eprintid: 714 rev_number: 2 eprint_status: archive userid: 1 dir: disk0/00/00/07/14 datestamp: 2023-11-09 15:48:51 lastmod: 2023-11-09 15:48:51 status_changed: 2023-11-09 15:23:01 type: article metadata_visibility: show creators_name: Li, C. creators_name: Li, S. creators_name: Asim, M. creators_name: Nunez, J. creators_name: Alvarez, G. creators_name: Chen, G. title: On the security defects of an image encryption scheme ispublished: pub keywords: Chaos theory; Computational complexity; Keys (for locks); Network security; Visual communication, Chaos; Chosen-plaintext attack; Cryptanalysis; Image encryption; Known-plaintext attack, Cryptography note: cited By 155 abstract: This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: fenced(Ki mod 128)i = 410, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. © 2009 Elsevier B.V. All rights reserved. date: 2009 publisher: Elsevier Ltd official_url: https://www.scopus.com/inward/record.uri?eid=2-s2.0-67349203285&doi=10.1016%2fj.imavis.2008.12.008&partnerID=40&md5=8aab0d2c7a176fa7056f97b70b91e931 id_number: 10.1016/j.imavis.2008.12.008 full_text_status: none publication: Image and Vision Computing volume: 27 number: 9 pagerange: 1371-1381 refereed: TRUE issn: 02628856 citation: Li, C. and Li, S. and Asim, M. and Nunez, J. and Alvarez, G. and Chen, G. (2009) On the security defects of an image encryption scheme. Image and Vision Computing, 27 (9). pp. 1371-1381. ISSN 02628856