This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Breaking a Chaotic Cryptographic Scheme Based on Composition Maps

Chengqing Li1, David Arroyo2, and Kwok-Tung Lo1
1 Department of Electronic and Information Engineering,
The Hong Kong Polytechnic University, Hong Kong, China
2Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas,
Serrano 144, 28006 Madrid, Spain
Abstract

Recently, a chaotic cryptographic scheme based on composition maps was proposed. This paper studies the security of the scheme and reports the following findings: 1) the scheme can be broken by a differential attack with 6+logL(MN)6+\lceil\log_{L}(MN)\rceil chosen-plaintext, where MNMN is the size of plaintext and LL is the number of different elements in plain-text; 2) the scheme is not sensitive to the changes of plaintext; 3) the two composition maps do not work well as a secure and efficient random number source.

1 Introduction

The development of information technology makes the transmission of digital data is carried out more and more frequently over all kinds of channels. Meanwhile, the security of digital data become more and more important. So, the demand of secure and fast encryption schemes become urgent. Due to the subtle similarities between cryptography and chaos, a great number of chaotic encryption schemes have been proposed in the past decade YaobinMao:CSF2004 ; Pareek:ImageEncrypt:IVC2006 ; Flores:EncryptLatticeChaos06 ; Tong:ImageCipher:IVC07 ; Wong:ChaosEncrypt:IEEETCASII ; Pareek:CNSNS2009 . However, most of them have been found to be insecure in different extents from the view point of modern cryptography AlvarezLi:Cryptanalysis:PLA2005 ; LiShujun:ReturnMapAttack:IJBC2006 ; Li:AttackDSEA2006 ; Li:AttackHDSP2006 ; Li:AttackingBitshiftXOR2007 ; Li:AttackingRCES2004 ; ArroyoLi:Chaos2008 ; LiLi:IVC2009b ; Li:ProbabilisticEncryption:IJBC03 ; Li:BreakNoiseCommunication:Chaos05 ; Li:BreakYTSCipher:TCASII04 . As for how to evaluate the security of a chaotic cryptographic scheme, please refer to LiShujun:Rules:IJBC2006 .

In general, the usage of chaos in designing encryption scheme can be classified as three categories: 1) generating pseudo-random number sequence, which is then used to determine position permutation; 2) generating pseudo-random bit sequence, which is then used to determine combination and/or composition of some basic encryption operations; 3) generating ciphertext directly when the data of plaintext is assigned as the initial condition or control parameter of a chaotic map. In Akhavan:LNCS06 ; Akhshani:ICIP06 ; Behnia:IJBC08 , the possible application of composition of polynomial chaotic maps in designing encryption scheme was discussed. In this case, two composite polynomial chaotic maps are used to determine the position permutation and composition of basic encryption operations respectively. Since the schemes proposed in Akhavan:LNCS06 ; Akhshani:ICIP06 are preliminary version of the one proposed in Behnia:IJBC08 , this paper only focuses on the security of the latter. With our study, the following security problems are found: 1) the scheme can be broken with a differential attack; 2) the scheme is not sensitive with respect to the changes of plaintext; 3) the randomness of the pseudo-random number sequences generated by the two composition maps is weak.

The rest of this paper is organized as follows. Section 2 describes the chaotic cryptographic scheme briefly. A comprehensive cryptanalysis on the scheme is presented in Sec. 3. The last section concludes this paper.

2 The Encryption Scheme Under Study

In Behnia:IJBC08 , the structure of plaintext is not specified precisely. Without loss of generality, the plaintext here is denoted by a 2-D byte array of size M×NM\times N (height×\timeswidth), 𝐈={I(i,j)}1iM1jN\bm{\mathrm{I}}=\{I(i,j)\}_{1\leq i\leq M\atop 1\leq j\leq N} and the corresponding ciphertext by 𝐈={I(i,j)}1iM1jN\bm{\mathrm{I}}^{\prime}=\{I^{\prime}(i,j)\}_{1\leq i\leq M\atop 1\leq j\leq N}. The plaintext is considered as a 1D signal {I(k)}k=1MN\{I(k)\}_{k=1}^{MN} by scanning it in a raster order. Then, the chaotic cryptographic scheme can be described as follows 111To make the presentation more concise and complete, some notations in the original paper are modified, and some details about the scheme are supplied and/or corrected also..

  • Secret key: three sets of initial condition and control parameter of Eq. (1), (x0,α1,α2)(x_{0},\alpha_{1},\alpha_{2}), (x0,α1,α2)(x_{0}^{\prime},\alpha_{1}^{\prime},\alpha_{2}^{\prime}), (x0,α1,α2)(x_{0}^{*},\alpha_{1}^{*},\alpha_{2}^{*}), one set of initial condition and control parameter of Eq. (2), (y0,α3,α4)(y_{0},\alpha_{3},\alpha_{4}), and a secret number S{0,,255}S\in\{0,\cdots,255\}.

    f(x)=1α22tan2(5arctan(tan(3arctan(x))α1)).f(x)=\frac{1}{{\alpha_{{2}}}^{2}}\tan^{2}\left(5\,\arctan\left({\frac{\tan(3\,\arctan(\sqrt{x}))}{{\alpha_{{1}}}}}\right)\right). (1)
    g(y)=1α42cot2(8arctan(α3tan(4arctan(1y)))).g(y)=\frac{1}{{\alpha_{4}}^{2}}\cot^{2}\left(8\,\arctan\left(\alpha_{3}\tan\left(4\,\arctan\left({\frac{1}{\sqrt{y}}}\right)\right)\right)\right). (2)
  • Initialization:

    • Iterate the map Eq. (1) MNMN times to obtain three states sequences, {ψ1(k)}k=1MN\{\psi_{1}(k)\}_{k=1}^{MN}, {ψ2(k)}k=1MN\{\psi_{2}(k)\}_{k=1}^{MN}, {ψ4(k)}k=1MN\{\psi_{4}(k)\}_{k=1}^{MN}, under the three sets of initial condition and control parameter, (x0,α1,α2)(x_{0},\alpha_{1},\alpha_{2}), (x0,α1,α2)(x_{0}^{\prime},\alpha_{1}^{\prime},\alpha_{2}^{\prime}), (x0,α1,α2)(x_{0}^{*},\alpha_{1}^{*},\alpha_{2}^{*}), respectively;

    • Iterate the map Eq. (2) MNMN times to obtain a states sequence {ψ3(k)}k=1MN\{\psi_{3}(k)\}_{k=1}^{MN} under initial condition and control parameter (y0,α3,α4)(y_{0},\alpha_{3},\alpha_{4});

    • Generate four pseudo-random number sequences, {ϕ1(k)}k=1MN\{\phi_{1}(k)\}_{k=1}^{MN}, {ϕ2(k)}k=1MN\{\phi_{2}(k)\}_{k=1}^{MN}, {ϕ3(k)}k=1MN\{\phi_{3}(k)\}_{k=1}^{MN}, {ϕ4(k)}k=1MN\{\phi_{4}(k)\}_{k=1}^{MN}, as follows: ϕ1(k)=ψ1(k)1014modM\phi_{1}(k)=\lfloor\psi_{1}(k)\cdot 10^{14}\rfloor\bmod M, ϕ2(k)=ψ2(k)1014modN\phi_{2}(k)=\lfloor\psi_{2}(k)\cdot 10^{14}\rfloor\bmod N, ϕ3(k)=ψ3(k)1014mod256\phi_{3}(k)=\lfloor\psi_{3}(k)\cdot 10^{14}\rfloor\bmod 256, and ϕ4(k)=ψ4(k)1014mod256\phi_{4}(k)=\lfloor\psi_{4}(k)\cdot 10^{14}\rfloor\bmod 256.

  • Encryption:

    • Permutation: for k=1MNk=1\sim MN, swap the positions of two bytes I(k)I(k) and I(ϕ1(k)N+ϕ2(k))I(\phi_{1}(k)\cdot N+\phi_{2}(k)). Denote the permuted plaintext with 𝐈={I(i,j)}1iM1jN\bm{\mathrm{I}}^{*}=\{I^{*}(i,j)\}_{1\leq i\leq M\atop 1\leq j\leq N}.

    • Confusion I: for k=1MNk=1\sim MN,

      I(k)=ϕ3(k)(I(k)ϕ3(k))I(k1),I^{\star}(k)=\phi_{3}(k)\oplus(I^{*}(k)\dotplus\phi_{3}(k))\oplus I^{\star}(k-1), (3)

      where I(0)=SI^{\star}(0)=S, and xy=(x+y)mod256x\dotplus y=(x+y)\bmod 256.

    • Confusion II: for k=1MNk=1\sim MN,

      I(k)=I(k)ϕ4(k).I^{\prime}(k)=I^{\star}(k)\oplus\phi_{4}(k). (4)
  • Decryption: The decryption approach is similar to the encryption one except that the main three encryption steps and the swap operations in the permutation step are carried out in a reverse order, and Eq. (3) is replaced by the following function.

    I(k)=((I(k)I(k1)ϕ3(k))ϕ3(k)+256)mod256.I^{*}(k)=((I^{\star}(k)\oplus I^{\star}(k-1)\oplus\phi_{3}(k))-\phi_{3}(k)+256)\bmod 256. (5)

3 Cryptanalysis

3.1 Differential Attack

Differential attack is an attack to recover the information about secret key and/or plaintext by analyzing the evolution of differences when some pairs of plaintexts are encrypted with the same secret key. In [Behnia:IJBC08, , Sec. 5.4], the authors claimed the encryption scheme under study can withstand differential attack effectively. However, we find that the scheme can be broken by this attack easily with the following steps.

  • Breaking Confusion I:

    If two plaintexts, 𝐈1={I1(k)}k=1MN\bm{\mathrm{I}}_{1}=\{I_{1}(k)\}_{k=1}^{MN} and 𝐈2={I2(k)}k=1MN\bm{\mathrm{I}}_{2}=\{I_{2}(k)\}_{k=1}^{MN}, are encrypted by the same secret key, one has the following equality.

    I1(k)I2(k)\displaystyle I^{\prime}_{1}(k)\oplus I^{\prime}_{2}(k) =\displaystyle= I1(k)ϕ4(k)I2(k)ϕ4(k)\displaystyle I_{1}^{\star}(k)\oplus\phi_{4}(k)\oplus I_{2}^{\star}(k)\oplus\phi_{4}(k)
    =\displaystyle= I1(k)I2(k)\displaystyle I^{\star}_{1}(k)\oplus I^{\star}_{2}(k)
    =\displaystyle= ϕ3(k)(I1(k)ϕ3(k))I1(k1)\displaystyle\phi_{3}(k)\oplus(I_{1}^{*}(k)\dotplus\phi_{3}(k))\oplus I^{\star}_{1}(k-1)\oplus
    ϕ3(k)(I2(k)ϕ3(k))I2(k1)\displaystyle\phi_{3}(k)\oplus(I^{*}_{2}(k)\dotplus\phi_{3}(k))\oplus I^{\star}_{2}(k-1)
    =\displaystyle= (I1(k)ϕ3(k))(I2(k)ϕ3(k))(I1(k1)I2(k1))\displaystyle(I_{1}^{*}(k)\dotplus\phi_{3}(k))\oplus(I_{2}^{*}(k)\dotplus\phi_{3}(k))\oplus(I^{\star}_{1}(k-1)\oplus I^{\star}_{2}(k-1))
    =\displaystyle= (I1(k)ϕ3(k))(I2(k)ϕ3(k))(I1(k1)I2(k1))\displaystyle(I_{1}^{*}(k)\dotplus\phi_{3}(k))\oplus(I_{2}^{*}(k)\dotplus\phi_{3}(k))\oplus(I^{\prime}_{1}(k-1)\oplus I^{\prime}_{2}(k-1)) (7)

    Furthermore, if the plaintexts, 𝐈1\bm{\mathrm{I}}_{1} and 𝐈2\bm{\mathrm{I}}_{2}, are chosen of fixed value, one has

    (I1(k)I2(k))(I1(k1)I2(k1))=(I1(k)ϕ3(k))(I2(k)ϕ3(k))(I^{\prime}_{1}(k)\oplus I^{\prime}_{2}(k))\oplus(I^{\prime}_{1}(k-1)\oplus I^{\prime}_{2}(k-1))=(I_{1}(k)\dotplus\phi_{3}(k))\oplus(I_{2}(k)\dotplus\phi_{3}(k)) (8)

    Since the left part of the above equation, I1(k)I_{1}(k) and I2(k)I_{2}(k) are known, Eq. (8) can be simplified as the following equation.

    y=(ax)(bx),y=(a\dotplus x)\oplus(b\dotplus x), (9)

    where a,b,x{0,1,255}.a,b,x\in\{0,1,\cdots 255\}.

    It has been verified by computer that a set {x,x128}\{x,x\oplus 128\} can be determined uniquely with three different sets of (a,b)(a,b), e.g. (9, 127), (1, 52), (33, 65). From Fact 1, one can see that ϕ3(k)\phi_{3}(k) and ϕ3(k)128\phi_{3}(k)\oplus 128 are equivalent with respect to the encryption.

    Fact 1

    a,b\forall\ a,b\in\mathbb{Z}, (a128)b=(ab)128(a\oplus 128)\dotplus b=(a\dotplus b)\oplus 128.

  • Breaking Confusion II:

    After {ϕ3(k)}k=1MN\{\phi_{3}(k)\}_{k=1}^{MN} has been broken, only the step Confusion II is left for a plaintext of fixed value, 𝐈1\bm{\mathrm{I}}_{1}, I1(k)I_{1}^{\star}(k) can be determined. Then, one has

    ϕ4(k)=I1(k)I1(k),\phi_{4}(k)=I_{1}^{\prime}(k)\oplus I_{1}^{\star}(k), (10)

    for k=1MNk=1\sim MN.

  • Breaking Permutation:

    After the steps Confusion I and Confusion II have been broken, only the step permutation is left. As shown in Li:AttackingPOMC2004 , any permutation-only cryptographic scheme can be broken with only O(logL(MN))O\left(\log_{L}(MN)\right) known/chosen plain-texts, where LL is the number of different element in plain-text.

Refer to caption

a)

Refer to caption

b)

Refer to caption

c)

Refer to caption

d)

Refer to caption

e)

Refer to caption

f)

Figure 1: Six chosen plain-images for breaking Confusion I.
Refer to caption

a)

Refer to caption

b)

Refer to caption

c)

Refer to caption

d)

Refer to caption

e)

Refer to caption

f)

Figure 2: The cipher-images of the above six chosen plain-images shown in Fig. 1.
Refer to caption

a)

Refer to caption

b)

Refer to caption

c)

Refer to caption

d)

Refer to caption

e)

Refer to caption

f)

Figure 3: Three chosen plain-images for breaking position permutation and the corresponding cipher-images.
Refer to caption

a)

Refer to caption

b)

Figure 4: The recover of another plain-image encrypted with the same secret key.

To validate performance of the proposed attack, some experiments on some plain-images of size 512×512512\times 512 have been performed. Besides S=33S=33, the same secret key used in [Behnia:IJBC08, , Sec. 3] was adopted: (x0,α1,α2)=(25.687,2.10155,3.569221)(x_{0},\alpha_{1},\alpha_{2})=(25.687,2.10155,3.569221), (x0,α1,α2)=(574.461,1.8874,4.23562)(x_{0}^{\prime},\alpha_{1}^{\prime},\alpha_{2}^{\prime})=(574.461,1.8874,4.23562), (x0,α1,α2)=(814.217217,2.8912,3.89954)(x_{0}^{*},\alpha_{1}^{*},\alpha_{2}^{*})=(814.217217,2.8912,3.89954), (y0,α3,α4)=(79.82,61.522,257.26223)(y_{0},\alpha_{3},\alpha_{4})=(79.82,61.522,257.26223). The step Confusion I can be broken with the six chosen plain-images of fixed values, 9, 127, 1, 52, 33 and 65, as shown in Fig. 1 and the corresponding cipher-images shown in Fig. 2. Then, the plain-image shown in Fig. 1a) and the corresponding cipher-images can break the step Confusion II. Finally, the step Permutation can be broken with log256(512512)=3\lceil\log_{256}(512\cdot 512)\rceil=3 special plain-images shown in Fig. 3. The obtained equivalent secret key was used to decrypt another cipher-image, as shown in Fig. 4a), and the result is shown in Fig. 4b).

3.2 Some Other Security Defects

  • Problems about Secret Key;

    As specified in [LiShujun:Rules:IJBC2006, , Rule 5], the key space of a secure encryption scheme should be precisely specified and avoid non-chaotic regions. However, even with the measure used in Behnia:IJBC08 , a great number of secret key should be excluded from the key space of the encryption scheme under study (see Fig. 5).

    Refer to caption
    Figure 5: The parameters of f(x)f(x) corresponding to positive Lyapunov exponent.
  • Insufficient Randomness of Pseudo-Random Number Sequences {ϕ1(k)}\{\phi_{1}(k)\}, {ϕ2(k)}\{\phi_{2}(k)\}, {ϕ3(k)}\{\phi_{3}(k)\}, and {ϕ4(k)}\{\phi_{4}(k)\}

    To study the dynamic property of the two equations f(x)f(x) and g(x)g(x), we drew the graph of the two equations under a greater of number of random parameters. Due to the similarity, only the graphs of f(x)f(x) and g(x)g(x) with (α1,α2)=(2.10155,3.56922)(\alpha_{1},\alpha_{2})=(2.10155,3.56922), (α3,α4)=(61.522,257.26223)(\alpha_{3},\alpha_{4})=(61.522,257.26223) are shown in Fig. 6. Comparing the graphs of the two functions and y=xy=x, one can assure that the states generated by iterating the two functions will approach zero soon after some iterations.

    Refer to caption

    a) f(x)f(x)

    Refer to caption

    b) g(x)g(x)

    Figure 6: The graph of f(x)f(x) and g(x)g(x).

    To further test the randomness of the sequences generated by the two equations, we adopted the test suite proposed in Rukhin:TestPRNG:NIST . Since the three sequences {ϕ1(k)}\{\phi_{1}(k)\}, {ϕ2(k)}\{\phi_{2}(k)\}, and {ϕ4(k)}\{\phi_{4}(k)\} are determined by the same equation, only the randomness of {ϕ3(k)}\{\phi_{3}(k)\} and {ϕ4(k)}\{\phi_{4}(k)\} was tested. For every sequence, 100 samples of length 512512/8=32768512\cdot 512/8=32768 (the number of bytes used for encryption of a gray-scale plain-image of size 512×512512\times 512) were generated by random secret keys. For each test, the default significance level 0.01 was adopted. The results are shown in Table 1, from which one can see that the two equations both cannot be used as a good random number generator.

    Table 1: The performed tests with respect to a significance level 0.01 and the number of sequences passing each test in 100 randomly generated sequences.
    Name of Test Number of Passed Sequences
    f(x)f(x) g(x)g(x)
    Frequency 6 2
    Block Frequency (m=100m=100) 10 6
    Cumulative Sums-Forward 6 3
    Runs 8 3
    Rank 68 99
    Non-overlapping Template (m=9m=9, B=110001000B=110001000) 76 64
    Serial (m=16m=16) 6 9
    Approximate Entropy (m=10m=10) 8 6
    FFT 65 49
  • Insensitivity with Respect to Changes of Plaintext

    In [Behnia:IJBC08, , Sec.5.4], the importance of sensitivity with respect to changes of plaintext is recognized. However, the encryption scheme under study is actually very far away from the desired property. In cryptography, the most ideal situation about sensitivity is that the change of any single bit of plaintext will make every bit of the corresponding ciphertext change with a probability of one half. Obviously, the encryption scheme under study can not reach the desired state due to the following points.

    • No nonlinear S-box is involved in the whole scheme;

    • Any bit of plaintest only may influence the bits at the above levels in the ciphertext;

    • Any pixel of plaintext does not influence other pixels in the corresponding ciphertext uniformly.

    To demonstrate this defect efficiently, we performed an experiment by changing a bit of the plain-image of size 512×512512\times 512 shown in Fig. 3c). It is found that only the bits of one level are changed. The locations of the changed bits are shown in Fig. 7, where the white dots denote changed locations and black ones denote unchanged ones.

    Refer to caption

    a) 040\sim 4th

    Refer to caption

    b) 5th

    Refer to caption

    c) 6th

    Refer to caption

    c) 7th

    Figure 7: The locations of changed bits of the cipher-image, when the 5-th bit of the pixel at location (256, 256) in the plain-image was changed.

4 Conclusion

In this paper, the security of a chaotic cryptographic scheme based on composition maps has been studied in detail. It is found that the scheme can be broken with 6+logL(MN)6+\lceil\log_{L}(MN)\rceil chosen-plaintext. In addition, the scheme is not sensitive to the changes of plaintext also. Furthermore, the randomness of the pseudo-random number sequences generated by the composition maps is very weak. Due to the insecurity of the scheme under study, it is should not be used in real serious application.

Acknowledgement

Chengqing Li was supported by The Hong Kong Polytechnic University’s Postdoctoral Fellowships Scheme under grant no. G-YX2L. The work of Kowk-Tung Lo was supported by the Research Grant Council of the Hong Kong SAR Government under Project 523206 (PolyU 5232/06E).

References

  • [1] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3d chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.
  • [2] N. Pareek, V. Patidar, and K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006.
  • [3] N. J. Flores-Carmona and M. Carpio-Valadez, “Encryption and decryption of images with chaotic map lattices,” Chaos, vol. 16, no. 3, p. art. no. 033118, 2006.
  • [4] X. Tong and M. Cui, “Image encryption with compound chaotic sequence cipher shifting dynamically,” Image and Vision Computing, vol. 26, no. 6, pp. 843–850, 2008.
  • [5] K.-W. Wong and C.-H. Yuen, “Embedding compression in chaos-based cryptography,” IEEE Transactions on Circuits and Systems II: Express Brief, vol. 55, no. 11, 2008.
  • [6] V. Patidar, N. Pareek, and K. Sud, “A new substitution cdiffusion based image cipher using chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 7, pp. 3056–3075, 2009.
  • [7] G. Álvarez and S. Li, “Breaking an encryption scheme based on chaotic baker map,” Physics Letters A, vol. 352, no. 1-2, pp. 78–82, 2005.
  • [8] S. Li, G. Chen, and G. Álvarez, “Return-map cryptanalysis revisited,” International Journal of Bifurcation and Chaos, vol. 16, no. 5, pp. 1557–1568, 2006.
  • [9] C. Li, S. Li, and D.-C. Lou, “On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA),” Journal of Systems and Software, vol. 79, no. 2, pp. 253–258, 2006.
  • [10] C. Li, S. Li, D. Zhang, and G. Chen, “Cryptanalysis of a data security protection scheme for VoIP,” IEE Proceedings-Vis. Image Signal Process, vol. 153, no. 1, pp. 1–10, 2006.
  • [11] C. Li, S. Li, G. Álvarez, G. Chen, and K.-T. Lo, “Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations,” Physics Letters A, vol. 369, no. 1-2, pp. 23–30, 2007.
  • [12] S. Li, C. Li, G. Chen, and K.-T. Lo, “Cryptanalysis of the RCES/RSES image encryption scheme,” Journal of Systems and Software, vol. 81, no. 7, pp. 1130–1143, 2008.
  • [13] D. Arroyo, R. Rhouma, G. Alvarez, S. Li, and V. Fernandez, “On the security of a new image encryption scheme based on chaotic map lattices,” Chaos, vol. 18, no. 3, p. article 033112, 2008.
  • [14] C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, and G. Chen, “On the security defects of an image encryption scheme,” Image and Vision Computing, vol. 27, no. 9, pp. 1371–1381, 2009.
  • [15] S. Li, X. Mou, B. L. Yang, Z. Ji, and J. Zhang, “Problems with a probabilistic encryption scheme based on chaotic systems,” International Journal of Bifurcation And Chaos, vol. 13, no. 10, pp. 3063–3077, 2003.
  • [16] S. Li, G. Alvarez, G. Chen, and X. Mou, “Breaking a chaos-noise-based secure communication scheme,” Chaos, vol. 15, no. 1, p. article 013703, 2005.
  • [17] S. Li, G. Chen, and X. Mou, “On the security of the yi-tan-siew chaotic cipher,” IEEE Transactions On Circuits And Systems II-Express Briefs, vol. 51, no. 12, pp. 665–669, 2004.
  • [18] G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129–2151, 2006.
  • [19] A. Akhavan, H. Mahmodi, and A. Akhshani, “A new image encryption algorithm based on one-dimensional polynomial chaotic maps,” Lecture Notes in Computer Science, vol. 4263, pp. 963–971, 2006.
  • [20] A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel block cipher based on hierarchy of one-dimensional composition chaotic maps,” in IEEE International Conference on Image Processing, 2006, pp. 1993–1996.
  • [21] S. Behnia, A. Akhshania, A. Akhavanb, and H. Mahmodi, “Chaotic cryptographic scheme based on composition maps,” International Journal of Bifurcation and Chaos, vol. 18, no. 1, pp. 251–261, 2008.
  • [22] S. Li, C. Li, G. Chen, N. G. Bourbakis, and K.-T. Lo, “A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing: Image Communication, vol. 23, no. 3, pp. 212–223, 2008.
  • [23] A. Rukhin and et al., “A statistical test suite for random and pseudorandom number generators for cryptographic applications,” NIST Special Publication 800-22, 2001, available online at http://csrc.nist.gov/groups/ST/toolkit/rng/documentation˙software.html.