pith. machine review for the scientific record. sign in

arxiv: 0712.0693 · v1 · submitted 2007-12-05 · 💻 cs.CR

Recognition: unknown

Cryptanalysis of an image encryption scheme based on the Hill cipher

Authors on Pith no claims yet
classification 💻 cs.CR
keywords changecipherencryptionhillimageinsensitiveschemesecret
0
0 comments X
read the original abstract

This paper studies the security of an image encryption scheme based on the Hill cipher and reports its following problems: 1) there is a simple necessary and sufficient condition that makes a number of secret keys invalid; 2) it is insensitive to the change of the secret key; 3) it is insensitive to the change of the plain-image; 4) it can be broken with only one known/chosen-plaintext; 5) it has some other minor defects.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.