Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p)

Until recently, Cryptography has been of interest primarily to the military and diplomatic communities. But the dawning of the information age has revealed an urgent need for cryptography in the private sector too. Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. In this paper, cyclic elliptic curve of the form y2 = x3 + ax + b, a, b ∈ GF(p) with order M is considered and key Sequences are derived from random sequence of cyclic elliptic Curve points. Elliptic Curve is a cubic equation in two variables, x and y, with coefficients from a field satisfying certain conditions. For cryptographic applications the coefficients are chosen from finite fields. A point on the Elliptic curve is a pair of (x, y) which satisfies the Elliptic curve equation. The total number of points (x, y) which satisfy the elliptic curve equation along with x=∞, y=∞ is called the Order of the curve `M'. The least integer N for which NP is equal to point at infinity O is called order of the point P. Elliptic curves for which there exists a point P having the same order N, as that of the curve M are called cyclic elliptic curves. A pseudorandom sequence generator based on chaotic function and Elliptic Curve arithmetic over GF(p) is proposed here. The logistic Map is used as a chaotic function which generates a random sequence of real numbers. This random real sequence is converted to binary which drives an Elliptic Curve arithmetic module generating a random sequence of Elliptic Curve points. The sequence of points {P, 2P, ..., NP} is calculated from a base point P, and stored in a file. Every element in this sequence is a point on the cyclic elliptic curve. The Chaotic binary sequence selects x or y-coordinates of elliptic curve points, pre-computed and stored. This forms a random integer sequence. The randomness properties of this sequence have been tested using various techniques like, autocorrelation distribution, crosscorrelation distribution and first return map. It is observed that the sequence generated satisfies the required randomness properties. These sequences find applications in Stream Cipher Systems. An additive Stream Cipher system is designed using this sequence as the key sequence to encrypt images. Results of image encryption and decryption for a medical image is discussed and analyzed in this paper. The results are also compared with the scheme proposed by Lap-Piu Lee and Kwok-Wo Wong [1]. The security analysis of the proposed system is also discussed. It is interesting to observe that, proposed algorithm is superior compared to Lap-Piu Lee scheme [1].

[1]  Fred Piper,et al.  Stream Ciphers , 1982, EUROCRYPT.

[2]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[3]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[4]  Guang Gong,et al.  Elliptic Curve Pseudorandom Sequence Generators , 1999, Selected Areas in Cryptography.

[5]  M. Aswatha Kumar,et al.  Generation of pseudorandom sequence over elliptic curve group and their properties , 2007 .

[6]  Alex Biryukov,et al.  Block Ciphers and Stream Ciphers: The State of the Art , 2004, IACR Cryptol. ePrint Arch..

[7]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[8]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[9]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[10]  Garrett Birkhoff,et al.  A survey of modern algebra , 1942 .

[11]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[12]  Andreas Klein Stream Ciphers , 2013 .

[13]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[14]  Ismail Amr Ismail,et al.  A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..

[15]  Rehan Akbani,et al.  Elliptic curve cryptosystem and its applications , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[16]  G. Mullen,et al.  Primitive polynomials over finite fields , 1992 .

[17]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[18]  R. A. Rueppel Analysis and Design of Stream Ciphers , 2012 .

[19]  J. Hadamard,et al.  Les surfaces a courbures opposees et leurs lignes geodesique , 1898 .

[20]  M. I. Youssef,et al.  Chaotic Sequences Implementations on Residue Number Spread Spectrum System , .

[21]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[22]  Canyan Zhu,et al.  Image encryption algorithm based on chaotic mapping , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[23]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[24]  J. Rotman Advanced Modern Algebra , 2002 .

[25]  S. D. Dhodapkar,et al.  CHAOS BASED CRYPTOGRAPHY : A NEW APPROACH TO SECURE COMMUNICATIONS , 2005 .

[26]  Rached Tourki,et al.  A Modified AES Based Algorithm for Image Encryption , 2007 .

[27]  Gaetano Palumbo,et al.  A novel pseudo random bit generator for cryptography applications , 2002, 9th International Conference on Electronics, Circuits and Systems.

[28]  Luigi Fortuna,et al.  Does chaos work better than noise , 2002 .

[29]  Henry Beker,et al.  Cipher Systems: The Protection of Communications , 1982 .

[30]  Zhijie Jerry Shi,et al.  Software Implementations of Elliptic Curve Cryptography , 2008, Int. J. Netw. Secur..

[31]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[32]  M. Aswatha Kumar,et al.  Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. , 2011 .

[33]  Vinod Patidar,et al.  A Random Bit Generator Using Chaotic Maps , 2010, Int. J. Netw. Secur..

[34]  Kwok-Wo Wong,et al.  A random number generator based on elliptic curve operations , 2004 .

[35]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[36]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[37]  Michael Purser Introduction to error-correcting codes , 1994 .

[38]  William Stallings Network and Internetwork Security: Principles and Practice , 1994 .