On the security defects of an image encryption scheme

Zitieren

Dateien zu dieser Ressource

Prüfsumme: MD5:da80dbe033756929f8d16e7f956f7404

LI, Chengqing, Shujun LI, Muhammad ASIM, Juana NUNEZ, Gonzalo ALVAREZ, Guanrong CHEN, 2009. On the security defects of an image encryption scheme. In: Image and Vision Computing. 27(9), pp. 1371-1381

@article{Li2009secur-6277, title={On the security defects of an image encryption scheme}, year={2009}, doi={10.1016/j.imavis.2008.12.008}, number={9}, volume={27}, journal={Image and Vision Computing}, pages={1371--1381}, author={Li, Chengqing and Li, Shujun and Asim, Muhammad and Nunez, Juana and Alvarez, Gonzalo and Chen, Guanrong} }

<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/rdf/resource/123456789/6277"> <dc:creator>Asim, Muhammad</dc:creator> <dcterms:issued>2009</dcterms:issued> <dc:creator>Nunez, Juana</dc:creator> <dc:language>eng</dc:language> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dcterms:available> <dc:contributor>Li, Chengqing</dc:contributor> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dc:date> <dc:creator>Alvarez, Gonzalo</dc:creator> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6277"/> <dc:contributor>Alvarez, Gonzalo</dc:contributor> <dcterms:bibliographicCitation>Publ. in: Image and Vision Computing 27 (2009), 9, pp. 1371 1381</dcterms:bibliographicCitation> <dc:format>application/pdf</dc:format> <dc:rights>deposit-license</dc:rights> <dc:contributor>Nunez, Juana</dc:contributor> <dc:creator>Li, Shujun</dc:creator> <dc:contributor>Li, Shujun</dc:contributor> <dc:contributor>Asim, Muhammad</dc:contributor> <dcterms:abstract xml:lang="eng">This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key</dcterms:abstract> <dc:creator>Li, Chengqing</dc:creator> <dcterms:rights rdf:resource="http://nbn-resolving.org/urn:nbn:de:bsz:352-20140905103416863-3868037-7"/> <dc:contributor>Chen, Guanrong</dc:contributor> <dcterms:title>On the security defects of an image encryption scheme</dcterms:title> <dc:creator>Chen, Guanrong</dc:creator> </rdf:Description> </rdf:RDF>

Dateiabrufe seit 01.10.2014 (Informationen über die Zugriffsstatistik)

IVC2009b.pdf 104

Das Dokument erscheint in:

KOPS Suche


Stöbern

Mein Benutzerkonto