Skip to main navigation Skip to search Skip to main content

Cryptanalysis of an image encryption scheme based on the Hill cipher

Cheng-Qing Li, Dan Zhang, Guan-Rong Chen

Research output: Journal Publications and ReviewsComment/debate

Abstract

This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al., 2006) and reports its following problems: (1) There is a simple necessary and sufficient condition that makes a number of secret keys invalid; (2) It is insensitive to the change of the secret key; (3) It is insensitive to the change of the plain-image; (4) It can be broken with only one known/chosen plaintext; (5) It has some other minor defects. The proposed cryptanalysis discourages any use of the scheme in practice. © 2008 Zhejiang University and Springer-Verlag GmbH.
Original languageEnglish
Pages (from-to)1118-1123
JournalJournal of Zhejiang University: Science A
Volume9
Issue number8
DOIs
Publication statusPublished - Aug 2008

Research Keywords

  • Chosen-plaintext attack
  • Cryptanalysis
  • Encryption
  • Hill cipher
  • Known-plaintext attack

Fingerprint

Dive into the research topics of 'Cryptanalysis of an image encryption scheme based on the Hill cipher'. Together they form a unique fingerprint.

Cite this