Image Encryption Based on Elliptic Curve Diffie–Hellman Key Exchange

Authors

  • Mahmoud H. S. Hasan College of Information Technology, University of Al-asmarya Islamic, Libya

Keywords:

Elliptic Curves Diffie–Hellman, Elliptic Curve Discrete Logarithm Problem, Image Encryption

Abstract

Sharing sensitive photographs across unprotected networks puts you at risk of theft and attack. When it comes to protecting images against attacks, encryption techniques are the best options. Cryptography is necessary in order to send photos securely. The key that is used for encryption and decryption plays a significant role in a cryptosystem's strength. Performing a brute force attack is challenging due to the key size. The complexity of the algorithm also rises, as a result, requiring more computing power. The same level of security can be achieved with smaller key sizes using implemented cryptosystems based on elliptic curves. This paper presented two image encryption cryptographic techniques based on Elliptic Curve Diffie–Hellman Key Exchange and applied them to various pictures. The proposed models were put to the test, where the MSE, PSNR and UACI were calculated to evaluate the efficiency of the proposed techniques

References

William Stallings, “Cryptography and Network Security Principles and Practices“, Fourth Edition, November 16, 2005.

Christof Paar, J. Pelzl, and Springerlink (Online Service, Understanding

Cryptography: A Textbook for Students and Practitioners. Berlin,

Heidelberg: Springer Berlin Heidelberg, 2010.

A. T. Sadiq and N. J. Kadhim, “ENHANCED MENEZES-VANESTONE ELLIPTIC CURVES CRYPTOSYSTEM,” Journal of Al-Nahrain University Science, vol. 12, no. 1, pp. 162–165, Mar. 2009, DOI: 10.22401/jnus.12.1.23.

N. Al-Saffar and M. Said, “On the Mathematical Complexity and the Time

Implementation of Proposed Variants of Elliptic Curves Cryptosystems,”

International Journal of Cryptology Research, vol. 4, no. 1, pp. 42–54,

M. Hasan, M. Awinat, M. Ahmed, and M. Abaid, “A Comparison Between Some Encrypted Ways Based on Elliptic Curve Cryptography,” International Science and Technology Journal, vol. 19, no. 1, pp. 182–195, 2019.

N. K. E. Abbadi, S. T. Abaas, and A. A. Alaziz, “New Image Encryption

Algorithm Based on Diffie-Hellman and Singular Value Decomposition,”

IJARCCE, vol. 5, no. 1, pp. 197–201, Jan. 2016, doi: 10.17148/ijarcce.2016.5147.

Z. E. Dawahdeh, S. N. Yaakob, and R. Razif bin Othman, “A new image

encryption technique combining Elliptic Curve Cryptosystem with Hill

Cipher,” Journal of King Saud University - Computer and Information

Sciences, vol. 30, no. 3, pp. 349–355, Jul. 2018, doi: 10.1016/j.jksuci.2017.06.004.

Massey LJ, Omura JK. OMNET, “Method and Apparatus for Maintaining the Privacy of Digital Messages Conveyed by Public Transmission”, Filling date: 1982-09-14, United States patent # 4567600, 1986.

T. Elgamal, “A public key cryptosystem and a signature scheme based

on discrete logarithms,” IEEE Transactions on Information Theory, vol.

, no. 4, pp. 469–472, Jul. 1985, doi: 10.1109/tit.1985.1057074.

N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987, DOI: 10.1090/S0025-5718-1987-0866109-5.

A. J. Menezes and S. A. Vanstone, “Elliptic curve cryptosystems and their implementation,” Journal of Cryptology, vol. 6, no. 4, pp. 209–224, Sep. 1993, DOI: 10.1007/bf00203817.

N. F. H. Al Saffar, I. R. Al-Saiq, and R. R. M. Abo Alsabeh, “Asymmetric image encryption scheme based on Massey Omura scheme,” International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 1, p. 1040, Feb. 2022, doi: 10.11591/ijece.v12i1.pp1040-1047.

Z. K. Obaid and N. F. H. Al Saffar, “Image encryption based on elliptic curve cryptosystem,” International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 2, p. 1293, Apr. 2021, DOI: 10.11591/ijece.v11i2.pp1293-1302.

Downloads

Published

2022-12-31

Issue

Section

Article

How to Cite

Image Encryption Based on Elliptic Curve Diffie–Hellman Key Exchange (M. H. S. Hasan , Trans.). (2022). Journal of Basic Sciences, 35(2), 37-53. https://journals.asmarya.edu.ly/jbs/index.php/jbs/article/view/3