Image Encryption Based on Elliptic Curve Points and Linear Fractional Transformation

被引:2
作者
Jamal, Sajjad Shaukat [1 ]
Bassfar, Zaid [2 ]
Lahlou, Ouafae [3 ]
Aljaedi, Amer [4 ]
Hazzazi, Mohammad Mazyad [1 ]
机构
[1] King Khalid Univ, Coll Sci, Dept Math, Abha 61413, Saudi Arabia
[2] Univ Tabuk, Dept Informat Technol, Tabuk 71491, Saudi Arabia
[3] Jazan Univ, Darb Univ Coll, Dept Math, Jazan 45142, Saudi Arabia
[4] Univ Tabuk, Coll Comp & Informat Technol, Tabuk 71491, Saudi Arabia
关键词
Mordell elliptic curve; Galois field; substitution box; pseudo-random numbers Generator; image encryption; CHAOS;
D O I
10.1109/ACCESS.2024.3385677
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The elliptic curve (EC) offers a well-organized and secure method for implementing cryptographic protocols in computer systems. Its broad utilization in various applications, such as ensuring secure communications, digital signatures, and key agreement protocols, underscores its significance in contemporary computing. In this article, we employed EC over a binary extension field (BEF), a choice that not only maintains security but also reduces computational overhead when compared to the use of large prime numbers. Our encryption scheme encompasses three primary phases. Firstly, we employ EC points over a BEF in conjunction with a piecewise function to hide the original image. Subsequently, to inject a high degree of confusion into the plaintext, we constructed a substitution box (S-box) grounded in EC principles and applied linear fractional transformation (LFT) to the generated EC points. This S-box is then used to rearrange the pixels of the previously masked image. Lastly, to introduce diffusion throughout the image and generate a ciphertext, we derive pseudo-random numbers (PRNs) using the coordinates of the EC and the characteristics of the BEF. Moreover, the proposed scheme has nonlinearity (NL) 112 for each S-box which is optimal value. Furthermore, we conducted computational experiments that substantiate the robust security of our proposed cryptosystem against linear, differential, and statistical attacks when compared to existing cryptographic systems.
引用
收藏
页码:53335 / 53347
页数:13
相关论文
共 40 条
[1]   Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Amin, Mohamed ;
Iliyasu, Abdullah M. .
SCIENTIFIC REPORTS, 2020, 10 (01)
[2]   A hybrid chaotic system and cyclic elliptic curve for image encryption [J].
Abd El-Latif, Ahmed A. ;
Niu, Xiamu .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (02) :136-143
[3]   Globalized firefly algorithm and chaos for designing substitution box [J].
Alhadawi, Hussam S. ;
Lambic, Dragan ;
Zolkipli, Mohamad Fadli ;
Ahmad, Musheer .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
[4]   Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application [J].
Ayubi, Peyman ;
Setayeshi, Saeed ;
Rahmani, Amir Masoud .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[5]   Information flow in finite flocks [J].
Brown, J. ;
Bossomaier, T. ;
Barnett, L. .
SCIENTIFIC REPORTS, 2020, 10 (01)
[6]   A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J].
Dawahdeh, Ziad E. ;
Yaakob, Shahrul N. ;
bin Othman, Rozmie Razif .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2018, 30 (03) :349-355
[7]   A Novel Application of Elliptic Curves in the Dynamical Components of Block Ciphers [J].
Farwa, Shabieh ;
Sohail, Ayesha ;
Muhammad, Nazeer .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) :1309-1316
[8]   An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques [J].
Haider, Muhammad Imran ;
Shah, Tariq ;
Ali, Asif ;
Shah, Dawood ;
Khalid, Ijaz .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2023, 209 :153-168
[9]   Block cipher's nonlinear component design by elliptic curves: an image encryption application [J].
Haider, Muhammad Imran ;
Ali, Asif ;
Shah, Dawood ;
Shah, Tariq .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (03) :4693-4718
[10]   Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF (2n) [J].
Hazzazi, Mohammad Mazyad ;
Rehman, Hafeez Ur ;
Shah, Tariq ;
Younas, Hajra .
CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (02) :2033-2060