Abstract
This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al., 2006) and reports its following problems: (1) There is a simple necessary and sufficient condition that makes a number of secret keys invalid; (2) It is insensitive to the change of the secret key; (3) It is insensitive to the change of the plain-image; (4) It can be broken with only one known/chosen plaintext; (5) It has some other minor defects. The proposed cryptanalysis discourages any use of the scheme in practice. © 2008 Zhejiang University and Springer-Verlag GmbH.
| Original language | English |
|---|---|
| Pages (from-to) | 1118-1123 |
| Journal | Journal of Zhejiang University: Science A |
| Volume | 9 |
| Issue number | 8 |
| DOIs |
|
| Publication status | Published - Aug 2008 |
Research Keywords
- Chosen-plaintext attack
- Cryptanalysis
- Encryption
- Hill cipher
- Known-plaintext attack
Fingerprint
Dive into the research topics of 'Cryptanalysis of an image encryption scheme based on the Hill cipher'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver