A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Li, SJ, Li, CQ, Chen, GR, Bourbakis, NG and Lo, KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Processing-Image Communication, 23 (3). pp. 212-223.
SPIC2008.pdf - Accepted version Manuscript
Available under License : See the attached licence file.
In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper performs a quantitative cryptanalysis on the performance of these kind of ciphers against plaintext attacks. When the plaintext is of size MxN and with L different levels of values, the following quantitative cryptanalytic findings have been concluded under the assumption of a uniform distribution of each element in the plaintext: (1) all permutation-only multimedia ciphers are practically insecure against known/chosen-plaintext attacks in the sense that only O(log_L(MN)) known/chosen plaintexts are sufficient to recover not less than (in an average sense) half elements of the plaintext; (2) the computational complexity of the known/chosen-plaintext attack is only O(n(MN)^2), where n is the number of known/chosen plaintexts used. When the plaintext has a non-uniform distribution, the number of required plaintexts and the computational complexity is also discussed. Experiments are given to demonstrate the real performance of the known-plaintext attack for a typical permutation-only image cipher.
|Divisions :||Faculty of Engineering and Physical Sciences > Computing Science|
|Date :||March 2008|
|Identification Number :||https://doi.org/10.1016/j.image.2008.01.003|
|Uncontrolled Keywords :||permutation-only multimedia encryption, image, video, speech, cryptanalysis, known-plaintext attack, chosen-plaintext attack, IMAGE ENCRYPTION METHOD, SPEECH ENCRYPTION, BINARY IMAGES, SCAN PATTERNS, SCHEME, VIDEO, COMPRESSION, SECURITY, DOMAIN, JOINT|
|Related URLs :|
|Additional Information :||NOTICE: This is the author’s version of a work that was accepted by Signal Processing: Image Communication in January 2008. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version has been published in Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, 2008, DOI: 10.1016/j.image.2008.01.003.|
|Depositing User :||Symplectic Elements|
|Date Deposited :||26 May 2012 12:37|
|Last Modified :||23 Sep 2013 19:26|
Actions (login required)
Downloads per month over past year