |
dc.identifier.uri | https://hdl.handle.net/11729/368 | |
dc.identifier.uri | http://dx.doi.org/10.1142/S0218127410026563 | |
dc.identifier.volume | 20 | |
dc.identifier.wos | WOS:000279882400008 | |
dc.identifier.wosquality | Q2 | |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.indekslendigikaynak | Science Citation Index Expanded (SCI-EXPANDED) | en_US |
dc.institutionauthor | Solak, Ercan | en_US |
dc.institutionauthor | Çokal, Cahit | en_US |
dc.institutionauthor | Yıldız, Olcay Taner | en_US |
dc.institutionauthor | Bıyıkoğlu, Türker | en_US |
dc.institutionauthorid | 0000-0002-8448-9987 | |
dc.institutionauthorid | 0000-0001-5838-4615 | |
dc.language.iso | en | en_US |
dc.peerreviewed | Yes | en_US |
dc.publicationstatus | Published | en_US |
dc.publisher | World Scientific Publishing | en_US |
dc.relation.ispartof | International Journal of Bifurcation and Chaos | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Chaos cryptography | en_US |
dc.subject | Chaotic systems | en_US |
dc.subject | Cipher image | en_US |
dc.subject | Ciphers | en_US |
dc.subject | Cryptanalysis | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Cryptosystems | en_US |
dc.subject | Image encryption | en_US |
dc.subject | Maps | en_US |
dc.subject | Scheme | en_US |
dc.subject | Systems | en_US |
dc.title | Cryptanalysis of Fridrich's chaotic image encryption | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication |