On the security defects of an image encryption scheme

Lade...
Vorschaubild
Dateien
IVC2009b.pdf
IVC2009b.pdfGröße: 3.46 MBDownloads: 306
Datum
2009
Autor:innen
Li, Chengqing
Asim, Muhammad
Nunez, Juana
Alvarez, Gonzalo
Chen, Guanrong
Herausgeber:innen
Kontakt
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
ArXiv-ID
Internationale Patentnummer
Angaben zur Forschungsförderung
Projekt
Open Access-Veröffentlichung
Open Access Green
Core Facility der Universität Konstanz
Gesperrt bis
Titel in einer weiteren Sprache
Forschungsvorhaben
Organisationseinheiten
Zeitschriftenheft
Publikationstyp
Zeitschriftenartikel
Publikationsstatus
Published
Erschienen in
Image and Vision Computing. 2009, 27(9), pp. 1371-1381. Available under: doi: 10.1016/j.imavis.2008.12.008
Zusammenfassung

This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key

Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
004 Informatik
Schlagwörter
cryptanalysis, image encryption, chaos, known-plaintext attack, chosen-plaintext attack
Konferenz
Rezension
undefined / . - undefined, undefined
Zitieren
ISO 690LI, Chengqing, Shujun LI, Muhammad ASIM, Juana NUNEZ, Gonzalo ALVAREZ, Guanrong CHEN, 2009. On the security defects of an image encryption scheme. In: Image and Vision Computing. 2009, 27(9), pp. 1371-1381. Available under: doi: 10.1016/j.imavis.2008.12.008
BibTex
@article{Li2009secur-6277,
  year={2009},
  doi={10.1016/j.imavis.2008.12.008},
  title={On the security defects of an image encryption scheme},
  number={9},
  volume={27},
  journal={Image and Vision Computing},
  pages={1371--1381},
  author={Li, Chengqing and Li, Shujun and Asim, Muhammad and Nunez, Juana and Alvarez, Gonzalo and Chen, Guanrong}
}
RDF
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/6277">
    <dc:contributor>Asim, Muhammad</dc:contributor>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:creator>Asim, Muhammad</dc:creator>
    <dcterms:title>On the security defects of an image encryption scheme</dcterms:title>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dcterms:issued>2009</dcterms:issued>
    <dc:contributor>Nunez, Juana</dc:contributor>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6277/1/IVC2009b.pdf"/>
    <dc:rights>terms-of-use</dc:rights>
    <dc:creator>Nunez, Juana</dc:creator>
    <dc:format>application/pdf</dc:format>
    <dc:creator>Chen, Guanrong</dc:creator>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:contributor>Alvarez, Gonzalo</dc:contributor>
    <dc:language>eng</dc:language>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/52"/>
    <dc:contributor>Li, Shujun</dc:contributor>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:creator>Li, Shujun</dc:creator>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dcterms:available>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/52"/>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:41Z</dc:date>
    <dcterms:bibliographicCitation>Publ. in: Image and Vision Computing  27 (2009), 9, pp. 1371 1381</dcterms:bibliographicCitation>
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
    <dc:contributor>Chen, Guanrong</dc:contributor>
    <dcterms:abstract xml:lang="eng">This paper studies the previous termsecuritynext term of a recently-proposed chaos-based previous termimagenext term encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-previous termimage,next term a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-previous termimages,next term a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K10 is not too large; (4) when K10 is relatively small, a known-plaintext attack can be carried out with only one known plain-previous termimagenext term to recover some visual information of any other plain-previous termimagesnext term encrypted by the same key</dcterms:abstract>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6277/1/IVC2009b.pdf"/>
    <dc:creator>Li, Chengqing</dc:creator>
    <dc:contributor>Li, Chengqing</dc:contributor>
    <dc:creator>Alvarez, Gonzalo</dc:creator>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6277"/>
  </rdf:Description>
</rdf:RDF>
Interner Vermerk
xmlui.Submission.submit.DescribeStep.inputForms.label.kops_note_fromSubmitter
Kontakt
URL der Originalveröffentl.
Prüfdatum der URL
Prüfungsdatum der Dissertation
Finanzierungsart
Kommentar zur Publikation
Allianzlizenz
Corresponding Authors der Uni Konstanz vorhanden
Internationale Co-Autor:innen
Universitätsbibliographie
Ja
Begutachtet
Diese Publikation teilen