A cryptoanalysis of elliptic curve cryptography based on phase truncation in the domain of hybrid gyrator Hartley transform

被引:4
|
作者
Singh, Hukum [1 ]
Girija, R. [2 ]
Kumar, Manoj [3 ,4 ]
机构
[1] NorthCap Univ, Dept Appl Sci, Sect 23 A, Gurugram 122017, India
[2] Manav Rachna Univ, Dept Comp Sci & Technol, Faridabad, India
[3] Univ Wollongong Dubai, Fac Engn & Informat Sci, Dubai Knowledge Pk, Dubai, U Arab Emirates
[4] Middle East Univ, Fac Informat Technol, MEU Res Unit, Amman 11831, Jordan
关键词
Gyrator Hartley transform; Elliptic curve phase mask; Asymmtric cryptosystem; OPTICAL-IMAGE ENCRYPTION; FRACTIONAL MELLIN TRANSFORM; VORTEX FRESNEL LENS; ASYMMETRIC CRYPTOSYSTEM; PLAINTEXT ATTACK; SCHEME; MASKS; ALGORITHM; INFORMATION; PLANE;
D O I
10.1007/s11082-023-04765-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The purpose of this paper is to propose an asymmetric double-image encryption scheme based on phase masks computed by elliptic curve cryptography. A hybrid gyrator Hartley transform augmented with an elliptic curve phase mask is used in this scheme to enhance security. Two new public decryption keys are created by encrypting the plain text with two-stage phase keys. A public key is generated during an encryption process, whereas a private key is generated before the encryption process begins. In addition to introducing nonlinearity, it enhances the security of the system. As part of the encryption operation, plain text keys are unscrambled. The system is also more resistant to selective plaintext attacks, and the decryption keys are more sensitive. Trimming the phase expands the room for the key the confidentiality of cryptography systems. An estimation of the error between the image input and the image retrieved is used to determine the effectiveness of the cryptosystem. Various potential attacks can be mitigated by the proposed technique that provides innumerable security keys. The effectiveness and security of the proposed technique are verified by numerical simulations. In order to validate and evaluate the proposed solution's viability, strength, experimental results and security analysis are presented.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Blind Signature for Electronic Payment Based on Elliptic Curve Cryptography
    Xu, Shouzhi
    Li, Qiaoli
    Zhou, Huan
    Li, Chengxia
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 770 - 776
  • [42] A Theoretical Study of Elliptic Curve Cryptography for Location Based Services
    Prasanna, Yeluri Lakshmi
    Reddy, E. Madhusudhana
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS AND COMPUTATIONAL INTELLIGENCE (ICBDAC), 2017, : 404 - 407
  • [43] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [44] Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography
    Athavale, Aditi
    Singh, Kuldip
    Sood, Sandeep
    2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 332 - 335
  • [45] Expander graphs based on GRH with an application to elliptic curve cryptography
    Jao, David
    Miller, Stephen D.
    Venkatesan, Ramarathnam
    JOURNAL OF NUMBER THEORY, 2009, 129 (06) : 1491 - 1504
  • [46] RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography
    K.Shankar
    P.Eswaran
    中国通信, 2017, 14 (02) : 118 - 130
  • [47] Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
    Ma, Rui
    Du, Linyue
    IEEE Access, 2022, 10 : 34221 - 34227
  • [48] Double image encryption in Fresnel domain using wavelet transform, gyrator transform and spiral phase masks
    Kumar, Ravi
    Bhaduri, Basanta
    FIFTH INTERNATIONAL CONFERENCE ON OPTICAL AND PHOTONICS ENGINEERING, 2017, 10449
  • [49] Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
    Ma, Rui
    Du, Linyue
    IEEE ACCESS, 2022, 10 : 34221 - 34227
  • [50] Medical Images Encryption Based on Elliptic Curve Cryptography and Chaos Theory
    Benssalah, Mustapha
    Rhaskali, Yasser
    Azzaz, Mohamed Salah
    2018 INTERNATIONAL CONFERENCE ON SMART COMMUNICATIONS IN NETWORK TECHNOLOGIES (SACONET), 2018, : 222 - 226