Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem

نویسندگان

  • Chengqing Li
  • Yuansheng Liu
  • Leo Yu Zhang
  • Kwok-Wo Wong
چکیده

As a fundamental of number theory, Chinese Re1 minder Theorem (CRT) is widely used to construct cryptographic 2 primitive. This paper studies security of a compression and 3 encryption scheme based on CRT, called CECRT. Based on 4 some properties of CRT, the equivalent secret key of CECRT 5 can be reconstructed efficiently: the pair number of required 6 of chosen plaintext and the corresponding ciphertext is only 7 (1 + d(log2 L)/le); the attack complexity is only O(L), where 8 L is the size of the plaintext, and l is binary size of every plain9 element. In addition, some other defects of CECRT, including 10 invalid compression function, are also reported. 11

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information technology Image encryption algorithm based on chaotic mapping and Chinese remainder theorem

When the image data are regularly changed, existing image encryption algorithm is easy to be decrypted. In order to improve the security of encryption algorithm, this paper proposes an image encryption algorithm based on chaotic mapping and Chinese remainder theorem. The encryption algorithm is divided into pixel scrambling and image diffusion. Firstly, the Chebyshev mapping is used to generate...

متن کامل

A New Chinese Remainder Algorithm for Image-based Encryption

In this paper, a novel method for image encryption based on a Generalized Chinese Remainder Theorem (GCRT) is presented. The proposed method is based on the work developed by Jagannathan et al. Some modifications are proposed in order to increase the method's encryption quality and its robustness against attacks. Specifically, the inclusion of a vector to reduce the segment pixel space and a Ge...

متن کامل

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutia...

متن کامل

Multiway Tree-Based Group Key Management Using Chinese Remainder Theorem for Multi-Privileged Group Communications

Key management becomes more difficult in multi-privileged communications due to the dynamic membership and the complex relations between users and resources. In this paper, we propose a novel key management scheme in which the key graph is based on multiway trees. Chinese remainder theorem is employed to combine some encrypted rekeying materials into a short message for rekeying. As a result, u...

متن کامل

Cryptanalyzing an image encryption scheme based on logistic map

Chaotic behavior arising from very simple non-linear dynamical equation of logistic map makes it was used often in designing chaotic image encryption schemes. However, some properties of chaotic maps can also facilitate cryptanalysis especially when they are implemented in digital domain. Utilizing stable distribution of the chaotic states generated by iterating the logistic map, this paper pre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Sig. Proc.: Image Comm.

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2014