Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF (2n)

被引:5
作者
Hazzazi, Mohammad Mazyad [1 ]
Rehman, Hafeez Ur [2 ]
Shah, Tariq [2 ]
Younas, Hajra [2 ]
机构
[1] King Khalid Univ, Dept Math, Coll Sci, Abha 61421, Saudi Arabia
[2] Quaid i Azam Univ, Dept Math, Islamabad, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 02期
关键词
Elliptic curve; Galois field; group law; hill cipher; HILL CIPHER;
D O I
10.32604/cmc.2023.040629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem. In this paper, we introduce an asymmetric key algorithm for specifically processing images with larger bit values. To overcome the separate flaws of elliptic curve cryptography (ECC) and the Hill cipher (HC), we present an approach to picture encryption by combining these two encryption approaches. In addition, to strengthen our scheme, the group laws are defined over the rational points of a given elliptic curve (EC) over a Galois field (GF). The exclusive-or (XOR) function is used instead of matrix multiplication to encrypt and decrypt the data which also refutes the need for the inverse of the key matrix. By integrating the inverse function on the pixels of the image, we have improved system security and have a wider key space. Furthermore, through comprehensive analysis of the proposed scheme with different available analyses and standard attacks, it is confirmed that our proposed scheme provides improved speed, security, and efficiency.
引用
收藏
页码:2033 / 2060
页数:28
相关论文
共 40 条
[1]  
Acharya B, 2007, Int J Secur, V1, P14
[2]   Privacy Protection of Biometric Traits using Modified Hill Cipher with Involutory Key and Robust Cryptosystem [J].
Acharya, Bibhudendra ;
Sharma, Mukul Dhar ;
Tiwari, Sourabh ;
Minz, Vinay Kumar .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 :242-247
[3]  
Agarwal K., 2014, Int J Comput Appl, V106, P18
[4]  
Bakr M. A., 2018, International Journal of Industrial Electronics and Electrical Engineering, V6, P24
[5]   A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J].
Dawahdeh, Ziad E. ;
Yaakob, Shahrul N. ;
bin Othman, Rozmie Razif .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2018, 30 (03) :349-355
[6]  
Erkan U., 2023, Chaos, Solitons & Fractals, V167, P1
[7]   2D hyperchaotic system based on Schaffer function for image encryption [J].
Erkan, Ugur ;
Toktas, Abdurrahim ;
Lai, Qiang .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
[8]   2D eπ-map for image encryption [J].
Erkan, Ugur ;
Toktas, Abdurrahim ;
Toktas, Feyza ;
Alenezi, Fayadh .
INFORMATION SCIENCES, 2022, 589 :770-789
[9]   A Novel Application of Elliptic Curves in the Dynamical Components of Block Ciphers [J].
Farwa, Shabieh ;
Sohail, Ayesha ;
Muhammad, Nazeer .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) :1309-1316
[10]  
Gao S., 2023, IEEE Transactions on Circuits and Systems for Video Technology, V1, P1