Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher
Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches propos...
Ausführliche Beschreibung
Autor*in: |
Zeng, Li [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media New York 2015 |
---|
Übergeordnetes Werk: |
Enthalten in: Multimedia tools and applications - Springer US, 1995, 75(2015), 10 vom: 07. März, Seite 5439-5453 |
---|---|
Übergeordnetes Werk: |
volume:75 ; year:2015 ; number:10 ; day:07 ; month:03 ; pages:5439-5453 |
Links: |
---|
DOI / URN: |
10.1007/s11042-015-2511-y |
---|
Katalog-ID: |
OLC2035023009 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2035023009 | ||
003 | DE-627 | ||
005 | 20230503192831.0 | ||
007 | tu | ||
008 | 200819s2015 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11042-015-2511-y |2 doi | |
035 | |a (DE-627)OLC2035023009 | ||
035 | |a (DE-He213)s11042-015-2511-y-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 070 |a 004 |q VZ |
100 | 1 | |a Zeng, Li |e verfasserin |4 aut | |
245 | 1 | 0 | |a Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media New York 2015 | ||
520 | |a Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. | ||
650 | 4 | |a Image scrambling | |
650 | 4 | |a Cryptanalysis | |
650 | 4 | |a Known-plaintext attack | |
650 | 4 | |a Chosen-plaintext attack | |
700 | 1 | |a Liu, Renren |4 aut | |
700 | 1 | |a Zhang, Leo Yu |4 aut | |
700 | 1 | |a Liu, Yuansheng |4 aut | |
700 | 1 | |a Wong, Kwok-Wo |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Multimedia tools and applications |d Springer US, 1995 |g 75(2015), 10 vom: 07. März, Seite 5439-5453 |w (DE-627)189064145 |w (DE-600)1287642-2 |w (DE-576)052842126 |x 1380-7501 |7 nnns |
773 | 1 | 8 | |g volume:75 |g year:2015 |g number:10 |g day:07 |g month:03 |g pages:5439-5453 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11042-015-2511-y |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 75 |j 2015 |e 10 |b 07 |c 03 |h 5439-5453 |
author_variant |
l z lz r l rl l y z ly lyz y l yl k w w kww |
---|---|
matchkey_str |
article:13807501:2015----::rpaayignmgecytoagrtmaeosrml |
hierarchy_sort_str |
2015 |
publishDate |
2015 |
allfields |
10.1007/s11042-015-2511-y doi (DE-627)OLC2035023009 (DE-He213)s11042-015-2511-y-p DE-627 ger DE-627 rakwb eng 070 004 VZ Zeng, Li verfasserin aut Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. Image scrambling Cryptanalysis Known-plaintext attack Chosen-plaintext attack Liu, Renren aut Zhang, Leo Yu aut Liu, Yuansheng aut Wong, Kwok-Wo aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 10 vom: 07. März, Seite 5439-5453 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:10 day:07 month:03 pages:5439-5453 https://doi.org/10.1007/s11042-015-2511-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 10 07 03 5439-5453 |
spelling |
10.1007/s11042-015-2511-y doi (DE-627)OLC2035023009 (DE-He213)s11042-015-2511-y-p DE-627 ger DE-627 rakwb eng 070 004 VZ Zeng, Li verfasserin aut Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. Image scrambling Cryptanalysis Known-plaintext attack Chosen-plaintext attack Liu, Renren aut Zhang, Leo Yu aut Liu, Yuansheng aut Wong, Kwok-Wo aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 10 vom: 07. März, Seite 5439-5453 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:10 day:07 month:03 pages:5439-5453 https://doi.org/10.1007/s11042-015-2511-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 10 07 03 5439-5453 |
allfields_unstemmed |
10.1007/s11042-015-2511-y doi (DE-627)OLC2035023009 (DE-He213)s11042-015-2511-y-p DE-627 ger DE-627 rakwb eng 070 004 VZ Zeng, Li verfasserin aut Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. Image scrambling Cryptanalysis Known-plaintext attack Chosen-plaintext attack Liu, Renren aut Zhang, Leo Yu aut Liu, Yuansheng aut Wong, Kwok-Wo aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 10 vom: 07. März, Seite 5439-5453 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:10 day:07 month:03 pages:5439-5453 https://doi.org/10.1007/s11042-015-2511-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 10 07 03 5439-5453 |
allfieldsGer |
10.1007/s11042-015-2511-y doi (DE-627)OLC2035023009 (DE-He213)s11042-015-2511-y-p DE-627 ger DE-627 rakwb eng 070 004 VZ Zeng, Li verfasserin aut Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. Image scrambling Cryptanalysis Known-plaintext attack Chosen-plaintext attack Liu, Renren aut Zhang, Leo Yu aut Liu, Yuansheng aut Wong, Kwok-Wo aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 10 vom: 07. März, Seite 5439-5453 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:10 day:07 month:03 pages:5439-5453 https://doi.org/10.1007/s11042-015-2511-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 10 07 03 5439-5453 |
allfieldsSound |
10.1007/s11042-015-2511-y doi (DE-627)OLC2035023009 (DE-He213)s11042-015-2511-y-p DE-627 ger DE-627 rakwb eng 070 004 VZ Zeng, Li verfasserin aut Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. Image scrambling Cryptanalysis Known-plaintext attack Chosen-plaintext attack Liu, Renren aut Zhang, Leo Yu aut Liu, Yuansheng aut Wong, Kwok-Wo aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 10 vom: 07. März, Seite 5439-5453 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:10 day:07 month:03 pages:5439-5453 https://doi.org/10.1007/s11042-015-2511-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 10 07 03 5439-5453 |
language |
English |
source |
Enthalten in Multimedia tools and applications 75(2015), 10 vom: 07. März, Seite 5439-5453 volume:75 year:2015 number:10 day:07 month:03 pages:5439-5453 |
sourceStr |
Enthalten in Multimedia tools and applications 75(2015), 10 vom: 07. März, Seite 5439-5453 volume:75 year:2015 number:10 day:07 month:03 pages:5439-5453 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Image scrambling Cryptanalysis Known-plaintext attack Chosen-plaintext attack |
dewey-raw |
070 |
isfreeaccess_bool |
false |
container_title |
Multimedia tools and applications |
authorswithroles_txt_mv |
Zeng, Li @@aut@@ Liu, Renren @@aut@@ Zhang, Leo Yu @@aut@@ Liu, Yuansheng @@aut@@ Wong, Kwok-Wo @@aut@@ |
publishDateDaySort_date |
2015-03-07T00:00:00Z |
hierarchy_top_id |
189064145 |
dewey-sort |
270 |
id |
OLC2035023009 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035023009</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503192831.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-015-2511-y</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035023009</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-015-2511-y-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zeng, Li</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2015</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image scrambling</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptanalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Known-plaintext attack</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chosen-plaintext attack</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Renren</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Leo Yu</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Yuansheng</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wong, Kwok-Wo</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">75(2015), 10 vom: 07. März, Seite 5439-5453</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:75</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:10</subfield><subfield code="g">day:07</subfield><subfield code="g">month:03</subfield><subfield code="g">pages:5439-5453</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-015-2511-y</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">75</subfield><subfield code="j">2015</subfield><subfield code="e">10</subfield><subfield code="b">07</subfield><subfield code="c">03</subfield><subfield code="h">5439-5453</subfield></datafield></record></collection>
|
author |
Zeng, Li |
spellingShingle |
Zeng, Li ddc 070 misc Image scrambling misc Cryptanalysis misc Known-plaintext attack misc Chosen-plaintext attack Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher |
authorStr |
Zeng, Li |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)189064145 |
format |
Article |
dewey-ones |
070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1380-7501 |
topic_title |
070 004 VZ Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher Image scrambling Cryptanalysis Known-plaintext attack Chosen-plaintext attack |
topic |
ddc 070 misc Image scrambling misc Cryptanalysis misc Known-plaintext attack misc Chosen-plaintext attack |
topic_unstemmed |
ddc 070 misc Image scrambling misc Cryptanalysis misc Known-plaintext attack misc Chosen-plaintext attack |
topic_browse |
ddc 070 misc Image scrambling misc Cryptanalysis misc Known-plaintext attack misc Chosen-plaintext attack |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Multimedia tools and applications |
hierarchy_parent_id |
189064145 |
dewey-tens |
070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Multimedia tools and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 |
title |
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher |
ctrlnum |
(DE-627)OLC2035023009 (DE-He213)s11042-015-2511-y-p |
title_full |
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher |
author_sort |
Zeng, Li |
journal |
Multimedia tools and applications |
journalStr |
Multimedia tools and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
5439 |
author_browse |
Zeng, Li Liu, Renren Zhang, Leo Yu Liu, Yuansheng Wong, Kwok-Wo |
container_volume |
75 |
class |
070 004 VZ |
format_se |
Aufsätze |
author-letter |
Zeng, Li |
doi_str_mv |
10.1007/s11042-015-2511-y |
dewey-full |
070 004 |
title_sort |
cryptanalyzing an image encryption algorithm based on scrambling and veginère cipher |
title_auth |
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher |
abstract |
Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. © Springer Science+Business Media New York 2015 |
abstractGer |
Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. © Springer Science+Business Media New York 2015 |
abstract_unstemmed |
Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers. © Springer Science+Business Media New York 2015 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 |
container_issue |
10 |
title_short |
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher |
url |
https://doi.org/10.1007/s11042-015-2511-y |
remote_bool |
false |
author2 |
Liu, Renren Zhang, Leo Yu Liu, Yuansheng Wong, Kwok-Wo |
author2Str |
Liu, Renren Zhang, Leo Yu Liu, Yuansheng Wong, Kwok-Wo |
ppnlink |
189064145 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11042-015-2511-y |
up_date |
2024-07-03T23:28:46.061Z |
_version_ |
1803602442124787712 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035023009</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503192831.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-015-2511-y</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035023009</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-015-2511-y-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zeng, Li</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2015</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Recently, an image encryption algorithm based on scrambling and Veginère cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a method composed of both chosen-plaintext attack and differential attacks. This paper briefly reviews the two attack approaches proposed by Zhang et al. and outlines their mathematical interpretations. Based on these approaches, we present an improved chosen-plaintext attack to further reduce the number of chosen-plaintexts required, which is proved to be optimal. Moreover, it is found that an elaborately designed known-plaintext attack can efficiently compromise the image cipher under study. This finding is confirmed by both mathematical analysis and numerical simulations. The cryptanalyzing techniques developed in this paper provide some insights for designing secure and efficient multimedia ciphers.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image scrambling</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptanalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Known-plaintext attack</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chosen-plaintext attack</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Renren</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Leo Yu</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Yuansheng</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wong, Kwok-Wo</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">75(2015), 10 vom: 07. März, Seite 5439-5453</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:75</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:10</subfield><subfield code="g">day:07</subfield><subfield code="g">month:03</subfield><subfield code="g">pages:5439-5453</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-015-2511-y</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">75</subfield><subfield code="j">2015</subfield><subfield code="e">10</subfield><subfield code="b">07</subfield><subfield code="c">03</subfield><subfield code="h">5439-5453</subfield></datafield></record></collection>
|
score |
7.4002237 |