On the security defects of an image encryption scheme

Li, C. and Li, S. and Asim, M. and Nunez, J. and Alvarez, G. and Chen, G. (2009) On the security defects of an image encryption scheme. Image and Vision Computing, 27 (9). pp. 1371-1381. ISSN 02628856

Full text not available from this repository.
Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: fenced(Ki mod 128)i = 410, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. © 2009 Elsevier B.V. All rights reserved.

Item Type: Article
Additional Information: cited By 155
Uncontrolled Keywords: Chaos theory; Computational complexity; Keys (for locks); Network security; Visual communication, Chaos; Chosen-plaintext attack; Cryptanalysis; Image encryption; Known-plaintext attack, Cryptography
Depositing User: Mr Ahmad Suhairi UTP
Date Deposited: 09 Nov 2023 15:48
Last Modified: 09 Nov 2023 15:48
URI: https://khub.utp.edu.my/scholars/id/eprint/714

Actions (login required)

View Item
View Item