LIU Ting, MIN Lequan. Chosen-plaintext Attack on a Chaotic Image Cipher[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 546-549.
Citation: LIU Ting, MIN Lequan. Chosen-plaintext Attack on a Chaotic Image Cipher[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 546-549.

Chosen-plaintext Attack on a Chaotic Image Cipher

Funds: 国家自然科学基金资助项目(60674059,60773120)
More Information
  • Received Date: March 14, 2010
  • Revised Date: July 08, 2013
  • Published Date: May 04, 2010
  • The security of the chaotic cryptosystem based on general cat map and additive modular arithmetic is studied.Several weaknesses of the cipher are pointed out.By choosing three plaintexts,the one-round cryptosystem can be broken.The problems to be solved in the cryptosystem and possible improved methods are discussed.
  • Related Articles

    [1]XU Chengquan, FAN Qian. Denoising Method for Deformation Monitoring Data Based on ICEEMD-ICA and MDP Principle[J]. Geomatics and Information Science of Wuhan University, 2021, 46(11): 1658-1665. DOI: 10.13203/j.whugis20190174
    [2]LIU Zhenghui, ZHANG Yu, QIN Xinghong. Robust Speech Watermarking Algorithm Against Recapturing Attacks[J]. Geomatics and Information Science of Wuhan University, 2021, 46(2): 303-308. DOI: 10.13203/j.whugis20190052
    [3]DING Ziyue, LIU Haiyan, CHEN Xiaohui, MA Hongchuan. Cox Regression Analysis of National Terrorist Attacks Considering Spatial and Temporal Factors[J]. Geomatics and Information Science of Wuhan University, 2020, 45(12): 1949-1959. DOI: 10.13203/j.whugis20200189
    [4]REN Na, ZHU Changqing, WANG Zhiwei. Semi-blind Watermarking Algorithm Resistance on Geometrical Attacks for High-Resolution Remote Sensing Image[J]. Geomatics and Information Science of Wuhan University, 2011, 36(3): 329-332.
    [5]DENG Gaoming, ZHANG Peng, ZHAO Qiang, LIU Xiaoqin. Difference Timing Attack Against AES Based on Cache Timing Character[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1088-1091.
    [6]GUO Jindi, ZHOU Yanzhou. Design of a Symmetric Image Encryption Algorithm Based on Complex Chaotic Sequence[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1084-1087.
    [7]WANG Bangju, ZHANG Huanguo, WANG Zhangyi, WANG Yuhua. A Secure Mutual Password Authentication Scheme with User Anonymity[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1073-1075.
    [8]ZHANG Peiyun, HUANG Bo, SUN Yamin. A Hybrid Selection Approach for Web Services Based on Semantic Matching and QoS[J]. Geomatics and Information Science of Wuhan University, 2008, 33(5): 537-541.
    [9]LIANG Qin'ou. Researches on Obstacle Location-allocation Problem Based on Clonal Selection Principle[J]. Geomatics and Information Science of Wuhan University, 2007, 32(8): 744-747.
    [10]WANG Qing, XU Xin, GUAN Bao, SUN Hong. An Algorithm for SAR Image Filtering Based on Bayesian Principle and MRF Modeling[J]. Geomatics and Information Science of Wuhan University, 2005, 30(5): 464-467.

Catalog

    Article views (827) PDF downloads (857) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return