Paper 2024/1334
Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
Abstract
In 2023, Mfungo et al. presented an image encryption scheme that relies on a series of diffusion techniques and uses a chaotic map to generate three secret keys. Note that two out of three keys are dynamically generated based on the size of the original image, while the remaining key is static. The authors claim that their proposal offers
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. ICISSP 2024 (Post Publication Paper)
- Keywords
- image encryption schemechaos based encryptioncryptanalysis
- Contact author(s)
- george teseleanu @ yahoo com
- History
- 2024-08-30: approved
- 2024-08-26: received
- See all versions
- Short URL
- https://ia.cr/2024/1334
- License
-
CC BY-NC-SA
BibTeX
@misc{cryptoeprint:2024/1334, author = {George Teseleanu}, title = {Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1334}, year = {2024}, url = {https://eprint.iacr.org/2024/1334} }