A cryptoanalysis of elliptic curve cryptography based on phase truncation in the domain of hybrid gyrator Hartley transform

被引:4
|
作者
Singh, Hukum [1 ]
Girija, R. [2 ]
Kumar, Manoj [3 ,4 ]
机构
[1] NorthCap Univ, Dept Appl Sci, Sect 23 A, Gurugram 122017, India
[2] Manav Rachna Univ, Dept Comp Sci & Technol, Faridabad, India
[3] Univ Wollongong Dubai, Fac Engn & Informat Sci, Dubai Knowledge Pk, Dubai, U Arab Emirates
[4] Middle East Univ, Fac Informat Technol, MEU Res Unit, Amman 11831, Jordan
关键词
Gyrator Hartley transform; Elliptic curve phase mask; Asymmtric cryptosystem; OPTICAL-IMAGE ENCRYPTION; FRACTIONAL MELLIN TRANSFORM; VORTEX FRESNEL LENS; ASYMMETRIC CRYPTOSYSTEM; PLAINTEXT ATTACK; SCHEME; MASKS; ALGORITHM; INFORMATION; PLANE;
D O I
10.1007/s11082-023-04765-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The purpose of this paper is to propose an asymmetric double-image encryption scheme based on phase masks computed by elliptic curve cryptography. A hybrid gyrator Hartley transform augmented with an elliptic curve phase mask is used in this scheme to enhance security. Two new public decryption keys are created by encrypting the plain text with two-stage phase keys. A public key is generated during an encryption process, whereas a private key is generated before the encryption process begins. In addition to introducing nonlinearity, it enhances the security of the system. As part of the encryption operation, plain text keys are unscrambled. The system is also more resistant to selective plaintext attacks, and the decryption keys are more sensitive. Trimming the phase expands the room for the key the confidentiality of cryptography systems. An estimation of the error between the image input and the image retrieved is used to determine the effectiveness of the cryptosystem. Various potential attacks can be mitigated by the proposed technique that provides innumerable security keys. The effectiveness and security of the proposed technique are verified by numerical simulations. In order to validate and evaluate the proposed solution's viability, strength, experimental results and security analysis are presented.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A cryptoanalysis of elliptic curve cryptography based on phase truncation in the domain of hybrid gyrator Hartley transform
    Hukum Singh
    R Girija
    Manoj Kumar
    Optical and Quantum Electronics, 2023, 55
  • [2] Fast Hartley Transform based Elliptic Curve Cryptography for resource constrained devices
    Nakhate, Sanket
    Kumar, Arun Raj P.
    2020 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2020, : 71 - 76
  • [3] Color image security system based on discrete Hartley transform in gyrator transform domain
    Abuturab, Muhammad Rafiq
    OPTICS AND LASERS IN ENGINEERING, 2013, 51 (03) : 317 - 324
  • [4] Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain
    Li, Jianzhong
    JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2016, 20 (01) : 42 - 54
  • [5] A hybrid cryptography algorithm for data concentrator communication message based on elliptic curve cryptography
    Tong, Weiming
    Zhang, Xidong
    Li, Zhongwei
    Lin, Jingbo
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2014, 38 (04): : 86 - 91
  • [6] Devil's vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain
    Singh, Hukum
    OPTICS AND LASERS IN ENGINEERING, 2016, 81 : 125 - 139
  • [7] Cryptoanalysis of a multiple-image encryption scheme based on amplitude and phase truncation in the Fourier domain
    Xiong, Y.
    Liu, J.
    Gu, J.
    Kumar, R.
    APPLIED OPTICS, 2024, 63 (34) : 8780 - 8788
  • [8] A Novel Elliptic Curve Cryptography Based Approach of Re-watermarking for Cheque Truncation System
    Mehan, Vineet
    Dhir, Renu
    Brar, Yadwinder Singh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 219 - 235
  • [9] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [10] An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform
    Abuturab, Muhammad Rafiq
    OPTICS AND LASERS IN ENGINEERING, 2015, 69 : 49 - 57