Cryptanalyzing an encryption scheme based on blind source separation
Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalyzing an encryption scheme based on blind source separation IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 55 (4). 1055 - 1063. ISSN 1549-8328
|PDF - Accepted Version |
Available under License : See the attached licence file.
Official URL: http://dx.doi.org/10.1109/TCSI.2008.916540
Recently, there was a proposal of using the underdetermined blind source separation (BSS) principle to design image and speech encryption. In this paper, we report a cryptanalysis of this BSS-based encryption scheme and point out that it is not secure against known-/chosen-plaintext attack and chosen-ciphertext attack. In addition, we discuss some other security defects of the schemes: (1) it has a low sensitivity to part of the key and to the plaintext; (2) it is weak against a ciphertext-only differential attack; and (3) a divide-and-conquer (DAC) attack can be used to break part of the key. We finally analyze the role of BSS in this approach towards cryptographically secure ciphers.
Copyright 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
|Uncontrolled Keywords:||blind source separation (BSS), chosen-ciphertext attack, chosen-plaintext attack, cryptanalysis, differential attack, divide-and-conquer (DAC) attack, image encryption, known-plaintext attack, speech encryption, IMAGE ENCRYPTION, FEA-M, SECURITY, ALGORITHM, VIDEO|
|Divisions:||Faculty of Engineering and Physical Sciences > Computing Science|
|Deposited By:||Symplectic Elements|
|Deposited On:||11 May 2012 14:49|
|Last Modified:||28 Apr 2013 14:33|
Repository Staff Only: item control page