International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

On the security of an image encryption scheme

Authors:
Chengqing Li
Shujun Li
Muhammad Asim
Juana Nunez
Gonzalo Alvarez
Guanrong Chen
Download:
URL: http://eprint.iacr.org/2007/090
Search ePrint
Search Google
Abstract: This paper studies the security of a recently-proposed image encryption scheme based on chaos, and points out the following problems: 1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for the encryption/decryption processes; 2) given one chosen plain-image, a sub-key $K_{10}$ can be guessed with a smaller computational complexity than that of the simple brute-force attack; 3) given $O(10)$ (at most 128) chosen plain-images, a chosen-plaintext attack may be able to break the following part of the secret key: $(\{K_i\bmod 128\}_{i=4}^{10})$, which works very well when $K_{10}$ is not too large; 4) when $K_{10}$ is relatively small, a known-plaintext attack can be mounted with only one known plain-image to recover some visual information of other plain-images encrypted by the same key.
BibTeX
@misc{eprint-2007-13372,
  title={On the security of an image encryption scheme},
  booktitle={IACR Eprint archive},
  keywords={cryptanalysis},
  url={http://eprint.iacr.org/2007/090},
  note={ swiftsheep@hotmail.com 13735 received 8 Mar 2007, last revised 7 Aug 2007, withdrawn 10 Aug 2007},
  author={Chengqing Li and Shujun Li and Muhammad Asim and Juana Nunez and Gonzalo Alvarez and Guanrong Chen},
  year=2007
}