# Cryptanalysis of an Image Encryption Algorithm Based on DNA Sequence Operation and Hyper-chaotic System

@article{Xu2017CryptanalysisOA, title={Cryptanalysis of an Image Encryption Algorithm Based on DNA Sequence Operation and Hyper-chaotic System}, author={Ming Xu}, journal={3D Research}, year={2017}, volume={8}, pages={1-9} }

Recently, chaotic image cipher using DNA sequence operation has been studied extensively. However, corresponding cryptanalysis is lacking, which impedes its further development. This paper cryptanalyzes a newly proposed chaotic image cipher based on DNA sequence operation. In this paper, we firstly analyze the security defects of the proposal. Then by applying chosen-plaintext attack, we show that all the secret parameters can be revealed. The effectiveness of the proposed chosen-plaintext…

## 4 Citations

Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules

- Computer ScienceMultimedia Tools and Applications
- 2018

An innovative image encryption scheme named Two-Fold confusion operation is proposed in the block mode where each block of LSB and MSB gets a different DNA rule selected dynamically using Chen's hyper chaotic sequence.

Computational Image Encryption Techniques: A Comprehensive Review

- Computer ScienceMathematical Problems in Engineering
- 2021

A comprehensive review of the existing image encryption approaches, categorized based on different concepts such as chaotic maps, DNA, compressive sensing, and optical image encryption are presented.

A novel approach for physical layer security in future-generation passive optical networks

- Computer Science, PhysicsPhotonic Network Communications
- 2017

The ever increasing growth of users and network capacity makes the security of passive optical networks (PON) an issue of great concern. In this paper, we present a novel work to enhance the physical…

Three-Saddle-Foci Chaotic Behavior of a Modified Jerk Circuit with Chua's Diode

- PhysicsSymmetry
- 2020

This paper investigates the chaotic behavior of a modified jerk circuit with Chua’s diode and proves that all three equilibrium points are of type saddle focus, meaning that the trajectory of (x(t),y(t)) diverges in a spiral form but z(t) converges to the equilibrium point for any initial point.

## References

SHOWING 1-10 OF 11 REFERENCES

Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps

- Computer Science, MathematicsMultimedia Tools and Applications
- 2013

An encryption algorithm which combines a DNA addition and a chaotic map to encrypt a gray scale image is proposed, which is non-invertible, which means that the receiver cannot decrypt the ciphered image even if he posses the secret key.

A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system

- Computer Science
- 2013

Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map

- Computer Science
- 2014

Equivalent mathematical model of the cryptosystem is designed and algebraic analysis is given and reduction of the key space has been reached by finding equivalent keys and a recovering scheme is given with a lower complexity than the actual decryption scheme.

Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map

- Computer Science
- 2014

Image encryption using DNA addition combining with chaotic maps

- Computer ScienceMath. Comput. Model.
- 2010

A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system

- Computer ScienceJ. Syst. Softw.
- 2012

Security analysis on a color image encryption based on DNA encoding and chaos map

- Computer Science, PhysicsComput. Electr. Eng.
- 2015

A RGB image encryption algorithm based on DNA encoding and chaos map

- Computer ScienceComput. Electr. Eng.
- 2012

A Novel Statistical Analysis of Chaotic S-box in Image Encryption

- Computer Science
- 2014

A novel chaotic S-box is proposed by applying affine transformation to study their strengths in order to determine their suitability in image encryption.