Abstract
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two to succeed an attack. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimental analyses are given to show the performance of the suggested known/chosen-plaintext attacks. The insecurity of RCES is due to its special design, which makes it a typical example of insecure image encryption schemes. A number of lessons are drawn from the reported cryptanalysis of RCES, consequently suggesting some common principles for ensuring a high level of security of an image encryption scheme. © 2007 Elsevier Inc. All rights reserved.
| Original language | English |
|---|---|
| Pages (from-to) | 1130-1143 |
| Journal | Journal of Systems and Software |
| Volume | 81 |
| Issue number | 7 |
| DOIs | |
| Publication status | Published - Jul 2008 |
Research Keywords
- Chaotic cryptography
- Chosen-plaintext attack
- CKBA
- Cryptanalysis
- Image encryption
- Known-plaintext attack
- RCES/RSES
Fingerprint
Dive into the research topics of 'Cryptanalysis of the RCES/RSES image encryption scheme'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver