Impact of Rotations in the Salsa20/8 Image Encryption Scheme

View/ Open
Author(s)
Jolfaei, Alireza
Mirghadri, Abdolrasoul
Vizandan, Ahmadreza
Griffith University Author(s)
Year published
2012
Metadata
Show full item recordAbstract
Salsa20 uses a single set of rotation distances within its core function. To our knowledge, no design rationales on the choice of rotation distances are given on the Salsa20 core function. This is the first paper that analyzes rotations influence over the output sequence in the Salsa20 image encryption scheme. We focus on the Salsa20/8 image encryption scheme and use recent developments in the analysis of the Salsa20 core function to evaluate the security implications of using different sets of rotation distances in the core function. Finally, we give some observations on the some sets of rotation distances used in the ...
View more >Salsa20 uses a single set of rotation distances within its core function. To our knowledge, no design rationales on the choice of rotation distances are given on the Salsa20 core function. This is the first paper that analyzes rotations influence over the output sequence in the Salsa20 image encryption scheme. We focus on the Salsa20/8 image encryption scheme and use recent developments in the analysis of the Salsa20 core function to evaluate the security implications of using different sets of rotation distances in the core function. Finally, we give some observations on the some sets of rotation distances used in the Salsa20/8 image encryption scheme.
View less >
View more >Salsa20 uses a single set of rotation distances within its core function. To our knowledge, no design rationales on the choice of rotation distances are given on the Salsa20 core function. This is the first paper that analyzes rotations influence over the output sequence in the Salsa20 image encryption scheme. We focus on the Salsa20/8 image encryption scheme and use recent developments in the analysis of the Salsa20 core function to evaluate the security implications of using different sets of rotation distances in the core function. Finally, we give some observations on the some sets of rotation distances used in the Salsa20/8 image encryption scheme.
View less >
Journal Title
International Journal of Computer Theory and Engineering
Volume
4
Issue
6
Copyright Statement
© 2012 IACSIT. The attached file is reproduced here in accordance with the copyright policy of the publisher. Please refer to the journal's website for access to the definitive, published version.
Subject
Numerical Computation
Artificial Intelligence and Image Processing
Distributed Computing