• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
  • Jun 14, 2017 News!Vol.9, No.3 has been published with online version. 15 peer reviewed articles from 8 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2012 Vol.4(6): 938-943 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.611

Impact of Rotations in the Salsa 20/8 Image Encryption Scheme

Alireza Jolfaei, Abdolrasoul Mirghadri, and Ahmadreza Vizandan

Abstract—Salsa20 uses a single set of rotation distances within its core function. To our knowledge, no design rationales on the choice of rotation distances are given on the Salsa20 core function. This is the first paper that analyzes rotations influence over the output sequence in the Salsa20 image encryption scheme. We focus on the Salsa20/8 image encryption scheme and use recent developments in the analysis of the Salsa20 core function to evaluate the security implications of using different sets of rotation distances in the core function. Finally, we give some observations on the some sets of rotation distances used in the Salsa20/8 image encryption scheme.

Index Terms—Salsa20, image encryption, rotation distance.

A. Jolfaei is with the Department of Information and Communication Technology (ICT), Griffith University, Gold Coast campus, Queensland, Australia (e-mail: Jolfaei@yahoo.com).
A. Mirghadri and A. Vizandan are with the the Faculty and Research Center of Communication and Information Technology, IHU, Tehran, Iran.

[PDF]

Cite: Alireza Jolfaei, Abdolrasoul Mirghadri, and Ahmadreza Vizandan, "Impact of Rotations in the Salsa 20/8 Image Encryption Scheme," International Journal of Computer Theory and Engineering vol. 4, no. 6, pp. 938-943, 2012.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com