Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2008, Vol. 9 Issue (8): 1118-1123    DOI: 10.1631/jzus.A0720102
Electrical & Electronic Engineering     
Cryptanalysis of an image encryption scheme based on the Hill cipher
Cheng-qing LI, Dan ZHANG, Guan-rong CHEN
Department of Electronic Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong, China; School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al., 2006) and reports its following problems: (1) There is a simple necessary and sufficient condition that makes a number of secret keys invalid; (2) It is insensitive to the change of the secret key; (3) It is insensitive to the change of the plain-image; (4) It can be broken with only one known/chosen plaintext; (5) It has some other minor defects. The proposed cryptanalysis discourages any use of the scheme in practice.

Key wordsCryptanalysis      Encryption      Hill cipher      Known-plaintext attack      Chosen-plaintext attack     
Received: 19 December 2007     
CLC:  TP309  
  TN918  
Cite this article:

Cheng-qing LI, Dan ZHANG, Guan-rong CHEN. Cryptanalysis of an image encryption scheme based on the Hill cipher. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1118-1123.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.A0720102     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2008/V9/I8/1118

[1] Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ. Comments on “How to repair the Hill cipher”[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 211-214.
[2] BAO Liang-hua, CHEN Lin-fei, ZHAO Dao-mu. Optical encryption with cascaded fractional wavelet transforms[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(8 ): 18-.
[3] ISMAIL I.A., AMIN Mohammed, DIAB Hossam. How to repair the Hill cipher[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(12): 11-.
[4] ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang. Decryption of pure-position permutation algorithms[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(7): 803-809.