An Efficient Audio Encryption Scheme Based on Elliptic Curve over Finite Fields

被引:2
|
作者
Rehman, Hafeez Ur [1 ]
Hazzazi, Mohammad Mazyad [2 ]
Shah, Tariq [1 ]
Bassfar, Zaid [3 ]
Shah, Dawood [1 ]
机构
[1] Quaid i Azam Univ, Dept Math, Islamabad 45320, Pakistan
[2] King Khalid Univ, Dept Math, Coll Sci, Abha 61421, Saudi Arabia
[3] Univ Tabuk, Dept Informat Technol, Tabuk 71491, Saudi Arabia
关键词
Mordell elliptic curve; Galois field; substitution box; pseudo-random numbers generator; audio encryption; IMAGE ENCRYPTION; BOX;
D O I
10.3390/math11183824
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Elliptic curve (EC) based cryptographic systems are more trustworthy than the currently used cryptographic approaches since they require less computational work while providing good security. This paper shows how to use an EC to make a good cryptosystem for encrypting digital audio. As a preliminary step, the system uses an EC of a particular type over a binary extension field to distort the digital audio pixel position. It reduces the inter-correlation between pixels in the original audio, making the system resistant to statistical attacks. In creating confusion in the data, an EC over a binary extension field is used to make a different number of substitution boxes (S-boxes). The suggested design employs a unique curve that relies on efficient EC arithmetic operations in the diffusion module. As a result, it generates high-quality pseudo-random numbers (PRNs) and achieves optimal diffusion in encrypted audio files with less processing work. Audio files of various sizes and kinds can all be encrypted using the provided algorithm. Moreover, the results show that this method effectively protects many kinds of audio recordings and is more resistant to statistical and differential attacks.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System
    Toughi, Shahryar
    Fathi, Mohammad H.
    Sekhavat, Yoones A.
    [J]. SIGNAL PROCESSING, 2017, 141 : 217 - 227
  • [22] A proxy re-encryption scheme based on elliptic curve group
    [J]. Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
  • [23] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    [J]. International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [24] An Efficient Elliptic Curve Based Signcryption Scheme for Firewalls
    Iqbal, Waseem
    Afzal, Mehreen
    Ahmad, Farhan
    [J]. 2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 67 - 72
  • [25] A Comparative and Overview Analysis of Elliptic Curve Cryptography Over Finite Fields
    Prabu, M.
    Shanmugalakshmi, R.
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 495 - +
  • [26] Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field
    Azam, Naveed Ahmed
    Hayat, Umar
    Ullah, Ikram
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (10) : 1378 - 1389
  • [27] Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field
    Naveed Ahmed Azam
    Umar Hayat
    Ikram Ullah
    [J]. Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 1378 - 1389
  • [28] Mapping Images Over Elliptic Curve For Encryption
    Jasra, Bhat
    Saqib, Manasha
    Moon, Ayaz Hassan
    [J]. 2021 6TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2021,
  • [29] A new encryption algorithm over elliptic curve
    Han, S
    Chang, E
    Liu, W
    Wang, J
    Potdar, V
    [J]. 2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 675 - 679
  • [30] A provably secure elliptic curve scheme with fast encryption
    Galindo, D
    Martín, S
    Takagi, T
    Villar, JL
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 245 - 259