Security problems with improper implementations of improved FEA-M

Shujun Li, Kwok Tung Lo

Research output: Journal article publicationJournal articleAcademic researchpeer-review

8 Citations (Scopus)


This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-dependent differential chosen-plaintext attack or its chosen-ciphertext counterpart can reveal the secret key of the cryptosystem, if the involved (pseudo-)random process can be tampered (for example, through a public time service). The implementation-dependent differential attack is very efficient in complexity and needs only O(n2) chosen plaintext or ciphertext bits. In addition, this paper also points out a minor security problem with the selection of the session key. In real implementations of the cryptosystem, these security problems should be carefully avoided, or the cryptosystem has to be further enhanced to work under such weak implementations.
Original languageEnglish
Pages (from-to)791-794
Number of pages4
JournalJournal of Systems and Software
Issue number5
Publication statusPublished - 1 May 2007


  • Chosen-ciphertext attack
  • Chosen-plaintext attack
  • Differential attack
  • FEA-M
  • Insecure implementation
  • Multimedia encryption
  • Pseudo-random process

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Software


Dive into the research topics of 'Security problems with improper implementations of improved FEA-M'. Together they form a unique fingerprint.

Cite this