loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: George Teşeleanu 1 ; 2

Affiliations: 1 Advanced Technologies Institute, 10 Dinu Vintilă, Bucharest, Romania ; 2 Simion Stoilow Institute of Mathematics of the Romanian Academy, 21 Calea Grivitei, Bucharest, Romania

Keyword(s): Image Encryption Scheme, Chaos Based Encryption, Cryptanalysis.

Abstract: In 2023, Mfungo et al. introduce an image encryption scheme that employs the Kronecker xor product, the Hill cipher and a chaotic map. Their proposal uses the chaotic map to dynamically generate two out of the three secret keys employed by their scheme. Note that both keys are dependent on the size of the original image, while the Hill key is static. Despite the authors’ assertion that their proposal offers sufficient security (149 bits) for transmitting color images over unsecured channels, we found that this is not accurate. To support our claim, we present a chosen plaintext attack that requires 2 oracle queries and has a worse case complexity of O(2 32 ). Note that in this case Mfungo et al.’s scheme has a complexity of O(233 ), and thus our attack is two times faster than an encryption. The reason why this attack is viable is that the two keys remain unchanged for different plaintext images of the same size, while the Hill key remains unaltered for all images.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.119.159.150

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Teşeleanu, G. (2024). Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. In Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-683-5; ISSN 2184-4356, SciTePress, pages 467-473. DOI: 10.5220/0012307800003648

@conference{icissp24,
author={George Teşeleanu.},
title={Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map},
booktitle={Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP},
year={2024},
pages={467-473},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012307800003648},
isbn={978-989-758-683-5},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP
TI - Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
SN - 978-989-758-683-5
IS - 2184-4356
AU - Teşeleanu, G.
PY - 2024
SP - 467
EP - 473
DO - 10.5220/0012307800003648
PB - SciTePress