Publikation:

On the security defects of an image encryption scheme

Lade...
Vorschaubild

Dateien

IVC2009b.pdf
IVC2009b.pdfGröße: 3.46 MBDownloads: 332

Datum

2009

Autor:innen

Li, Chengqing
Asim, Muhammad
Nunez, Juana
Alvarez, Gonzalo
Chen, Guanrong

Herausgeber:innen

Kontakt

ISSN der Zeitschrift

Electronic ISSN

ISBN

Bibliografische Daten

Verlag

Schriftenreihe

Auflagebezeichnung

ArXiv-ID

Internationale Patentnummer

Angaben zur Forschungsförderung

Projekt

Open Access-Veröffentlichung
Open Access Green
Core Facility der Universität Konstanz

Gesperrt bis

Titel in einer weiteren Sprache

Publikationstyp
Zeitschriftenartikel
Publikationsstatus
Published

Erschienen in

Image and Vision Computing. 2009, 27(9), pp. 1371-1381. Available under: doi: 10.1016/j.imavis.2008.12.008

Zusammenfassung

This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key

Zusammenfassung in einer weiteren Sprache

Fachgebiet (DDC)
004 Informatik

Schlagwörter

cryptanalysis, image encryption, chaos, known-plaintext attack, chosen-plaintext attack

Konferenz

Rezension
undefined / . - undefined, undefined

Forschungsvorhaben

Organisationseinheiten

Zeitschriftenheft

Zugehörige Datensätze in KOPS

Zitieren

ISO 690LI, Chengqing, Shujun LI, Muhammad ASIM, Juana NUNEZ, Gonzalo ALVAREZ, Guanrong CHEN, 2009. On the security defects of an image encryption scheme. In: Image and Vision Computing. 2009, 27(9), pp. 1371-1381. Available under: doi: 10.1016/j.imavis.2008.12.008
BibTex
@article{Li2009secur-6277,
  year={2009},
  doi={10.1016/j.imavis.2008.12.008},
  title={On the security defects of an image encryption scheme},
  number={9},
  volume={27},
  journal={Image and Vision Computing},
  pages={1371--1381},
  author={Li, Chengqing and Li, Shujun and Asim, Muhammad and Nunez, Juana and Alvarez, Gonzalo and Chen, Guanrong}
}
RDF
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/6277">
    <dc:contributor>Asim, Muhammad</dc:contributor>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:creator>Asim, Muhammad</dc:creator>
    <dcterms:title>On the security defects of an image encryption scheme</dcterms:title>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dcterms:issued>2009</dcterms:issued>
    <dc:contributor>Nunez, Juana</dc:contributor>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6277/1/IVC2009b.pdf"/>
    <dc:rights>terms-of-use</dc:rights>
    <dc:creator>Nunez, Juana</dc:creator>
    <dc:format>application/pdf</dc:format>
    <dc:creator>Chen, Guanrong</dc:creator>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:contributor>Alvarez, Gonzalo</dc:contributor>
    <dc:language>eng</dc:language>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/52"/>
    <dc:contributor>Li, Shujun</dc:contributor>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:creator>Li, Shujun</dc:creator>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dcterms:available>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/52"/>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dc:date>
    <dcterms:bibliographicCitation>Publ. in: Image and Vision Computing  27 (2009), 9, pp. 1371 1381</dcterms:bibliographicCitation>
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
    <dc:contributor>Chen, Guanrong</dc:contributor>
    <dcterms:abstract xml:lang="eng">This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key</dcterms:abstract>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6277/1/IVC2009b.pdf"/>
    <dc:creator>Li, Chengqing</dc:creator>
    <dc:contributor>Li, Chengqing</dc:contributor>
    <dc:creator>Alvarez, Gonzalo</dc:creator>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6277"/>
  </rdf:Description>
</rdf:RDF>

Interner Vermerk

xmlui.Submission.submit.DescribeStep.inputForms.label.kops_note_fromSubmitter

Kontakt
URL der Originalveröffentl.

Prüfdatum der URL

Prüfungsdatum der Dissertation

Finanzierungsart

Kommentar zur Publikation

Allianzlizenz
Corresponding Authors der Uni Konstanz vorhanden
Internationale Co-Autor:innen
Universitätsbibliographie
Ja
Begutachtet
Diese Publikation teilen