Skip to main content
Log in

Cryptanalysis of an image encryption scheme based on the Hill cipher

  • Comment
  • Published:
Journal of Zhejiang University-SCIENCE A Aims and scope Submit manuscript

Abstract

This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al., 2006) and reports its following problems: (1) There is a simple necessary and sufficient condition that makes a number of secret keys invalid; (2) It is insensitive to the change of the secret key; (3) It is insensitive to the change of the plain-image; (4) It can be broken with only one known/chosen plaintext; (5) It has some other minor defects. The proposed cryptanalysis discourages any use of the scheme in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Alvarez, G., Li, S., 2006. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos, 16(8):2129–2151. [doi:10.1142/S0218127406015970]

    Article  MathSciNet  MATH  Google Scholar 

  • Alvarez, G., Li, S., Hernandez, L., 2007. Analysis of security problems in a medical image encryption system. Comput. Biol. Med., 37(3):424–427. [doi:10.1016/j.compbiomed.2006.04.002]

    Article  Google Scholar 

  • Hill, L.S., 1929. Cryptography in an algebraic alphabet. Am. Math. Month., 36(6):306–312. [doi:10.2307/2298294]

    Article  MathSciNet  MATH  Google Scholar 

  • Ismail, I.A., Amin, M., Diab, H., 2006. How to repair the Hill cipher. J. Zhejiang Univ. Sci. A, 7(12):2022–2030. [doi:10.1631/jzus.2006.A2022]

    Article  MATH  Google Scholar 

  • Li, C., 2005. Cryptanalyses of Some Multimedia Encryption Schemes. MS Thesis, Department of Mathematics, Zhejiang University, Hangzhou, China (in Chinese).

    Google Scholar 

  • Li, C., Li, S., Zhang, D., Chen, G., 2004. Cryptanalysis of a chaotic neural network based multimedia encryption scheme. LNCS, 3333:418–425. [doi:10.1007/b104121]

    Google Scholar 

  • Li, C., Li, S., Chen, G., Chen, G., Hu, L., 2005a. Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J. Appl. Signal Process., 2005(8): 1277–1288. [doi:10.1155/ASP.2005.1277]

    Article  MathSciNet  MATH  Google Scholar 

  • Li, C., Li, S., Zhang, D., Chen, G., 2005b. Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher. LNCS, 3497:630–636. [doi:10.1007/11427445_103]

    MATH  Google Scholar 

  • Li, C., Li, S., Lou, D.C., 2006. On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA). J. Syst. Soft., 79(2):253–258. [doi:10.1016/j.jss.2005.04.021]

    Article  Google Scholar 

  • Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.T., 2007a. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A, 369(1–2):23–30. [doi:10.1016/j.physleta.2007.04.023]

    Article  MATH  Google Scholar 

  • Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G., 2007b. On the Security Defects of an Image Encryption Scheme. Cryptology ePrint Archive: Report 2007/397. Available at http://eprint.iacr.org/2007/397, Oct. 6, 2007.

  • Li, S., 2003. Analyses and New Designs of Digital Chaotic Ciphers. Ph.D Thesis, School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an, China (in Chinese).

    Google Scholar 

  • Li, S., Chen, G., Zheng, X., 2004. Chaos-based Encryption for Digital Images and Videos. In: Furht, B., Kirovski, D. (Eds.), Multimedia Security Handbook. CRC Press, LLC, p.133–167.

  • Li, S., Li, C., Lo, K.T., Chen, G., 2006. Cryptanalysis of an image encryption scheme. J. Electr. Imag., 15(4). [doi:10.1117/1.2360697]

  • Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.T., 2007. On the design of perceptual MPEG-video encryption algorithms. IEEE Trans. on Circuits Syst. Video Technol., 17(2):214–223. [doi:10.1109/TCSVT.2006.888840]

    Article  Google Scholar 

  • Li, S., Li, C., Chen, G., Mou, X., 2008a. Cryptanalysis of the RCES/RSES image encryption scheme. J. Syst. Soft., 81(7):1130–1143. [doi:10.1016/j.jss.2007.07.037]

    Article  Google Scholar 

  • Li, S., Li, C., Lo, K.T., Chen, G., 2008b. Cryptanalysis of an image scrambling scheme without bandwidth expansion. IEEE Trans. on Circuits Syst. Video Technol., 18(3): 338–349. [doi:10.1109/TCSVT.2008.918116]

    Article  Google Scholar 

  • Overbey, J., Traves, W., Wojdylo, J., 2005. On the keyspace of the Hill cipher. Cryptologia, 29(1):59–72. [doi:10.1080/0161-110591893771]

    Article  MATH  Google Scholar 

  • Rangel-Romero, Y., Vega-García, R., Menchaca-Méndez, A., Acoltzi-Cervantes, D., Martínez-Ramos, L., Mecate-Zambrano, M., Montalvo-Lezama, F., Barrón-Vidales, J., Cortez-Duarte, N., Rodríguez-Henríquez, F., 2008. Comments on “How to repair the Hill cipher”. J. Zhejiang Univ. Sci. A, 9(2):211–214. [doi:10.1631/jzus.A072143]

    Article  MATH  Google Scholar 

  • Shannon, C.E., 1949. Communication theory of secrecy systems. Bell Syst. Tech. J., 28(4):656–715.

    Article  MathSciNet  MATH  Google Scholar 

  • Zhou, J., Liang, Z., Chen, Y., Au, O.C., 2007. Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process. Lett., 14(3):201–204. [doi:10.1109/LSP.2006.884012]

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-qing Li.

Additional information

Project supported by the National Basic Research Program of China (No. 2006CB303104) and the City University of Hong Kong under the SRG Project, China (No. 7002134)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, Cq., Zhang, D. & Chen, Gr. Cryptanalysis of an image encryption scheme based on the Hill cipher. J. Zhejiang Univ. Sci. A 9, 1118–1123 (2008). https://doi.org/10.1631/jzus.A0720102

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/jzus.A0720102

Key words

CLC number

Navigation