2015
DOI: 10.1007/s11042-015-2511-y
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher

Abstract: Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a combination of chosen-plaintext attack and differential attack. This paper briefly reviews the two attack methods proposed by Zhang et al. and outlines the mathematical interpretations of them. Based on their work, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. More… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…One is mobile transmission that is mobile communication, and the other is broadband transmission that is broadband communication. In the past, wireless image transmission was mainly based on one-way analog TV broadcasting service [ 4 , 5 , 6 , 7 , 8 , 9 ]. Mainly, a set of TV programs use a single frequency point.…”
Section: Methodsmentioning
confidence: 99%
“…One is mobile transmission that is mobile communication, and the other is broadband transmission that is broadband communication. In the past, wireless image transmission was mainly based on one-way analog TV broadcasting service [ 4 , 5 , 6 , 7 , 8 , 9 ]. Mainly, a set of TV programs use a single frequency point.…”
Section: Methodsmentioning
confidence: 99%
“…Classical cryptosystems AES—Advanced Encryption Standard and DES—Data Encryption Standard which is block-based symmetric key systems and asymmetric methods like RSA—Rivest Shamir Adleman consume more time. On the other hand, while applying RSA to encrypt images, it creates many security issues as defined in [ 32 ]. The comparison of classical symmetric ciphers and similar ciphers is given in Table 1 as below:…”
Section: Related Workmentioning
confidence: 99%
“…This paper reports that ICMPD suffers from the same defect. Unlike many cryptanalysis work which only deal with specific chaos-based image cryptosystem [11,12,13], this work makes several contributions. First, we provide a quantitative security evaluation framework to both the diffusion kernel of ICMPD and the classical modulo then XORing operation.…”
Section: Introductionmentioning
confidence: 99%