Cryptanalysis of an Image Cipher using Multi entropy Measures and the Countermeasures

Keywords: Cryptography, Cryptanalysis, Fuzzy Classification, Stream cipher, Traffic Analysis, TMSK attack, Multi-entropy measures

Abstract

The use of same keys or equivalent keys should not be occurred in cryptographic communications because a cipher system utilising such keys to secure messages can be attacked even it possesses excellent cryptographic characteristics for extracting intelligible information from encrypted messages. Identification of crypts formed with such keys is an important task of traffic analysis of cryptographic communications to check the applicability of two-messages-on-same-key (TMSK) attack. To avoid its applicability, adequate safeguards are required. In the paper, we cryptanalyze stream encryption based cipher system and propose an intelligent identification methodology using multi-entropy measures and soft decision criteria for identification of encrypted images of same or equivalent keys. Experimental test results show that the crypts formed with same keys can be identified successfully with high precision. We also present the countermeasures against TMSK attack.

References

Menezes, A.;Vanstone, S. & Van Oorschot, P. Handbook of Applied Cryptography. CRC Press, Boca Raton, 1996.

Katzenbeisser, S. & Petitcolas, F.A.P. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston, 2000. https://doi.org/10.1201/1079/43263.28.6.20001201/30373.5

Ratan, R. & Veni Madhavan, C.E. Steganography based information security. IETE Tech Rev, 2002, 19(4), 213-19. https://doi.org/10.1080/02564602.2002.11417034

Stinson, D.R. Decomposition constructions for secret sharing schemes. IEEE Trans. Inform Theory, 1994, 40(1), 118-25. https://doi.org/10.1109/18.272461

Shamir, A. How to share a secret. Commun ACM, 1979, 22(11), 612-613. https://doi.org/10.1145/359168.359176

Simon, M.; Omura, J.; Scholtz, R. & levitt, B. Spread spectrum communications handbook. McGraw-Hill, New York, 2002.

Klein, A. Stream ciphers. Springer, london, 2013. https://doi.org/10.1007/978-1-4471-5079-4

Rueppel, R.A. Analysis and Design of Stream Ciphers. Springer, Berlin, 1986. https://doi.org/10.1007/978-3-642-82865-2

Barker, E. & Kelsey, J. Recommendation of random number generation using deterministic random bit generators. NIST SP800-90A, 2012. https://doi.org/10.6028/NIST.SP.800-90a

Published
2020-07-13
How to Cite
Ratan, R., & Yadav, A. (2020). Cryptanalysis of an Image Cipher using Multi entropy Measures and the Countermeasures. Defence Science Journal, 70(4), 425-439. https://doi.org/10.14429/dsj.70.15467
Section
Computers & Systems Studies