Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University,

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Cryptography and Network Security
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
FEAL FEAL 1.
Akelarre 1 Akelarre Akelarre 2 Akelarre  Block cipher  Combines features of 2 strong ciphers o IDEA — “mixed mode” arithmetic o RC5 — keyed rotations.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
ICS 454: Principles of Cryptography
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Lecture 23 Symmetric Encryption
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 2 Data Encryption Algorithms Part I
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CHAOS BASED ENCRYPTION NEIL PARMAR DEPARTMENT OF COMPUTER SCIENCE.
Feistel Cipher Structure
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
PRBG Based on Couple Chaotic Systems & its Applications in Stream- Cipher Cryptography Li Shujun, Mou Xuanqin, Cai Yuanlong School of Electronics & Information.
Figure 1.a AVS China encoder [3] Video Bit stream.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 23 Symmetric Encryption
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Chapter 2 Symmetric Encryption.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
New Efficient Image Encryption Scheme Based on Partial Encryption Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
 Plain Text : The original message (text, image,video,… etc.  Cipher Key : Encryption works by running the data (represented as numbers) through a special.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Homework #1 J. H. Wang Oct. 9, 2012.
Introduction Applications: Pay-TV, Confidential video conferencing,
Chapter3: Block Ciphers and the Data Encryption Standard
Chapter-2 Classical Encryption Techniques.
Chapter 3:Cryptography (16M)
Security through Encryption
ICS 454: Principles of Cryptography
SYMMETRIC ENCRYPTION.
A new chaotic algorithm for image encryption
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Stream Cipher Structure
Presentation transcript:

Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University, Hangzhou, China b City University of Hong Kong, HK, China

3 December 2004PCM 2004, Tokyo, Japan 2 Abstract  This research points out some security problems with a recently-proposed multimedia encryption scheme based on chaotic neural networks [1-5]. –It can be broken in known/chosen-plaintext attacks, with only one known/chosen plain-image. A mask image can be derived as the equivalent key. The secret key itself can be broken with a small complexity. –The security against brute-force attack was over-estimated.

3 December 2004PCM 2004, Tokyo, Japan 3 References 1. Yen, J.C., Guo, J.I.: A chaotic neural network for signal encryption/decryption and its VLSI architecture. In: Proc. 10th VLSI Design/CAD Symposium. (1999) 319– Su, S., Lin, A., Yen, J.C.: Design and realization of a new chaotic neural encryption/decryption network. In: Proc. APCCAS. (2000) 335– Yen, J.C., Guo, J.I.: The design and realization of a chaotic neural signal security system. Pattern Recognition and Image Analysis 12 (2002) 70–79 4. Lian, S., Chen, G., Cheung, A., Wang, Z.: A chaotic-neural-network- based encryption algorithm for JPEG2000 encoded images. In: Proc. ISNN 2004-II. LNCS 3174 (2004) 627– Lian, S., Sun J., Li Z., Wang, Z.: A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network. In: Proc. ICONIP LNCS 3316 (2004)

3 December 2004PCM 2004, Tokyo, Japan 4 The CNN-Based Cipher (1)  Given the chaotic logistic map f(x)=μx(1-x), the secret key is μ and the initial condition x(0).  Generate a secret pseudo-random bit sequence (PRBS) by iterating the logistic map from x(0): {b i }, i=0,…  Use the PRBS to control the 64 weights {w ji = ±1} and the 8 biases {θ i = ±1/2} (i, j=0~7) of a neural network and encrypt the plaintext as follows: Here, d i (n) and d’ i (n) denote the i-th bits of the n-th plain-byte and the n-th cipher-byte, respectively.

3 December 2004PCM 2004, Tokyo, Japan 5 The CNN-Based Cipher (2)  The CNN-based cipher can be simplified to the following form:  So, the CNN-based cipher is actually a simple stream cipher based on a chaotic PRBS.  This cipher was initially proposed in [1-3] for image and video encryption, and then employed in [4,5] for encrypting JPEG2000 images and MPEG-4 videos.

3 December 2004PCM 2004, Tokyo, Japan 6 Brute-Force Attack  The original claims in [1-3]: –the attack complexity is O(2 8M ), when there are M plain bytes for encryption.  Our results in this work: –the attack complexity is only O(2 2L M), when there are M plain bytes for encryption and the finite precision of the system is L; –in [1-3], L=8, which is too small to provide a sufficiently high security level.

3 December 2004PCM 2004, Tokyo, Japan 7 Known/Chosen-Plaintext Attack The requirement: one known/chosen plain signal f and the corresponding cipher signal f’.  Get a mask signal from f and f’: f m = f  f’, which can be used to (partially) decrypt other cipher signals encrypted with the same secret key. –The short cycle of the chaotic PRBS makes it possible to completely recover other cipher signals.  Break the sub-key μ and a chaotic state x(i) from f m. Then, all bytes in any cipher signals can be recovered.

3 December 2004PCM 2004, Tokyo, Japan 8 Known/Chosen-Plaintext Attack – Experiments (1)

3 December 2004PCM 2004, Tokyo, Japan 9 Known/Chosen-Plaintext Attack - Experiments (2)

3 December 2004PCM 2004, Tokyo, Japan 10 Known/Chosen-Plaintext Attack - Experiments (3)