A cryptoanalysis of elliptic curve cryptography based on phase truncation in the domain of hybrid gyrator Hartley transform

被引:4
|
作者
Singh, Hukum [1 ]
Girija, R. [2 ]
Kumar, Manoj [3 ,4 ]
机构
[1] NorthCap Univ, Dept Appl Sci, Sect 23 A, Gurugram 122017, India
[2] Manav Rachna Univ, Dept Comp Sci & Technol, Faridabad, India
[3] Univ Wollongong Dubai, Fac Engn & Informat Sci, Dubai Knowledge Pk, Dubai, U Arab Emirates
[4] Middle East Univ, Fac Informat Technol, MEU Res Unit, Amman 11831, Jordan
关键词
Gyrator Hartley transform; Elliptic curve phase mask; Asymmtric cryptosystem; OPTICAL-IMAGE ENCRYPTION; FRACTIONAL MELLIN TRANSFORM; VORTEX FRESNEL LENS; ASYMMETRIC CRYPTOSYSTEM; PLAINTEXT ATTACK; SCHEME; MASKS; ALGORITHM; INFORMATION; PLANE;
D O I
10.1007/s11082-023-04765-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The purpose of this paper is to propose an asymmetric double-image encryption scheme based on phase masks computed by elliptic curve cryptography. A hybrid gyrator Hartley transform augmented with an elliptic curve phase mask is used in this scheme to enhance security. Two new public decryption keys are created by encrypting the plain text with two-stage phase keys. A public key is generated during an encryption process, whereas a private key is generated before the encryption process begins. In addition to introducing nonlinearity, it enhances the security of the system. As part of the encryption operation, plain text keys are unscrambled. The system is also more resistant to selective plaintext attacks, and the decryption keys are more sensitive. Trimming the phase expands the room for the key the confidentiality of cryptography systems. An estimation of the error between the image input and the image retrieved is used to determine the effectiveness of the cryptosystem. Various potential attacks can be mitigated by the proposed technique that provides innumerable security keys. The effectiveness and security of the proposed technique are verified by numerical simulations. In order to validate and evaluate the proposed solution's viability, strength, experimental results and security analysis are presented.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Secure video steganographic model using framelet transform and elliptic curve cryptography
    Rout, Sonali
    Mohapatra, Ramesh Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 25191 - 25212
  • [22] Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform
    Gulen, Utku
    Baktir, Selcuk
    SENSORS, 2020, 20 (05)
  • [23] Secure video steganographic model using framelet transform and elliptic curve cryptography
    Sonali Rout
    Ramesh Kumar Mohapatra
    Multimedia Tools and Applications, 2024, 83 : 25191 - 25212
  • [24] Color image cryptosystem based on discrete cosine transform in gyrator transform domain spiral-phase encoding
    Abuturab, Muhammad Rafiq
    INTERNATIONAL CONFERENCE ON OPTICS IN PRECISION ENGINEERING AND NANOTECHNOLOGY (ICOPEN2013), 2013, 8769
  • [25] Image watermarking by using phase retrieval algorithm in gyrator transform domain
    Liu, Zhengjun
    Xu, Lie
    Guo, Qing
    Lin, Chuang
    Liu, Shutian
    OPTICS COMMUNICATIONS, 2010, 283 (24) : 4923 - 4927
  • [26] Optical Watermarking Method Based on Hyper-Chaotic Phase Mask in Gyrator Transform Domain
    Liu Yujia
    Jiang Zhaoguo
    Xu Xiping
    Zhang Fuqi
    Xu Jiahong
    ACTA OPTICA SINICA, 2019, 39 (09)
  • [27] Image encryption based on convolution operation in the gyrator transform domain
    Daza, Sandra M.
    Vega, Fabio
    Matos, Lorenzo
    Torres Moren, Cesar
    Diaz M, Leonardo
    Morales Dazi, Yailth
    38TH ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS SOCIETY (IECON 2012), 2012, : 1527 - 1529
  • [28] An optical image cryptosystem based on Hartley transform in the Fresnel transform domain
    Hwang, Hone-Ene
    OPTICS COMMUNICATIONS, 2011, 284 (13) : 3243 - 3247
  • [29] Optical Encryption Based on 3-D Sphere and Phase Retrieval in Gyrator Transform Domain
    Chen, Wen
    Chen, Xudong
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [30] Finite field polynomial multiplication in the frequency domain with application to elliptic curve cryptography
    Baktir, Selcuk
    Sumar, Berk
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 991 - +