Image Encryption Based on Elliptic Curve Diffie–Hellman Key Exchange
Keywords:
Elliptic Curves Diffie–Hellman, Elliptic Curve Discrete Logarithm Problem, Image EncryptionAbstract
Sharing sensitive photographs across unprotected networks puts you at risk of theft and attack. When it comes to protecting images against attacks, encryption techniques are the best options. Cryptography is necessary in order to send photos securely. The key that is used for encryption and decryption plays a significant role in a cryptosystem's strength. Performing a brute force attack is challenging due to the key size. The complexity of the algorithm also rises, as a result, requiring more computing power. The same level of security can be achieved with smaller key sizes using implemented cryptosystems based on elliptic curves. This paper presented two image encryption cryptographic techniques based on Elliptic Curve Diffie–Hellman Key Exchange and applied them to various pictures. The proposed models were put to the test, where the MSE, PSNR and UACI were calculated to evaluate the efficiency of the proposed techniques
References
William Stallings, “Cryptography and Network Security Principles and Practices“, Fourth Edition, November 16, 2005.
Christof Paar, J. Pelzl, and Springerlink (Online Service, Understanding
Cryptography: A Textbook for Students and Practitioners. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2010.
A. T. Sadiq and N. J. Kadhim, “ENHANCED MENEZES-VANESTONE ELLIPTIC CURVES CRYPTOSYSTEM,” Journal of Al-Nahrain University Science, vol. 12, no. 1, pp. 162–165, Mar. 2009, DOI: 10.22401/jnus.12.1.23.
N. Al-Saffar and M. Said, “On the Mathematical Complexity and the Time
Implementation of Proposed Variants of Elliptic Curves Cryptosystems,”
International Journal of Cryptology Research, vol. 4, no. 1, pp. 42–54,
M. Hasan, M. Awinat, M. Ahmed, and M. Abaid, “A Comparison Between Some Encrypted Ways Based on Elliptic Curve Cryptography,” International Science and Technology Journal, vol. 19, no. 1, pp. 182–195, 2019.
N. K. E. Abbadi, S. T. Abaas, and A. A. Alaziz, “New Image Encryption
Algorithm Based on Diffie-Hellman and Singular Value Decomposition,”
IJARCCE, vol. 5, no. 1, pp. 197–201, Jan. 2016, doi: 10.17148/ijarcce.2016.5147.
Z. E. Dawahdeh, S. N. Yaakob, and R. Razif bin Othman, “A new image
encryption technique combining Elliptic Curve Cryptosystem with Hill
Cipher,” Journal of King Saud University - Computer and Information
Sciences, vol. 30, no. 3, pp. 349–355, Jul. 2018, doi: 10.1016/j.jksuci.2017.06.004.
Massey LJ, Omura JK. OMNET, “Method and Apparatus for Maintaining the Privacy of Digital Messages Conveyed by Public Transmission”, Filling date: 1982-09-14, United States patent # 4567600, 1986.
T. Elgamal, “A public key cryptosystem and a signature scheme based
on discrete logarithms,” IEEE Transactions on Information Theory, vol.
, no. 4, pp. 469–472, Jul. 1985, doi: 10.1109/tit.1985.1057074.
N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987, DOI: 10.1090/S0025-5718-1987-0866109-5.
A. J. Menezes and S. A. Vanstone, “Elliptic curve cryptosystems and their implementation,” Journal of Cryptology, vol. 6, no. 4, pp. 209–224, Sep. 1993, DOI: 10.1007/bf00203817.
N. F. H. Al Saffar, I. R. Al-Saiq, and R. R. M. Abo Alsabeh, “Asymmetric image encryption scheme based on Massey Omura scheme,” International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 1, p. 1040, Feb. 2022, doi: 10.11591/ijece.v12i1.pp1040-1047.
Z. K. Obaid and N. F. H. Al Saffar, “Image encryption based on elliptic curve cryptosystem,” International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 2, p. 1293, Apr. 2021, DOI: 10.11591/ijece.v11i2.pp1293-1302.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Journal of Basic Sciences

This work is licensed under a Creative Commons Attribution 4.0 International License.