An image encryption method based on modified elliptic curve Diffie-Hellman key exchange protocol and Hill Cipher

被引:1
|
作者
Hadi, Hiba Hilal [1 ]
Neamah, Ammar Ali [1 ]
机构
[1] Univ Kufa, Fac Comp Sci & Math, Najaf, Iraq
来源
OPEN ENGINEERING | 2024年 / 14卷 / 01期
关键词
image encryption; elliptic curve Diffie-Hellman key exchange protocol; Hill Cipher; security; SCHEME; CRYPTOSYSTEM;
D O I
10.1515/eng-2022-0552
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Digital image protection is crucial since images often contain private and sensitive information in business, medical, and military. One of the best techniques for securing the content of these images is encryption. This article introduces a cryptosystem known as the elliptic curve Diffie-Hellman Hill Cipher (ECDHHC) that uses the modified eliptic curve Diffie-Hellman (ECDH) key exchange protocol to generate the shared secret key integrated with the Hill Cipher. An elliptic curve point-based secret shared key matrix using the ECDHHC, which will be used for encryption and decryption, is generated. Thereafter, the input image is split into a set of 8 x 8 submatrices and then changes the values of these matrices by multiplying each block with the secret shared key matrix. The encrypted image is constructed by merging all encrypted blocks. With this combination, the correlation between adjacent pixels in the ciphered image is effectively removed, and the level of unpredictability and uncertainty for the ciphered image is also enhanced. The suggested approach used the key space, entropy, histogram, antinoise attack, differential attack, and correlation coefficient to evaluate the performance of the encryption method. According to simulation findings, the proposed method offers a high level of security and efficiency, and resists attackers.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A New Approach of Elliptic Curve Diffie-Hellman Key Exchange
    Mehibel, Nissa
    Hamadouche, M'hamed
    2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [2] Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol
    Wang, Shengbao
    Cao, Zhenfu
    Strangio, Maurizio Adriano
    Wang, Lihua
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (02) : 149 - 151
  • [3] A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4611 - 4614
  • [4] Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
    Senekane, Makhamisa
    Qhobosheane, Sehlabaka
    Taele, B. M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 30 - 34
  • [5] A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography
    Kumar, Manish
    Iqbal, Akhlad
    Kumar, Pranjal
    SIGNAL PROCESSING, 2016, 125 : 187 - 202
  • [6] Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curve Cryptography
    Khajuria, Samant
    Tange, Henrik
    2009 1ST INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS TECHNOLOGY, VOLS 1 AND 2, 2009, : 713 - +
  • [7] Algorithm for Elliptic Curve Diffie-Hellman Key Exchange Based on DNA Tile Self-assembly
    Cheng, Zhen
    Huang, Yufang
    Xu, Jin
    2008 THIRD INTERNATIONAL CONFERENCE ON BIO-INSPIRED COMPUTING: THEORIES AND APPLICATIONS, 2008, : 31 - +
  • [8] Algorithm for Elliptic Curve Diffie-Hellman Key Exchange Based on DNA Tile Self-Assembly
    Cheng, Zhen
    Huang, Yufang
    Chen, Zhihua
    Shi, Xiaolong
    Xu, Jin
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2010, 7 (05) : 856 - 861
  • [9] Diffie-Hellman key exchange protocol based on ring-LWE
    Zhi-Min, Yu
    Zheng-Jun, Jing
    Shi-Cun, Li
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 1033 - 1037
  • [10] Secure E-passport Protocol using Elliptic Curve Diffie-Hellman Key Agreement Protocol
    Abid, Mohamed
    Afifi, Hossam
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 99 - 102