eprintid: 714
rev_number: 2
eprint_status: archive
userid: 1
dir: disk0/00/00/07/14
datestamp: 2023-11-09 15:48:51
lastmod: 2023-11-09 15:48:51
status_changed: 2023-11-09 15:23:01
type: article
metadata_visibility: show
creators_name: Li, C.
creators_name: Li, S.
creators_name: Asim, M.
creators_name: Nunez, J.
creators_name: Alvarez, G.
creators_name: Chen, G.
title: On the security defects of an image encryption scheme
ispublished: pub
keywords: Chaos theory; Computational complexity; Keys (for locks); Network security; Visual communication, Chaos; Chosen-plaintext attack; Cryptanalysis; Image encryption; Known-plaintext attack, Cryptography
note: cited By 155
abstract: This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: fenced(Ki mod 128)i = 410, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. © 2009 Elsevier B.V. All rights reserved.
date: 2009
publisher: Elsevier Ltd
official_url: https://www.scopus.com/inward/record.uri?eid=2-s2.0-67349203285&doi=10.1016%2fj.imavis.2008.12.008&partnerID=40&md5=8aab0d2c7a176fa7056f97b70b91e931
id_number: 10.1016/j.imavis.2008.12.008
full_text_status: none
publication: Image and Vision Computing
volume: 27
number: 9
pagerange: 1371-1381
refereed: TRUE
issn: 02628856
citation:   Li, C. and Li, S. and Asim, M. and Nunez, J. and Alvarez, G. and Chen, G.  (2009) On the security defects of an image encryption scheme.  Image and Vision Computing, 27 (9).  pp. 1371-1381.  ISSN 02628856