This paper is published in Volume-3, Issue-3, 2017
Area
Information Security
Author
Ambare Snehal Bharat
Org/Univ
G. H. Raisoni College of Engineering, Ahmednagar, India
Pub. Date
21 June, 2017
Paper ID
V3I3-1583
Publisher
Keywords
Chosen-Plaintext Attack, Cryptanalysis, Image Encryption, Permutation

Citationsacebook

IEEE
Ambare Snehal Bharat. Impact of Attacks on Permutation Only Image Encryption Scheme, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Ambare Snehal Bharat (2017). Impact of Attacks on Permutation Only Image Encryption Scheme. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARIIT.com.

MLA
Ambare Snehal Bharat. "Impact of Attacks on Permutation Only Image Encryption Scheme." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2017). www.IJARIIT.com.

Abstract

Permutation is a commonly used primitive in multi- media (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by splitting and shuffling the part of the image. The literature on the cryptanalysis of image ciphers indicates that permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosen- plaintext attacks. However, previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we re-visited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutation-only image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a making multiple combination of two encrypted image. To the best of our knowledge, for the first time, this paper gives a combination attack that completely determines the correct plaintext elements using a deterministic method. Also, the detection of hacker at adminside with the help of IP detection and blocking system is to be done in this system for future prevention of permutation attack.