Current Issue Cover
面向混沌图像加密系统的密文分析方法

常晓琦, 王明合, 游大涛, 武相军(河南大学软件学院, 开封 475000)

摘 要
目的 密文评估方法在衡量和增强混沌图像加密系统的安全性方面发挥着至关重要的作用。现有以密钥空间、密文密钥敏感性、像素个数变化率和统一平均变化强度等为代表的评估方法虽无法保证通过测试的加密系统一定具有非常高的安全性。而以选择明文攻击为代表的分析方法,与前者相比缺乏通用性和一致性,需要针对不同的加密系统设计不同的攻击方案。针对上述问题,本文基于深度学习模型面向混沌图像加密系统提出了一种兼具通用性和有效性的密文评估方法。方法 该方法的核心思路是以降噪自编码器为基础模型,使用编码器分别对图像加密方法中的扩散密文、置乱密文和完整加密密文进行深度表示,然后使用解码器以上述深度表示为输入生成相应的不同明文,最后统计该明文与真实明文间的结构相似度作为度量加密方法抵抗密码学常用攻击手段能力的量化指标。对于一个加密方法来说,不仅其完整加密密文必须完全不可破译,而且其置乱阶段和扩散阶段的密文中也必须有一项是完全不可破译的,否则表明加密方法存在严重的安全缺陷。另外,密文数据集是影响上述方法有效性的关键因素。针对该问题,本文提出了一种相关性密文生成方法,该方法充分利用了明文敏感性密钥的特性,确保了生成的密文和本文评估方法的真实性和有效性。结果 本文以 Arnold 置乱、2D-SCL(2D chaotic map based on thesine map,the chebyshev map and a linear function)加密和基于二维交叉混沌映射的量子加密为例对提出的密文评估方法进行了实验验证,实验中用到的数据集分别是 MNIST(modified national institute of standards and technology database)和 Fashion-MNIST。实验结果显示,本文提出的密文分析模型对上述加密方法及其各个阶段生成的密文图像表现出不同的密文分析能力:对 Arnold 置乱、2D-SCL 扩散和量子 bite 置乱的密文来说,破译图像与真实图像间结构相似性指数(structural similarity,SSIM)的值均大于 0. 6;虽然在其他阶段的密文分析方面的效果较低,但也能破译出部分关键明文信息,呈现出较高的结构相似度。结论 本文提出的密文图像分析方法通过客观的评价指标数据,能够有效地评估加密方法的安全性,为提升混沌图像加密方法的安全性提供了直观有效的量化依据,具有较高的指导意义。
关键词
Cryptanalysis method for chaotic image encryption system

Chang Xiaoqi, Wang Minghe, You Datao, Wu Xiangjun(School of Software, Henan University, Kaifeng 475000, China)

Abstract
Objective Cryptography security analysis methods play a vital role in measuring and enhancing the security of chaotic image encryption systems. The existing ciphertext analysis methods for chaotic image encryption are generally divided into two categories. Although the evaluation methods based on numerical statistics, which are represented by key space analysis, sensitivity analysis of ciphertext to secret key, numbers of pixels change rate, and unified average changing intensity, have excellent versatility and consistency, the security of the test-passed encryption scheme cannot be ensured. While common attack methods in cryptography, which are represented by selective plaintext attack, can intuitively and effectively assess the security of chaotic encryption schemes, they lack versatility and consistency compared with security analysis methods, and different attack schemes need to be designed for different encryption schemes. To address the problem, this paper proposes a cryptanalysis method of chaotic image encryption system that is both versatile and effective based on denoising autoencoder.Method The ciphertext analysis method is improved based on the denoising autoencoder. It uses a cryptographic system with a known specific encryption steps to encrypt the plaintext image dataset and constructs the ciphertext analysis model, which takes the ciphertext image dataset as input and the original image dataset as the target data. The cryptanalysis model uses the encoder to obtain the depth representation of the diffusion ciphertext, scrambling the ciphertext and fully encrypted cipher image generated by the image encryption scheme, which is the structural features of images extracted from ciphertext images, and then uses the decoder to generate the different deciphered plaintext with the above depth representation as input. In this way, a deciphering model for a certain known encryption scheme can be trained, thereby achieving the purpose of ciphertext analysis. The effect of cryptanalysis is measured objectively and comprehensively by proposing three types of evaluation indicators suitable for ciphertext analysis based on peak signal to noise ratio(PSNR) and structural simitarity(SSIM): max PSNR(MPSNR), max SSIM(SSIM), average of PSNR(APSNR), avarage of SSIM(ASSIM), cumulative distribution of PSNR(CDPSNR), and cumulative distribution of SSIM(CDSSIM), which measure the ability of an encryption scheme to resist popular attacks in cryptography by counting the structural similarity between the generated deciphered plaintext and real plaintext. This evaluation indicator, in addition to the subjective perception of human eyes, can visually display the differences between plaintext images and deciphered images by real data and complete the evaluation of the security of encryption schemes. For the one encryption scheme, not only the fully encrypted ciphertext but also one of the ciphertexts in the scrambling stage and the diffusion stage must be completely undecipherable; otherwise, the encryption scheme has serious security flaws. In addition, the ciphertext dataset is a key factor that affects the effectiveness of the above method. A correlation ciphertext generation method that generates three kinds of ciphertext sets——scrambled ciphertext, diffused ciphertext, and encrypted ciphertext—is proposed to address this issue. This generation method makes full use of the characteristics of chaotic image encryption systems and plaintext sensitive keys to ensure the authenticity and effectiveness of the generated ciphertext and the proposed evaluation method. When cryptanalyzing different chaotic image encryption schemes, changing only the generation scheme of ciphertext in each encryption stage based on the encryption algorithm is necessary. Without changing the training stage, testing stage, and model, the cryptanalysis and security evaluation of different chaotic encryption schemes can be completed.Result This paper takes Arnold scrambling, 2D-SCL image encryption scheme, and quantum image encryption scheme based on 2D Sine2-Logistic chaotic map as examples to verify the proposed ciphertext evaluation method. The datasets used in the experiment are MNIST and Fashion-MNIST. Experimental results show that the proposed cryptanalysis model has a different analysis ability for the ciphertexts generated by the above encryption scheme and their various stages. For the ciphertexts of Arnold scrambling, 2D-SCL’s diffusion, and bite scrambling in quantum encryption, the SSIM values between the decrypted images and the real plain-images are all greater than 0.6. The cryptanalysis model can learn low-dimensional structural features, same as the equivalent keys, to restore the ciphertext image. Although the effect of cryptanalysis in other stages is lower, it can also decipher some key plaintext information, showing a high degree of structural similarity. This finding also indicates that, for an encryption scheme, a high plaintext sensitivity of the secret key corresponds to a high security of the chaotic sequence, and a strong plaintext sensitivity of its equivalent key corresponds to a reduced likelihood that it can be cracked.Conclusion The proposed ciphertext image analysis method can evaluate the security of encryption schemes comprehensively and effectively by using objective data as the evaluation index, which provides an intuitive and effective quantitative basis for improving the security of chaotic image encryption methods, and has high guiding significance.
Keywords

订阅号|日报