Breaking an image encryption algorithm based on chaos

Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verifi...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Li, Chengqing, Chen, Michael Z Q, Kwok-Tung Lo
Format Paper Journal Article
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 03.10.2016
Subjects
Online AccessGet full text
ISSN2331-8422
DOI10.48550/arxiv.1007.3862

Cover

Abstract Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verified by experimental results. In addition, some defects of MCKBA, including insensitivity with respect to changes of plain-image/secret key, are reported.
AbstractList International Journal of Bifurcation and Chaos, 21(7): 2067-2076, 2011 Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verified by experimental results. In addition, some defects of MCKBA, including insensitivity with respect to changes of plain-image/secret key, are reported.
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen plain-images. Performance of the attack is verified by experimental results. In addition, some defects of MCKBA, including insensitivity with respect to changes of plain-image/secret key, are reported.
Author Chen, Michael Z Q
Li, Chengqing
Kwok-Tung Lo
Author_xml – sequence: 1
  givenname: Chengqing
  surname: Li
  fullname: Li, Chengqing
– sequence: 2
  givenname: Michael
  surname: Chen
  middlename: Z Q
  fullname: Chen, Michael Z Q
– sequence: 3
  fullname: Kwok-Tung Lo
BackLink https://doi.org/10.48550/arXiv.1007.3862$$DView paper in arXiv
https://doi.org/10.1142/S0218127411029641$$DView published paper (Access to full text may be restricted)
BookMark eNotj0tLAzEYRYMoWGv3riTgemoek0lmqcWqUHDT_fDlNZ3aJmMyFfvvnVpXFy6Hyz036DLE4BC6o2ReKiHII6Sf7ntOCZFzrip2gSaMc1qokrFrNMt5SwhhlWRC8AkSz8nBZxdaDAF3e2gddsGkYz90MWDYtTF1w2aPNWRn8ViZDcR8i6487LKb_ecUrZcv68Vbsfp4fV88rQoQtCxUpYnkwGujvQFPjTVceOWAeie4YcJ5Acxr60TFdF1aT60CkM5Ia6RWfIruz7N_Sk2fxoPp2JzUmpPaCDycgT7Fr4PLQ7ONhxTGSw0jitTVyJT8F8rPU9E
ContentType Paper
Journal Article
Copyright 2016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
http://arxiv.org/licenses/nonexclusive-distrib/1.0
Copyright_xml – notice: 2016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: http://arxiv.org/licenses/nonexclusive-distrib/1.0
DBID 8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
AKY
GOX
DOI 10.48550/arxiv.1007.3862
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database
Proquest Central Premium
ProQuest One Academic
ProQuest Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
arXiv Computer Science
arXiv.org
DatabaseTitle Publicly Available Content Database
Engineering Database
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
Engineering Collection
DatabaseTitleList
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: GOX
  name: arXiv.org
  url: http://arxiv.org/find
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 2331-8422
ExternalDocumentID 1007_3862
Genre Working Paper/Pre-Print
GroupedDBID 8FE
8FG
ABJCF
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FRJ
HCIFZ
L6V
M7S
M~E
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
AKY
GOX
ID FETCH-LOGICAL-a514-86b073a39cbfcaf1cdc35f8ea1fe53c25ef5a2fbde562b94df1d8aa7ec7dc7b83
IEDL.DBID GOX
IngestDate Tue Jul 22 23:02:14 EDT 2025
Mon Jun 30 09:24:25 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a514-86b073a39cbfcaf1cdc35f8ea1fe53c25ef5a2fbde562b94df1d8aa7ec7dc7b83
Notes SourceType-Working Papers-1
ObjectType-Working Paper/Pre-Print-1
content type line 50
OpenAccessLink https://arxiv.org/abs/1007.3862
PQID 2080966234
PQPubID 2050157
ParticipantIDs arxiv_primary_1007_3862
proquest_journals_2080966234
PublicationCentury 2000
PublicationDate 20161003
PublicationDateYYYYMMDD 2016-10-03
PublicationDate_xml – month: 10
  year: 2016
  text: 20161003
  day: 03
PublicationDecade 2010
PublicationPlace Ithaca
PublicationPlace_xml – name: Ithaca
PublicationTitle arXiv.org
PublicationYear 2016
Publisher Cornell University Library, arXiv.org
Publisher_xml – name: Cornell University Library, arXiv.org
SSID ssj0002672553
Score 1.606306
SecondaryResourceType preprint
Snippet Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA...
International Journal of Bifurcation and Chaos, 21(7): 2067-2076, 2011 Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key...
SourceID arxiv
proquest
SourceType Open Access Repository
Aggregation Database
SubjectTerms Algorithms
Computer Science - Cryptography and Security
Encryption
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLZgExI33gwGyoFrYW36SE5IIMaEBOIwpN0m58UmQTfageDf42QdHJDoMb20jj9_XxzLBjjraeLEAnlkDKEpjW0eofBNP4UVuZWGEOXzHfcP-eApvRtloybhVjdllauYGAK1mWmfI6dDuiC1TWSdXs7fIj81yt-uNiM01qFNRC29V4v-7U-OJckLUsx8eTsZWnddYPU5_QilAedc-BE57bDyJxIHeulvQfsR57bahjVb7sBGqMrU9S5kVyTpfC6bYcmmrwR9Rk5VfQWYM3x5pg9cTF6ZpyLDaElPcFbvwbB_M7weRM2cgwhJrkQiV4Qz5FIrp9HF2mieOWExdjbjOsmsyzBxyljSKkqmxsVGIBZWF0YXSvB9aJWz0h4CS3pGS7Ixpi6lJxaG9xKtjZSJ4jJOO3AQfnc8X7ayWHYs9oboQHdlgHHjxfX41-ZH_78-hk0SEnkocuNdaC2qd3tCZL1Qp2FHvgGJZpSe
  priority: 102
  providerName: ProQuest
Title Breaking an image encryption algorithm based on chaos
URI https://www.proquest.com/docview/2080966234
https://arxiv.org/abs/1007.3862
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV1LTwIxEJ4AXrwYjS8UsQeva3a33d32KAYkJqAxmHAjfQqJgAE0evG3O-0uXow99NC0h077db7p4yvAVazRJxaSRsYgmlhi80hyL_rJLc-tMIgov98xGOb9Z3Y_zsY1uNy-hZGrz9lHqQ-s_J8jcXFNuV9j68gT_Fveh3F52BiUuKrqv9WQYYaSPwtr8Ba9fdiraB65KcflAGp2cQhZBxma35omckFmc0QywTmy-gqoJfL1ZYmR-nROvGcxBIv0VC7XRzDqdUe3_aj6tiCSyD4iniuEjaRCK6elS7TRNHPcysTZjOo0sy6TqVPGIvVQghmXGC5lYXVhdKE4PYYGRv72FEgaGy3QZJI5hinhhsap1kaIVFGRsCachO5O3kplilKA2BuiCa2tASbVpFxPUmSHGN2klJ392_AcdpES5OG6Gm1BY7N6txfodjeqDXXeu2vDTqc7fHxqh6HAfPDd_QHqQodC
linkProvider Cornell University
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTwIxEJ4gxOjNtyjqHvS4ym67u90DMUEhII8Qgwm3TbftCok8BHzw4_xvTsuiBxNv9Ngmm-w8v5lOZwAuiwJ9YsCJLSVqE3WUb3Omm34yxXwVStQone9otf3aE33oeb0MfK3ewuiyypVNNIZajoXOkWOQzhBto7Omt5NXW0-N0rerqxEaPB2tIEumxVj6sKOhFh8Yws1K9Xvk95XrVivdu5qdThmwOYIFm_kxSjknoYgTwRNHSEG8hCnuJMojwvVU4nE3iaVCpBCHVCaOZJwHSgRSBDEj-NkNyFFCQ4z9cuVKu_P4k-Rx_QAhO1lej5reYTd8-jl4N7UJ14TpGT05s_PHFRj_Vt2BXIdP1HQXMmq0B5umLFTM9sErI6bUyXSLj6zBEG2PhVI9XRg7Y_GXZ6TQvD-0tC-UFm6JPh_PDqC7DhIcQnY0HqljsNyiFCEymdOE4nKYJEVXCBmGbkxCh-bhyPxuNFn20li2TNaEyENhRYAoVaNZ9Mv0k_-PL2Cr1m01o2a93TiFbUQ1vqm4IwXIzqdv6gyRwzw-T_ljQbRmifgGoHHbFQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Breaking+an+image+encryption+algorithm+based+on+chaos&rft.jtitle=arXiv.org&rft.au=Li%2C+Chengqing&rft.au=Chen%2C+Michael+Z+Q&rft.au=Kwok-Tung+Lo&rft.date=2016-10-03&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422&rft_id=info:doi/10.48550%2Farxiv.1007.3862