University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Cryptanalysis of the RCES/RSES image encryption scheme

Li, SJ, Li, CQ, Chen, GR and Lo, KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme Journal of Systems and Software, 81 (7). pp. 1130-1143.

JSS2008.pdf - Accepted version Manuscript
Available under License : See the attached licence file.

Download (1MB)
Text (licence)

Download (33kB)


Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two to succeed an attack. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimental analyses are given to show the performance of the suggested known/chosen-plaintext attacks. The insecurity of RCES is due to its special design, which makes it a typical example of insecure image encryption schemes. A number of lessons are drawn from the reported cryptanalysis of RCES, consequently suggesting some common principles for ensuring a high level of security of an image encryption scheme.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Li, SJ
Li, CQ
Chen, GR
Lo, KT
Date : July 2008
DOI : 10.1016/j.jss.2007.07.037
Uncontrolled Keywords : image encryption, chaotic cryptography, RCES/RSES, cryptanalysis, known-plaintext attack, chosen-plaintext attack, CKBA, MULTIMEDIA DATA-TRANSMISSION, SIGNAL SECURITY SYSTEM, CRYPTOGRAPHY SYSTEM, VLSI REALIZATION, BINARY IMAGES, SCAN PATTERNS, ALGORITHM, DESIGN, MAPS
Related URLs :
Additional Information : NOTICE: This is the author's version of a work that was accepted by Journal of Systems and Software in July 2007. Changes resulting from the publish- ing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be re ected in this document. Changes may have been made to this work since it was submitted for pub- lication. A de�nitive version has been published in Journal of Systems and Software, vol. 81, no. 7, pp. 1130-1143, 2008, DOI: 10.1016/j.jss.2007.07.037.
Depositing User : Symplectic Elements
Date Deposited : 26 May 2012 12:34
Last Modified : 31 Oct 2017 14:35

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800