Breaking an image encryption algorithm based on chaos
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verifi...
Saved in:
| Published in | arXiv.org |
|---|---|
| Main Authors | , , |
| Format | Paper Journal Article |
| Language | English |
| Published |
Ithaca
Cornell University Library, arXiv.org
03.10.2016
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2331-8422 |
| DOI | 10.48550/arxiv.1007.3862 |
Cover
| Abstract | Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verified by experimental results. In addition, some defects of MCKBA, including insensitivity with respect to changes of plain-image/secret key, are reported. |
|---|---|
| AbstractList | International Journal of Bifurcation and Chaos, 21(7): 2067-2076,
2011 Recently, a chaos-based image encryption algorithm called MCKBA (Modified
Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of
MCKBA and finds that it can be broken with a differential attack, which
requires only four chosen plain-images. Performance of the attack is verified
by experimental results. In addition, some defects of MCKBA, including
insensitivity with respect to changes of plain-image/secret key, are reported. Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verified by experimental results. In addition, some defects of MCKBA, including insensitivity with respect to changes of plain-image/secret key, are reported. |
| Author | Chen, Michael Z Q Li, Chengqing Kwok-Tung Lo |
| Author_xml | – sequence: 1 givenname: Chengqing surname: Li fullname: Li, Chengqing – sequence: 2 givenname: Michael surname: Chen middlename: Z Q fullname: Chen, Michael Z Q – sequence: 3 fullname: Kwok-Tung Lo |
| BackLink | https://doi.org/10.48550/arXiv.1007.3862$$DView paper in arXiv https://doi.org/10.1142/S0218127411029641$$DView published paper (Access to full text may be restricted) |
| BookMark | eNotj0tLAzEYRYMoWGv3riTgemoek0lmqcWqUHDT_fDlNZ3aJmMyFfvvnVpXFy6Hyz036DLE4BC6o2ReKiHII6Sf7ntOCZFzrip2gSaMc1qokrFrNMt5SwhhlWRC8AkSz8nBZxdaDAF3e2gddsGkYz90MWDYtTF1w2aPNWRn8ViZDcR8i6487LKb_ecUrZcv68Vbsfp4fV88rQoQtCxUpYnkwGujvQFPjTVceOWAeie4YcJ5Acxr60TFdF1aT60CkM5Ia6RWfIruz7N_Sk2fxoPp2JzUmpPaCDycgT7Fr4PLQ7ONhxTGSw0jitTVyJT8F8rPU9E |
| ContentType | Paper Journal Article |
| Copyright | 2016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://arxiv.org/licenses/nonexclusive-distrib/1.0 |
| Copyright_xml | – notice: 2016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: http://arxiv.org/licenses/nonexclusive-distrib/1.0 |
| DBID | 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS AKY GOX |
| DOI | 10.48550/arxiv.1007.3862 |
| DatabaseName | ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central ProQuest Technology Collection ProQuest One Community College ProQuest Central SciTech Premium Collection ProQuest Engineering Collection Engineering Database Proquest Central Premium ProQuest One Academic ProQuest Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection arXiv Computer Science arXiv.org |
| DatabaseTitle | Publicly Available Content Database Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea Materials Science & Engineering Collection ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) Engineering Collection |
| DatabaseTitleList | Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: GOX name: arXiv.org url: http://arxiv.org/find sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Physics |
| EISSN | 2331-8422 |
| ExternalDocumentID | 1007_3862 |
| Genre | Working Paper/Pre-Print |
| GroupedDBID | 8FE 8FG ABJCF ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS AZQEC BENPR BGLVJ CCPQU DWQXO FRJ HCIFZ L6V M7S M~E PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS AKY GOX |
| ID | FETCH-LOGICAL-a514-86b073a39cbfcaf1cdc35f8ea1fe53c25ef5a2fbde562b94df1d8aa7ec7dc7b83 |
| IEDL.DBID | GOX |
| IngestDate | Tue Jul 22 23:02:14 EDT 2025 Mon Jun 30 09:24:25 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a514-86b073a39cbfcaf1cdc35f8ea1fe53c25ef5a2fbde562b94df1d8aa7ec7dc7b83 |
| Notes | SourceType-Working Papers-1 ObjectType-Working Paper/Pre-Print-1 content type line 50 |
| OpenAccessLink | https://arxiv.org/abs/1007.3862 |
| PQID | 2080966234 |
| PQPubID | 2050157 |
| ParticipantIDs | arxiv_primary_1007_3862 proquest_journals_2080966234 |
| PublicationCentury | 2000 |
| PublicationDate | 20161003 |
| PublicationDateYYYYMMDD | 2016-10-03 |
| PublicationDate_xml | – month: 10 year: 2016 text: 20161003 day: 03 |
| PublicationDecade | 2010 |
| PublicationPlace | Ithaca |
| PublicationPlace_xml | – name: Ithaca |
| PublicationTitle | arXiv.org |
| PublicationYear | 2016 |
| Publisher | Cornell University Library, arXiv.org |
| Publisher_xml | – name: Cornell University Library, arXiv.org |
| SSID | ssj0002672553 |
| Score | 1.606306 |
| SecondaryResourceType | preprint |
| Snippet | Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA... International Journal of Bifurcation and Chaos, 21(7): 2067-2076, 2011 Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key... |
| SourceID | arxiv proquest |
| SourceType | Open Access Repository Aggregation Database |
| SubjectTerms | Algorithms Computer Science - Cryptography and Security Encryption |
| SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLZgExI33gwGyoFrYW36SE5IIMaEBOIwpN0m58UmQTfageDf42QdHJDoMb20jj9_XxzLBjjraeLEAnlkDKEpjW0eofBNP4UVuZWGEOXzHfcP-eApvRtloybhVjdllauYGAK1mWmfI6dDuiC1TWSdXs7fIj81yt-uNiM01qFNRC29V4v-7U-OJckLUsx8eTsZWnddYPU5_QilAedc-BE57bDyJxIHeulvQfsR57bahjVb7sBGqMrU9S5kVyTpfC6bYcmmrwR9Rk5VfQWYM3x5pg9cTF6ZpyLDaElPcFbvwbB_M7weRM2cgwhJrkQiV4Qz5FIrp9HF2mieOWExdjbjOsmsyzBxyljSKkqmxsVGIBZWF0YXSvB9aJWz0h4CS3pGS7Ixpi6lJxaG9xKtjZSJ4jJOO3AQfnc8X7ayWHYs9oboQHdlgHHjxfX41-ZH_78-hk0SEnkocuNdaC2qd3tCZL1Qp2FHvgGJZpSe priority: 102 providerName: ProQuest |
| Title | Breaking an image encryption algorithm based on chaos |
| URI | https://www.proquest.com/docview/2080966234 https://arxiv.org/abs/1007.3862 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV1LTwIxEJ4AXrwYjS8UsQeva3a33d32KAYkJqAxmHAjfQqJgAE0evG3O-0uXow99NC0h077db7p4yvAVazRJxaSRsYgmlhi80hyL_rJLc-tMIgov98xGOb9Z3Y_zsY1uNy-hZGrz9lHqQ-s_J8jcXFNuV9j68gT_Fveh3F52BiUuKrqv9WQYYaSPwtr8Ba9fdiraB65KcflAGp2cQhZBxma35omckFmc0QywTmy-gqoJfL1ZYmR-nROvGcxBIv0VC7XRzDqdUe3_aj6tiCSyD4iniuEjaRCK6elS7TRNHPcysTZjOo0sy6TqVPGIvVQghmXGC5lYXVhdKE4PYYGRv72FEgaGy3QZJI5hinhhsap1kaIVFGRsCachO5O3kplilKA2BuiCa2tASbVpFxPUmSHGN2klJ392_AcdpES5OG6Gm1BY7N6txfodjeqDXXeu2vDTqc7fHxqh6HAfPDd_QHqQodC |
| linkProvider | Cornell University |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTwIxEJ4gxOjNtyjqHvS4ym67u90DMUEhII8Qgwm3TbftCok8BHzw4_xvTsuiBxNv9Ngmm-w8v5lOZwAuiwJ9YsCJLSVqE3WUb3Omm34yxXwVStQone9otf3aE33oeb0MfK3ewuiyypVNNIZajoXOkWOQzhBto7Omt5NXW0-N0rerqxEaPB2tIEumxVj6sKOhFh8Yws1K9Xvk95XrVivdu5qdThmwOYIFm_kxSjknoYgTwRNHSEG8hCnuJMojwvVU4nE3iaVCpBCHVCaOZJwHSgRSBDEj-NkNyFFCQ4z9cuVKu_P4k-Rx_QAhO1lej5reYTd8-jl4N7UJ14TpGT05s_PHFRj_Vt2BXIdP1HQXMmq0B5umLFTM9sErI6bUyXSLj6zBEG2PhVI9XRg7Y_GXZ6TQvD-0tC-UFm6JPh_PDqC7DhIcQnY0HqljsNyiFCEymdOE4nKYJEVXCBmGbkxCh-bhyPxuNFn20li2TNaEyENhRYAoVaNZ9Mv0k_-PL2Cr1m01o2a93TiFbUQ1vqm4IwXIzqdv6gyRwzw-T_ljQbRmifgGoHHbFQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Breaking+an+image+encryption+algorithm+based+on+chaos&rft.jtitle=arXiv.org&rft.au=Li%2C+Chengqing&rft.au=Chen%2C+Michael+Z+Q&rft.au=Kwok-Tung+Lo&rft.date=2016-10-03&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422&rft_id=info:doi/10.48550%2Farxiv.1007.3862 |