Type of Publication: | Journal article |
URI (citable link): | http://nbn-resolving.de/urn:nbn:de:bsz:352-opus-126163 |
Author: | Li, Chengqing; Li, Shujun; Asim, Muhammad; Nunez, Juana; Alvarez, Gonzalo; Chen, Guanrong |
Year of publication: | 2009 |
Published in: | Image and Vision Computing ; 27 (2009), 9. - pp. 1371-1381 |
DOI (citable link): | https://dx.doi.org/10.1016/j.imavis.2008.12.008 |
Summary: |
This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key
|
Subject (DDC): | 004 Computer Science |
Keywords: | cryptanalysis, image encryption, chaos, known-plaintext attack, chosen-plaintext attack |
Link to License: | In Copyright |
Bibliography of Konstanz: | Yes |
LI, Chengqing, Shujun LI, Muhammad ASIM, Juana NUNEZ, Gonzalo ALVAREZ, Guanrong CHEN, 2009. On the security defects of an image encryption scheme. In: Image and Vision Computing. 27(9), pp. 1371-1381. Available under: doi: 10.1016/j.imavis.2008.12.008
@article{Li2009secur-6277, title={On the security defects of an image encryption scheme}, year={2009}, doi={10.1016/j.imavis.2008.12.008}, number={9}, volume={27}, journal={Image and Vision Computing}, pages={1371--1381}, author={Li, Chengqing and Li, Shujun and Asim, Muhammad and Nunez, Juana and Alvarez, Gonzalo and Chen, Guanrong} }
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/rdf/resource/123456789/6277"> <dc:creator>Asim, Muhammad</dc:creator> <dcterms:issued>2009</dcterms:issued> <dc:creator>Nunez, Juana</dc:creator> <dc:language>eng</dc:language> <dc:creator>Alvarez, Gonzalo</dc:creator> <dc:contributor>Li, Chengqing</dc:contributor> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dcterms:available> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/rdf/resource/123456789/36"/> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dc:date> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6277"/> <dc:contributor>Alvarez, Gonzalo</dc:contributor> <dcterms:bibliographicCitation>Publ. in: Image and Vision Computing 27 (2009), 9, pp. 1371 1381</dcterms:bibliographicCitation> <dc:format>application/pdf</dc:format> <dc:creator>Li, Shujun</dc:creator> <dc:contributor>Nunez, Juana</dc:contributor> <dc:rights>terms-of-use</dc:rights> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/rdf/resource/123456789/36"/> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dc:contributor>Li, Shujun</dc:contributor> <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/> <dc:contributor>Asim, Muhammad</dc:contributor> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/rdf/resource/123456789/52"/> <dc:creator>Li, Chengqing</dc:creator> <dcterms:abstract xml:lang="eng">This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key</dcterms:abstract> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/rdf/resource/123456789/52"/> <dc:contributor>Chen, Guanrong</dc:contributor> <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6277/1/IVC2009b.pdf"/> <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6277/1/IVC2009b.pdf"/> <dcterms:title>On the security defects of an image encryption scheme</dcterms:title> <dc:creator>Chen, Guanrong</dc:creator> <foaf:homepage rdf:resource="http://localhost:8080/jspui"/> </rdf:Description> </rdf:RDF>
IVC2009b.pdf | 190 |