Analysis of security evaluation methods for chaos-based encryptions.
Over the past years a lot of different chaos-based image encryption algorithms has been proposed. In various experiments and analysis it is shown by the authors, that their encryption algorithm justifies a high security performance. This is for example done by analyzing the statistical behaviors of an encrypted image, the key sensitivity or the key space of the algorithm. There are common ways and methods to do this. Our assertion is, that just passing these tests does not guarantee a strong encryption algorithm or a high security performance. We show this by implementing obviously insecure algorithms and compare the results with well known chaos-based encryption schemes.
This is as easy as
cd /path/to/seth/
make
The executable can be found in
seth/build/
Call Seth like this
./build/seth <flags>
List of available flags
-hhelp-lproduce less output files (only final result)-d <directory>directory of source images-t {<evaluation method>}list of evaluation methods to executed (min. 1)-e {<encryption>}list of encryptions to executed (min. 1)-k <number of keys>number of random generated keys applied on each image (default: 1)
allruns all testsnpcrNPCRuaciUACIgrshgray scale histogramgrsvgray scale histogram valuekesekey sensitivitycprtvcorrelation property test verticalcprthcorrelation property test horizontalcprtdcorrelation property test diagonalseqtssequence test single bitseqtdsequence test double bitentrientropy of imagenistNIST test suite
allruns all encryptionsoriginno encryption (use original image)arnoldArnold cat's mapbakerBaker's mapbaker-subbaker's map in substitution modexor-otp-rc4-msbXOR OTP RC4 in MSB modexor-otp-rc4-pixXOR OTP RC4 in pixel modexor-otp-cstd-msbXOR OTP CSTD in MSB modexor-otp-cstd-pixXOR OTP CSTD in pixel modexor-key-msb-8XOR short-key in MSB mode 8 bit keyxor-key-pix-8XOR short-key in pixel mode 8 bit keyxor-key-msb-32XOR short-key in MSB mode 32 bit keyxor-key-pix-32XOR short-key in pixel mode 32 bit keyxor-key-msb-256XOR short-key in MSB mode 256 bit keyxor-key-pix-256XOR short-key in pixel mode 256 bit keyxor-followers-8XOR followers 8 bit keyxor-followers-32XOR followers 32 bit keyxor-followers-256XOR followers 256 bit key2d-log-map-2562 dimensional logistic chaotic map 256 bit key
Copyright (c) 2016, the Seth Project Authors. All rights reserved. Please see the AUTHORS file for details.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
-
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
-
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.