Skip to main content

Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion Process

  • Conference paper
  • First Online:
International Joint Conference (CISIS 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 369))

Abstract

In this work, we analyze the security of the image encryption scheme proposed by Norouzi et al. (Multimedia Syst 20:45–64, 2014) [1]. The encryption scheme is based on a hash function and a two-round diffusion process applied to each 8 × 8 patches that compose the entire image. The analysis reveals the existence of a huge number of weak keys, allowing us to compute the effective key length, thus reducing the key space from 2512 to 2195 keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on hash function with only two-round diffusion process. Multimed. Syst. 20, 45–64 (2014)

    Article  Google Scholar 

  2. Bernstein, D.J.: “The Salsa20 Stream Cipher.” SKEW2005, Symmetric Key Encryption Workshop, 2005, Workshop Record. http://www.ecrypt.eu.org/stream/salsa20p2.html

Download references

Acknowledgments

This work has been supported by the MICINN under project “TUERI: Technologies for secure and efficient wireless networks within the Internet of Things with applications to transport and logistics”, TIN2011-25452.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Peinado .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Peinado, A., García, A.O. (2015). Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion Process. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics