Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF (2n)

被引:5
作者
Hazzazi, Mohammad Mazyad [1 ]
Rehman, Hafeez Ur [2 ]
Shah, Tariq [2 ]
Younas, Hajra [2 ]
机构
[1] King Khalid Univ, Dept Math, Coll Sci, Abha 61421, Saudi Arabia
[2] Quaid i Azam Univ, Dept Math, Islamabad, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 02期
关键词
Elliptic curve; Galois field; group law; hill cipher; HILL CIPHER;
D O I
10.32604/cmc.2023.040629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem. In this paper, we introduce an asymmetric key algorithm for specifically processing images with larger bit values. To overcome the separate flaws of elliptic curve cryptography (ECC) and the Hill cipher (HC), we present an approach to picture encryption by combining these two encryption approaches. In addition, to strengthen our scheme, the group laws are defined over the rational points of a given elliptic curve (EC) over a Galois field (GF). The exclusive-or (XOR) function is used instead of matrix multiplication to encrypt and decrypt the data which also refutes the need for the inverse of the key matrix. By integrating the inverse function on the pixels of the image, we have improved system security and have a wider key space. Furthermore, through comprehensive analysis of the proposed scheme with different available analyses and standard attacks, it is confirmed that our proposed scheme provides improved speed, security, and efficiency.
引用
收藏
页码:2033 / 2060
页数:28
相关论文
共 40 条
[21]   Hill Cipher Modification based on Pseudo-Random Eigenvalues [J].
Mahmoud, Ahmed ;
Chefranov, Alexander .
APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02) :505-516
[22]  
Miller V.S., 1985, C THEOR APPL CRYPT T, P417, DOI [DOI 10.1007/3-540-39799-X_31, DOI 10.1007/3-540-39799-X31]
[23]   A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes [J].
Naseer, Yasir ;
Shah, Tariq ;
Shah, Dawood ;
Hussain, Sadam .
CRYPTOGRAPHY, 2019, 3 (01) :1-13
[24]  
Naveenkumar SK, 2015, 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS)
[25]  
Panduranga H, 2012, Int. J. Comput. Appl., V60, P14
[26]  
Rabah Kefa., 2006, Information Technology Journal, V5, P204
[27]   Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher [J].
Rehman, Hafeez Ur ;
Shah, Tariq ;
Hazzazi, Mohammad Mazyad ;
Alshehri, Ali ;
Zaid, Bassfar .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02) :2913-2930
[28]   Design of Nonlinear Components Over a Mordell Elliptic Curve on Galois Fields [J].
Rehman, Hafeez Ur ;
Shah, Tariq ;
Aljaedi, Amer ;
Hazzazi, Mohammad Mazyad ;
Alharbi, Adel R. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (01) :1313-1329
[29]  
Sazaki Y, 2016, INT C TELECOMMUN SYS
[30]  
Silverman J. H., 2014, An Introduction to Mathematical Cryptography, P299