Reducing the key space of an image encryption scheme based on two-round diffusion process

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this work, we analyze the security of the image encryption scheme proposed by Norouzi et al. (Multimedia Syst 20:45–64, 2014) [1]. The encryption scheme is based on a hash function and a two-round diffusion process applied to each 8 × 8 patches that compose the entire image. The analysis reveals the existence of a huge number of weak keys, allowing us to compute the effective key length, thus reducing the key space from 2512 to 2195 keys.

Cite

CITATION STYLE

APA

Peinado, A., & García, A. O. (2015). Reducing the key space of an image encryption scheme based on two-round diffusion process. In Advances in Intelligent Systems and Computing (Vol. 369, pp. 447–453). Springer Verlag. https://doi.org/10.1007/978-3-319-19713-5_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free