Cryptanalysis of a chaotic image encryption method
The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one...
Saved in:
| Published in | 2002 IEEE International Symposium on Circuits and Systems Vol. 2; p. II |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
2002
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9780780374485 0780374487 |
| DOI | 10.1109/ISCAS.2002.1011451 |
Cover
| Abstract | The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one plain-image, and its security to brute-force ciphertext-only attack is overestimated by the authors. That is to say, CKBA is not secure at all from cryptographic viewpoint. Some experiments are made to show the feasibility of the chosen/known-plaintext attack. We also discuss some remedies to the original scheme and their performance, and we find none of them can essentially improve the security of CKBA. |
|---|---|
| AbstractList | The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one plain-image, and its security to brute-force ciphertext-only attack is overestimated by the authors. That is to say, CKBA is not secure at all from cryptographic viewpoint. Some experiments are made to show the feasibility of the chosen/known-plaintext attack. We also discuss some remedies to the original scheme and their performance, and we find none of them can essentially improve the security of CKBA. |
| Author | Shujun Li Xuan Zheng |
| Author_xml | – sequence: 1 surname: Shujun Li fullname: Shujun Li organization: Inst. of Image Process., Xi'an Jiaotong Univ., Shaanxi, China – sequence: 2 surname: Xuan Zheng fullname: Xuan Zheng |
| BookMark | eNotT0tqwzAUFLSFtqkv0G50Abvv6WNLy2D6CQS6SPZBlp4blcQKlje-fV2aYWBgGIaZR3Y7pIEYe0aoEMG-bnbtelcJAFEhICqNN6ywjYGFslHK6HtW5PwDC5RWIOQDE-04XyY3uNOcY-ap5477o0tT9Dye3TdxGvxfJKaBn2k6pvDE7np3ylRcdcX272_79rPcfn1s2vW2jMZMZUO9B9eDV8YIZdAK3QdDna1tHQTUqC0SasRQo5QeGu8a23UqLOMW18sVe_mvjUR0uIzLmnE-XI_JX54xRCI |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/ISCAS.2002.1011451 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EndPage | II |
| ExternalDocumentID | 1011451 |
| GroupedDBID | 6IE 6IH 6IK 6IL AAJGR AAVQY AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-i88t-7efc0af0c4882481925fd8eb9696d2061591e1511d6133c07ca79bb4d000511c3 |
| IEDL.DBID | RIE |
| ISBN | 9780780374485 0780374487 |
| IngestDate | Wed Aug 27 02:45:04 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i88t-7efc0af0c4882481925fd8eb9696d2061591e1511d6133c07ca79bb4d000511c3 |
| ParticipantIDs | ieee_primary_1011451 |
| PublicationCentury | 2000 |
| PublicationDate | 20020000 |
| PublicationDateYYYYMMDD | 2002-01-01 |
| PublicationDate_xml | – year: 2002 text: 20020000 |
| PublicationDecade | 2000 |
| PublicationTitle | 2002 IEEE International Symposium on Circuits and Systems |
| PublicationTitleAbbrev | ISCAS |
| PublicationYear | 2002 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000454023 |
| Score | 1.7190189 |
| Snippet | The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS-CAS2000, a new chaotic key-based... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | II |
| SubjectTerms | Chaos Chaotic communication Communication system security Cryptography Data security Digital images Electronic mail Image processing Image storage Information security |
| Title | Cryptanalysis of a chaotic image encryption method |
| URI | https://ieeexplore.ieee.org/document/1011451 |
| Volume | 2 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qT55UWvHNHjy6MZvHJjlKsVShIrRCbyWzDyxiU0p60F_v7CatKB68ZUM27PJl883OznwDcB2LNLOEK48MFjwxFjkmZcbR2rCU0mhpXXLy-EmOXpLHWTrrwM0uF8YY44PPTOAu_Vm-rtTGucpohQtXWHYP9rJcNrlaO3-Kl5KLYr8zz52oClnircDOtp1uk2bC4vZhMrib-AiFoH3rj_Iqnl2GBzDejqsJKnkLNjUG6vOXZON_B34I_e88Pva8Y6gj6JhlD6LB-mNFJmEjRsIqy0qmXsuKviC2eKffC6N-7hFCjDUFpvswHd5PByPeVk7gizyveWasCksbKlqdUeIkz1KrcwJDFlJHzogphCGqF5rIPFZhpsqsQEy0t-iEio-hu6yW5gSYpB2kxlQgCiQkLWLsVLLSOLFE_daeQs9Nd75qtDHm7UzP_r59Dvu-mop3YVxAt15vzCWReo1XHs0ve06ctg |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOhJDRh_24NHN9et7bajIRJQICZgwo2sXRuJkREyDvrX-9oNjMaDt3VZlzbfuu_19b3vAdxElMcGcfVCLVOPaSM9ybLYk8YEmRA6F8YmJw9HovfCHqd82oDbbS6M1toFn2nfXrqz_LxQa-sqwxVObWHZHdjljDFeZWttPSpOTC6M3N48sbIqaIvXEjubNt-kzQTpXX_cuR-7GAW_fu-PAiuOX7oHMNyMrAorefPXpfTV5y_Rxv8O_RDa35l85HnLUUfQ0IsWhJ3VxxKNwkqOhBSGZES9ZgV-Q2T-jj8Ygv3sI4gZqUpMt2HSfZh0el5dO8GbJ0npxdqoIDOBwvUZMit6xk2eIBwiFXlozZiUaiR7miOdRyqIVRanUrLc2XRURcfQXBQLfQJE4B4yl5xKSSViaaSMrE4Wj5hB8jfmFFp2urNlpY4xq2d69vfta9jrTYaD2aA_ejqHfVdbxTk0LqBZrtb6Eim-lFcO2S_qaaAD |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2002+IEEE+International+Symposium+on+Circuits+and+Systems&rft.atitle=Cryptanalysis+of+a+chaotic+image+encryption+method&rft.au=Shujun+Li&rft.au=Xuan+Zheng&rft.date=2002-01-01&rft.pub=IEEE&rft.isbn=9780780374485&rft.volume=2&rft.spage=II&rft.epage=II&rft_id=info:doi/10.1109%2FISCAS.2002.1011451&rft.externalDocID=1011451 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780374485/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780374485/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780374485/sc.gif&client=summon&freeimage=true |