Cryptanalysis of an Image Cipher using Multi entropy Measures and the Countermeasures
The use of same keys or equivalent keys should not be occurred in cryptographic communications because a cipher system utilising such keys to secure messages can be attacked even it possesses excellent cryptographic characteristics for extracting intelligible information from encrypted messages. Identification of crypts formed with such keys is an important task of traffic analysis of cryptographic communications to check the applicability of two-messages-on-same-key (TMSK) attack. To avoid its applicability, adequate safeguards are required. In the paper, we cryptanalyze stream encryption based cipher system and propose an intelligent identification methodology using multi-entropy measures and soft decision criteria for identification of encrypted images of same or equivalent keys. Experimental test results show that the crypts formed with same keys can be identified successfully with high precision. We also present the countermeasures against TMSK attack.
Menezes, A.;Vanstone, S. & Van Oorschot, P. Handbook of Applied Cryptography. CRC Press, Boca Raton, 1996.
Katzenbeisser, S. & Petitcolas, F.A.P. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston, 2000. https://doi.org/10.1201/1079/432188.8.131.5201201/30373.5
Ratan, R. & Veni Madhavan, C.E. Steganography based information security. IETE Tech Rev, 2002, 19(4), 213-19. https://doi.org/10.1080/02564602.2002.11417034
Stinson, D.R. Decomposition constructions for secret sharing schemes. IEEE Trans. Inform Theory, 1994, 40(1), 118-25. https://doi.org/10.1109/18.272461
Shamir, A. How to share a secret. Commun ACM, 1979, 22(11), 612-613. https://doi.org/10.1145/359168.359176
Simon, M.; Omura, J.; Scholtz, R. & levitt, B. Spread spectrum communications handbook. McGraw-Hill, New York, 2002.
Klein, A. Stream ciphers. Springer, london, 2013. https://doi.org/10.1007/978-1-4471-5079-4
Rueppel, R.A. Analysis and Design of Stream Ciphers. Springer, Berlin, 1986. https://doi.org/10.1007/978-3-642-82865-2
Barker, E. & Kelsey, J. Recommendation of random number generation using deterministic random bit generators. NIST SP800-90A, 2012. https://doi.org/10.6028/NIST.SP.800-90a
Where otherwise noted, the Articles on this site are licensed under Creative Commons License: CC Attribution-Noncommercial-No Derivative Works 2.5 India