z-logo
open-access-imgOpen Access
Cryptanalysis of an Image Cipher using Multi entropy Measures and the Countermeasures
Author(s) -
Ram Ratan,
Arvind Yadav
Publication year - 2020
Publication title -
defence science journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.198
H-Index - 32
eISSN - 0976-464X
pISSN - 0011-748X
DOI - 10.14429/dsj.70.15467
Subject(s) - computer science , cryptography , encryption , cipher , cryptanalysis , computer security , entropy (arrow of time) , stream cipher , identification (biology) , stream cipher attack , block cipher , theoretical computer science , biology , physics , botany , quantum mechanics
The use of same keys or equivalent keys should not be occurred in cryptographic communications because a cipher system utilising such keys to secure messages can be attacked even it possesses excellent cryptographic characteristics for extracting intelligible information from encrypted messages. Identification of crypts formed with such keys is an important task of traffic analysis of cryptographic communications to check the applicability of two-messages-on-same-key (TMSK) attack. To avoid its applicability, adequate safeguards are required. In the paper, we cryptanalyze stream encryption based cipher system and propose an intelligent identification methodology using multi-entropy measures and soft decision criteria for identification of encrypted images of same or equivalent keys. Experimental test results show that the crypts formed with same keys can be identified successfully with high precision. We also present the countermeasures against TMSK attack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom