Skip to main content

Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion Process

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 369))

Abstract

In this work, we analyze the security of the image encryption scheme proposed by Norouzi et al. (Multimedia Syst 20:45–64, 2014) [1]. The encryption scheme is based on a hash function and a two-round diffusion process applied to each 8 × 8 patches that compose the entire image. The analysis reveals the existence of a huge number of weak keys, allowing us to compute the effective key length, thus reducing the key space from 2512 to 2195 keys.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on hash function with only two-round diffusion process. Multimed. Syst. 20, 45–64 (2014)

    Article  Google Scholar 

  2. Bernstein, D.J.: “The Salsa20 Stream Cipher.” SKEW2005, Symmetric Key Encryption Workshop, 2005, Workshop Record. http://www.ecrypt.eu.org/stream/salsa20p2.html

Download references

Acknowledgments

This work has been supported by the MICINN under project “TUERI: Technologies for secure and efficient wireless networks within the Internet of Things with applications to transport and logistics”, TIN2011-25452.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Peinado .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Peinado, A., García, A.O. (2015). Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion Process. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics