Journal
JOURNAL OF SYSTEMS AND SOFTWARE
Volume 79, Issue 2, Pages 253-258Publisher
ELSEVIER SCIENCE INC
DOI: 10.1016/j.jss.2005.04.021
Keywords
DSEA; dominos; cryptanalysis; encryption; ciphertext-only attack; known-plaintext attack; chosen-plaintext attack
Ask authors/readers for more resources
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security of DSEA, and points out the following weaknesses: (1) its security against the brute-force attack was overestimated; (2) it is not sufficiently secure against ciphertext-only attacks, and only one ciphertext is enough to get some information about the plaintext and to break the value of a sub-key; (3) it is insecure against known/chosen-plaintext attacks, in the sense that the secret key can be recovered from a number of continuous bytes of only one known/chosen plaintext and the corresponding ciphertext. Experimental results are given to show the performance of the proposed attacks, and some countermeasures are discussed to improve DSEA. (C) 2005 Elsevier Inc. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available