%0 Journal Article %@ 02628856 %A Li, C. %A Li, S. %A Asim, M. %A Nunez, J. %A Alvarez, G. %A Chen, G. %D 2009 %F scholars:714 %I Elsevier Ltd %J Image and Vision Computing %K Chaos theory; Computational complexity; Keys (for locks); Network security; Visual communication, Chaos; Chosen-plaintext attack; Cryptanalysis; Image encryption; Known-plaintext attack, Cryptography %N 9 %P 1371-1381 %R 10.1016/j.imavis.2008.12.008 %T On the security defects of an image encryption scheme %U https://khub.utp.edu.my/scholars/714/ %V 27 %X This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: fenced(Ki mod 128)i = 410, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. © 2009 Elsevier B.V. All rights reserved. %Z cited By 155