Paper 2023/1874
Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
Abstract
In 2023, Mfungo et al. introduce an image encryption scheme that employs the Kronecker xor product, the Hill cipher and a chaotic map. Their proposal uses the chaotic map to dynamically generate two out of the three secret keys employed by their scheme. Note that both keys are dependent on the size of the original image, while the Hill key is static. Despite the authors' assertion that their proposal offers sufficient security (
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Minor revision. ICISSP 2024
- Keywords
- image encryption schemechaos based encryptioncryptanalysis
- Contact author(s)
- george teseleanu @ yahoo com
- History
- 2024-06-03: revised
- 2023-12-06: received
- See all versions
- Short URL
- https://ia.cr/2023/1874
- License
-
CC BY-NC-SA
BibTeX
@misc{cryptoeprint:2023/1874, author = {George Teseleanu}, title = {Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1874}, year = {2023}, url = {https://eprint.iacr.org/2023/1874} }