On the security defects of an image encryption scheme

Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

165 Citations (Scopus)

Abstract

This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: fenced(Ki mod 128)i = 410, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. © 2009 Elsevier B.V. All rights reserved.
Original languageEnglish
Pages (from-to)1371-1381
JournalImage and Vision Computing
Volume27
Issue number9
DOIs
Publication statusPublished - 3 Aug 2009

Research Keywords

  • Chaos
  • Chosen-plaintext attack
  • Cryptanalysis
  • Image encryption
  • Known-plaintext attack

Fingerprint

Dive into the research topics of 'On the security defects of an image encryption scheme'. Together they form a unique fingerprint.

Cite this