Cryptanalyzing an encryption scheme based on blind source separation
Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalyzing an encryption scheme based on blind source separation IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 55 (4). 1055 - 1063. ISSN 1549-8328
IEEETCASI2008.pdf - Accepted Version
Available under License : See the attached licence file.
Recently, there was a proposal of using the underdetermined blind source separation (BSS) principle to design image and speech encryption. In this paper, we report a cryptanalysis of this BSS-based encryption scheme and point out that it is not secure against known-/chosen-plaintext attack and chosen-ciphertext attack. In addition, we discuss some other security defects of the schemes: (1) it has a low sensitivity to part of the key and to the plaintext; (2) it is weak against a ciphertext-only differential attack; and (3) a divide-and-conquer (DAC) attack can be used to break part of the key. We finally analyze the role of BSS in this approach towards cryptographically secure ciphers.
Copyright 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
|Uncontrolled Keywords:||blind source separation (BSS), chosen-ciphertext attack, chosen-plaintext attack, cryptanalysis, differential attack, divide-and-conquer (DAC) attack, image encryption, known-plaintext attack, speech encryption, IMAGE ENCRYPTION, FEA-M, SECURITY, ALGORITHM, VIDEO|
|Divisions:||Faculty of Engineering and Physical Sciences > Computing Science|
|Depositing User:||Symplectic Elements|
|Date Deposited:||11 May 2012 13:49|
|Last Modified:||23 Sep 2013 19:26|
Actions (login required)
Downloads per month over past year