On the security defects of an image encryption scheme
Dateien
Datum
Autor:innen
Herausgeber:innen
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
URI (zitierfähiger Link)
DOI (zitierfähiger Link)
Internationale Patentnummer
Link zur Lizenz
Angaben zur Forschungsförderung
Projekt
Open Access-Veröffentlichung
Core Facility der Universität Konstanz
Titel in einer weiteren Sprache
Publikationstyp
Publikationsstatus
Erschienen in
Zusammenfassung
This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key
Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
Schlagwörter
Konferenz
Rezension
Zitieren
ISO 690
LI, Chengqing, Shujun LI, Muhammad ASIM, Juana NUNEZ, Gonzalo ALVAREZ, Guanrong CHEN, 2009. On the security defects of an image encryption scheme. In: Image and Vision Computing. 2009, 27(9), pp. 1371-1381. Available under: doi: 10.1016/j.imavis.2008.12.008BibTex
@article{Li2009secur-6277, year={2009}, doi={10.1016/j.imavis.2008.12.008}, title={On the security defects of an image encryption scheme}, number={9}, volume={27}, journal={Image and Vision Computing}, pages={1371--1381}, author={Li, Chengqing and Li, Shujun and Asim, Muhammad and Nunez, Juana and Alvarez, Gonzalo and Chen, Guanrong} }
RDF
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/6277"> <dc:contributor>Asim, Muhammad</dc:contributor> <foaf:homepage rdf:resource="http://localhost:8080/"/> <dc:creator>Asim, Muhammad</dc:creator> <dcterms:title>On the security defects of an image encryption scheme</dcterms:title> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dcterms:issued>2009</dcterms:issued> <dc:contributor>Nunez, Juana</dc:contributor> <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6277/1/IVC2009b.pdf"/> <dc:rights>terms-of-use</dc:rights> <dc:creator>Nunez, Juana</dc:creator> <dc:format>application/pdf</dc:format> <dc:creator>Chen, Guanrong</dc:creator> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:contributor>Alvarez, Gonzalo</dc:contributor> <dc:language>eng</dc:language> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/52"/> <dc:contributor>Li, Shujun</dc:contributor> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:creator>Li, Shujun</dc:creator> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dcterms:available> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/52"/> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dc:date> <dcterms:bibliographicCitation>Publ. in: Image and Vision Computing 27 (2009), 9, pp. 1371 1381</dcterms:bibliographicCitation> <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/> <dc:contributor>Chen, Guanrong</dc:contributor> <dcterms:abstract xml:lang="eng">This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key</dcterms:abstract> <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6277/1/IVC2009b.pdf"/> <dc:creator>Li, Chengqing</dc:creator> <dc:contributor>Li, Chengqing</dc:contributor> <dc:creator>Alvarez, Gonzalo</dc:creator> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6277"/> </rdf:Description> </rdf:RDF>