A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

Abstract Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channels. A new image encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret key matrix with dimensions 4 × 4 will be used as an example in this study. Entropy, Peak Signal to Noise Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image encryption efficiency and compare the encrypted image with the original image to evaluate the performance of the proposed encryption technique.

[1]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[2]  Hatem Abdelkader,et al.  Securing JPEG architecture based on enhanced chaotic hill cipher algorithm , 2011, The 2011 International Conference on Computer Engineering & Systems.

[3]  Komal Agrawal,et al.  Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem , 2014 .

[4]  Ganapati Panda,et al.  Image Encryption Using Advanced Hill Cipher Algorithm , 2009 .

[5]  Mohd Kamir Yusof,et al.  Cryptography: A New Approach of Classical Hill Cipher , 2013 .

[6]  Adnan Abdul-Aziz Gutub,et al.  USING SUBTHRESHOLD SRAM TO DESIGN LOW-POWER CRYPTO HARDWARE , 2011 .

[7]  Neha Sharma,et al.  A Novel Approach to Hill Cipher , 2014 .

[8]  P. Naskar,et al.  A Secure Symmetric Image Encryption Based on Bit-wise Operation , 2014 .

[9]  A. A-A Gutub,et al.  Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[10]  B Nayak Signcryption schemes based on elliptic curve cryptography , 2014 .

[11]  Lester S. Hill Cryptography in An Algebraic Alphabet , 1929 .

[12]  T PandurangaH,et al.  Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique , 2012 .

[13]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[14]  Alexander G. Chefranov,et al.  Hill Cipher Modification based on Pseudo-Random Eigenvalues , 2014 .

[15]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[16]  Joseph H. Silverman,et al.  Elliptic Curves and Cryptography , 2014 .

[17]  H. T. Panduranga,et al.  Hybrid approach for dual image encryption using nibble exchange and Hill-cipher , 2012, 2012 International Conference on Machine Vision and Image Processing (MVIP).

[18]  Mohammed Amin,et al.  How to repair the Hill cipher , 2006 .

[19]  T PandurangaH,et al.  Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques , 2012 .

[20]  Turki F. Al-Somani,et al.  Parallelizing GF(P) elliptic curve cryptography computations for security and speed , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.

[21]  A. K. Gulve,et al.  A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher , 2014 .

[22]  A. Gutub,et al.  SERIAL VS. PARALLEL ELLIPTIC CURVE CRYPTO PROCESSOR DESIGNS , 2013 .

[23]  Mohammad Ubaidullah Bokhari,et al.  A Review on Symmetric Key Encryption Techniques in Cryptography , 2016 .

[24]  Saroj Kumar Panigrahy,et al.  Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm , 2007 .

[25]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[26]  Adnan Abdul-Aziz Gutub,et al.  Power-time flexible architecture for GF(2k) elliptic curve cryptosystem computation , 2003, GLSVLSI '03.