Cryptanalysis of the RCES/RSES image encryption scheme
Li, SJ, Li, CQ, Chen, GR and Lo, KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme Journal of Systems and Software, 81 (7). 1130 - 1143. ISSN 0164-1212
JSS2008.pdf - Accepted Version
Available under License : See the attached licence file.
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two to succeed an attack. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimental analyses are given to show the performance of the suggested known/chosen-plaintext attacks. The insecurity of RCES is due to its special design, which makes it a typical example of insecure image encryption schemes. A number of lessons are drawn from the reported cryptanalysis of RCES, consequently suggesting some common principles for ensuring a high level of security of an image encryption scheme.
|Divisions :||Faculty of Engineering and Physical Sciences > Computing Science|
|Date :||July 2008|
|Identification Number :||10.1016/j.jss.2007.07.037|
|Uncontrolled Keywords :||image encryption, chaotic cryptography, RCES/RSES, cryptanalysis, known-plaintext attack, chosen-plaintext attack, CKBA, MULTIMEDIA DATA-TRANSMISSION, SIGNAL SECURITY SYSTEM, CRYPTOGRAPHY SYSTEM, VLSI REALIZATION, BINARY IMAGES, SCAN PATTERNS, ALGORITHM, DESIGN, MAPS|
|Related URLs :|
|Additional Information :||NOTICE: This is the author's version of a work that was accepted by Journal of Systems and Software in July 2007. Changes resulting from the publish- ing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be re ected in this document. Changes may have been made to this work since it was submitted for pub- lication. A de�nitive version has been published in Journal of Systems and Software, vol. 81, no. 7, pp. 1130-1143, 2008, DOI: 10.1016/j.jss.2007.07.037.|
|Depositing User :||Symplectic Elements|
|Date Deposited :||26 May 2012 12:34|
|Last Modified :||23 Sep 2013 19:26|
Actions (login required)
Downloads per month over past year