Logo

On the security defects of an image encryption scheme

C., Li and S., Li and M., Asim and J., Nunez and G., Alvarez and G., Chen (2009) On the security defects of an image encryption scheme. Image and Vision Computing, 27 (9). pp. 1371-1381. ISSN 2628856

[img] PDF
Restricted to Registered users only

11Kb

Official URL: http://www.scopus.com/inward/record.url?eid=2-s2.0...

Abstract

This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K<sub>10</sub> can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: fenced(K<sub>i</sub> mod 128)<sub>i = 4</sub><sup>10</sup>, which works very well when K<sub>10</sub> is not too large; (4) when K<sub>10</sub> is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. © 2009 Elsevier B.V. All rights reserved.

Item Type:Article
Uncontrolled Keywords:Chaos; Chosen-plaintext attack; Cryptanalysis; Image encryption; Known-plaintext attack; Chaos theory; Computational complexity; Keys (for locks); Network security; Visual communication; Cryptography
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering
Departments / MOR / COE:Departments > Electrical & Electronic Engineering
ID Code:457
Deposited By: Mr Helmi Iskandar Suito
Deposited On:09 Mar 2010 02:00
Last Modified:19 Jan 2017 08:25

Repository Staff Only: item control page

Document Downloads

More statistics for this item...