On the security defects of an image encryption scheme

This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K<...

Full description

Bibliographic Details
Main Authors: C., Li, S., Li, M., Asim, J., Nunez, G., Alvarez, G., Chen
Format: Article
Language:English
Published: 2009
Subjects:
Online Access:http://scholars.utp.edu.my/id/eprint/457/
http://scholars.utp.edu.my/id/eprint/457/1/paper.pdf
_version_ 1848658991851241472
author C., Li
S., Li
M., Asim
J., Nunez
G., Alvarez
G., Chen
author_facet C., Li
S., Li
M., Asim
J., Nunez
G., Alvarez
G., Chen
author_sort C., Li
building UTP Institutional Repository
collection Online Access
description This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K<sub>10</sub> can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: fenced(K<sub>i</sub> mod 128)<sub>i = 4</sub><sup>10</sup>, which works very well when K<sub>10</sub> is not too large; (4) when K<sub>10</sub> is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. © 2009 Elsevier B.V. All rights reserved.
first_indexed 2025-11-13T07:23:20Z
format Article
id oai:scholars.utp.edu.my:457
institution Universiti Teknologi Petronas
institution_category Local University
language English
last_indexed 2025-11-13T07:23:20Z
publishDate 2009
recordtype eprints
repository_type Digital Repository
spelling oai:scholars.utp.edu.my:4572017-01-19T08:25:38Z http://scholars.utp.edu.my/id/eprint/457/ On the security defects of an image encryption scheme C., Li S., Li M., Asim J., Nunez G., Alvarez G., Chen TK Electrical engineering. Electronics Nuclear engineering This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K<sub>10</sub> can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: fenced(K<sub>i</sub> mod 128)<sub>i = 4</sub><sup>10</sup>, which works very well when K<sub>10</sub> is not too large; (4) when K<sub>10</sub> is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. © 2009 Elsevier B.V. All rights reserved. 2009 Article NonPeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/457/1/paper.pdf C., Li and S., Li and M., Asim and J., Nunez and G., Alvarez and G., Chen (2009) On the security defects of an image encryption scheme. Image and Vision Computing, 27 (9). pp. 1371-1381. ISSN 2628856 http://www.scopus.com/inward/record.url?eid=2-s2.0-67349203285&partnerID=40&md5=5385f9470ba91a7ead6bdefd47b999d7 10.1016/j.imavis.2008.12.008 10.1016/j.imavis.2008.12.008 10.1016/j.imavis.2008.12.008
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
C., Li
S., Li
M., Asim
J., Nunez
G., Alvarez
G., Chen
On the security defects of an image encryption scheme
title On the security defects of an image encryption scheme
title_full On the security defects of an image encryption scheme
title_fullStr On the security defects of an image encryption scheme
title_full_unstemmed On the security defects of an image encryption scheme
title_short On the security defects of an image encryption scheme
title_sort on the security defects of an image encryption scheme
topic TK Electrical engineering. Electronics Nuclear engineering
url http://scholars.utp.edu.my/id/eprint/457/
http://scholars.utp.edu.my/id/eprint/457/
http://scholars.utp.edu.my/id/eprint/457/
http://scholars.utp.edu.my/id/eprint/457/1/paper.pdf