  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/2882</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Concealed Chosen Plaintext Attack on Multiple S-boxes Based Image Encryption</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Electronics and Communications Engineering, Faculty of Engineering, Mansoura University, Mansoura, Egypt</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Ahmed</given_name>
    <surname>Ahmed</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Electronics and Communications Engineering, Faculty of Engineering, Mansoura University, Mansoura, Egypt</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Mohamed G.</given_name>
    <surname>Abdelfattah</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Electronics and Communications Engineering, Faculty of Engineering, Mansoura University, Mansoura, Egypt</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Abeer T.</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">IEEE Senıor Member, Faculty of Artificial Intelligence, Delta University for Science and Technology, Gamasa 35712, Mansoura, Egypt</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ali E.</given_name>
    <surname>Takieldeen</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Chosen plaintext attacks (CPA) pose a significant security risk to encryption algorithms. However, it can be difficult to perform such an attack without direct access to the encryption process. This paper introduces a new cryptoanalysis method that uses hidden CPA to analyze image encryption schemes based on substitution boxes (S-boxes) Unlike traditional CPA methods, the proposed algorithm does not require that they can directly into the encryption process. Instead, a hidden attack vector is embedded in the natural host image to reduce the risk of attack detection. By asking the owner of the encryption algorithm to encrypt this encryption image and provide a cipher image, the input vector can be compared with its encrypted counterpart This can have an effective S-box and break encryption the algorithm, which does not interact directly with the encryption process. Experimental results demonstrate that the proposed method can completely recover cipher images in cascading S-box encryption schemes, regardless of the number of S-boxes used. Additionally, it conceals the CPA vector within the host image imperceptibly, achieving a high PSNR of 49.47 dB, indicating minimal visual distortion. Furthermore, our CPA significantly outperforms existing techniques in speed, recovering a   grayscale image in just 1.2 seconds. This method provides a simple yet effective cryptanalysis tool to evaluate the security of such image encryption schemes against CPAs.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>114</first_page>
   <last_page>124</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.140108</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/2882</resource>
  </doi_data>
 </journal_article>
</journal>
