A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

被引:65
作者
Dawahdeh, Ziad E. [1 ]
Yaakob, Shahrul N. [1 ]
bin Othman, Rozmie Razif [1 ]
机构
[1] UniMAP Univ, Sch Comp & Commun Engn, Perlis, Malaysia
关键词
Elliptic Curve Cryptography; Hill cipher; Self-invertible; Entropy; Peak Signal to Noise Ratio; Unified Average Changing Intensity; CRYPTOGRAPHY;
D O I
10.1016/j.jksuci.2017.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channels. A new image encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret key matrix with dimensions 4 x 4 will be used as an example in this study. Entropy, Peak Signal to Noise Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image encryption efficiency and compare the encrypted image with the original image to evaluate the performance of the proposed encryption technique. (C) 2017 Production and hosting by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:349 / 355
页数:7
相关论文
共 25 条
[11]   Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems [J].
Gutub, Adnan Abdul-Aziz ;
Khan, Farhan Abdul-Aziz .
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, :116-121
[12]  
Hamissa G., 2011, Proceedings of the 2011 International Conference on Computer Engineering & Systems (ICCES 2011), P260, DOI 10.1109/ICCES.2011.6141053
[13]  
Hill LS., 1929, AM MATH MONTHLY, V36, P306
[14]   How to repair the Hill cipher [J].
Ismail I.A. ;
Amin M. ;
Diab H. .
Journal of Zhejiang University-SCIENCE A, 2006, 7 (12) :2022-2030
[15]  
Kolbitz N., 1987, MATH COMPUT, V48, P203, DOI DOI 10.1090/S0025-5718-1987-0866109-5
[16]   Hill Cipher Modification based on Pseudo-Random Eigenvalues [J].
Mahmoud, Ahmed ;
Chefranov, Alexander .
APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02) :505-516
[17]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[18]  
Naskar Prabir Kr, 2014, International Journal of Image, Graphics and Signal Processing, V6, P30, DOI 10.5815/ijigsp.2014.02.04
[19]  
Nayak B., 2014, THESIS
[20]  
Panduranga HT, 2012, 2012 INTERNATIONAL CONFERENCE ON MACHINE VISION AND IMAGE PROCESSING (MVIP), P101, DOI 10.1109/MVIP.2012.6428770