A novel image encryption scheme based on an elliptic curve

被引:139
作者
Hayat, Umar [1 ]
Azam, Naveed Ahmed [2 ]
机构
[1] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
[2] Kyoto Univ, Grad Sch Informat, Dept Appl Math & Phys, Kyoto, Japan
关键词
Elliptic curve; Substitution box; Random numbers; Image encryption; CHAOTIC SYSTEM; S-BOXES; ALGORITHM; PERMUTATION; SEQUENCE;
D O I
10.1016/j.sigpro.2018.10.011
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Elliptic curve cryptography (ECC) is capable of providing high security than to other cryptosystems with same key size. The aim of this paper is twofold. Firstly, we present new methods for the construction of substitution boxes (S-boxes), and the generation of pseudo random numbers (PRN) by using a total order on an elliptic curve (EC) over a prime field. A search method is used to efficiently generate an EC instead of the more traditional group law which is computationally expensive. The S-box generation technique uses the x-coordinates of the points of an ordered elliptic curve (OEC), while a generalization of the Frobenius map and n-norm are used on the points of an OEC to generate PRN. Secondly, a two phase image encryption system based on the newly developed S-box and PRN generation methods is proposed. In this security system, the plain-image is first diffused by masking it by the proposed PRN which is then confused by a proposed dynamic S-box. Rigorous analysis and comparison with some of the existing S-box and image encryption methods reveal that the proposed techniques are capable of generating cryptographically strong S-boxes, PRN with high entropy and optimal resistance against modern image cryptanalysis. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:391 / 402
页数:12
相关论文
共 53 条
[1]   A hybrid chaotic system and cyclic elliptic curve for image encryption [J].
Abd El-Latif, Ahmed A. ;
Niu, Xiamu .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (02) :136-143
[2]  
Amara Moncef, 2011, 2011 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA 2011), P247, DOI 10.1109/WOSSPA.2011.5931464
[3]  
[Anonymous], LNCS
[4]  
[Anonymous], 6 INT C NAT COMP ICN
[5]  
[Anonymous], J INFORM HIDING MULT
[6]  
[Anonymous], THESIS
[7]  
[Anonymous], SECURITY NETWORK COM
[8]  
[Anonymous], APPL MATH INFORM SCI
[9]  
[Anonymous], NOVEL FUZZY ENCRYPTI
[10]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170