Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
نویسندگان
چکیده
منابع مشابه
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
As a fundamental of number theory, Chinese Re1 minder Theorem (CRT) is widely used to construct cryptographic 2 primitive. This paper studies security of a compression and 3 encryption scheme based on CRT, called CECRT. Based on 4 some properties of CRT, the equivalent secret key of CECRT 5 can be reconstructed efficiently: the pair number of required 6 of chosen plaintext and the corresponding...
متن کاملRobust Threshold Schemes Based on the Chinese Remainder Theorem
Recently, Chinese Remainder Theorem (CRT) based function sharing schemes are proposed in the literature. In this paper, we investigate how a CRT-based threshold scheme can be enhanced with the robustness property. To the best of our knowledge, these are the first robust threshold cryptosystems based on a CRT-based secret sharing.
متن کاملInformation technology Image encryption algorithm based on chaotic mapping and Chinese remainder theorem
When the image data are regularly changed, existing image encryption algorithm is easy to be decrypted. In order to improve the security of encryption algorithm, this paper proposes an image encryption algorithm based on chaotic mapping and Chinese remainder theorem. The encryption algorithm is divided into pixel scrambling and image diffusion. Firstly, the Chebyshev mapping is used to generate...
متن کاملA New Chinese Remainder Algorithm for Image-based Encryption
In this paper, a novel method for image encryption based on a Generalized Chinese Remainder Theorem (GCRT) is presented. The proposed method is based on the work developed by Jagannathan et al. Some modifications are proposed in order to increase the method's encryption quality and its robustness against attacks. Specifically, the inclusion of a vector to reduce the segment pixel space and a Ge...
متن کاملIP traceback based on chinese remainder theorem
IP traceback is a defense method to help a victim to identifying the sources of attacking packets. In this paper, we propose an IP traceback method based on the Chinese Remainder Theorem to require routers to probabilistically mark packets with partial path information when packets traverse routers through the Internet. The routers with the proposed IP traceback method can interoperate seamless...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Signal Processing: Image Communication
سال: 2014
ISSN: 0923-5965
DOI: 10.1016/j.image.2014.06.011