Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field

Performing encryption using ElGamal public key encryption over finite field requires imbedding of message which is represented by integers. These integers are to be imbedded to a coordinate location that satisfy the elliptic curve equation using Koblitz imbedding technique. In doing so, data expansion takes place as each integer have to be represented as a coordinate. Recommended elliptic curves have large modulo prime value, so for every small integer representation of a message, the expansion in cipher text is massive. The above factors hinders the usage of ElGamal method for large data size encryption. In the ameliorated version, every coordinates in the elliptic curve equation is applicable for performing encryption operation. The typical Koblitz imbedding technique to specific coordinates satisfying the elliptic curve equation can be avoided. Data expansion trouble is taken care by using base conversion operation with multiple audio data. Simulation results and performance comparison with other public key cryptosystem signify that the proposed method is suitable for audio encryption operation.

[1]  Nasharuddin Zainal,et al.  Decomposition by binary codes-based speedy image encryption algorithm for multiple applications , 2015, IET Image Process..

[2]  S. F. El-Zoghdy,et al.  Transmission of Chaotic-based Encrypted Audio Through OFDM , 2020, Wireless Personal Communications.

[3]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[4]  Jiacun Wang,et al.  Special issue on multimedia fog/edge computing systems , 2020, Multimedia Systems.

[5]  Hongjun Liu,et al.  Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys , 2016 .

[6]  Artan Luma,et al.  Using Elliptic Curve Encryption and Decryption for Securing Audio Messages , 2015 .

[7]  Yiping Cao,et al.  Digital audio information hiding based on Arnold transformation and double random-phase encoding technique , 2012 .

[8]  Dolendro Singh Laiphrakpam,et al.  Medical image encryption based on improved ElGamal encryption technique , 2017 .

[9]  Shashi B. Rana,et al.  Development of modified AES algorithm for data security , 2016 .

[10]  Kuru Ratnavelu,et al.  An audio encryption based on synchronization of robust BAM FCNNs with time delays , 2018, Multimedia Tools and Applications.

[11]  Zhiyong Cui,et al.  Digital audio signal encryption with a virtual optics scheme , 2003 .

[12]  Tariq Shah,et al.  Digital audio signals encryption by Mobius transformation and Hénon map , 2019, Multimedia Systems.

[13]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[14]  Osama S. Faragallah Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption , 2018, Wirel. Pers. Commun..

[15]  R. Velumani,et al.  RETRACTED ARTICLE: IoT based Prudent Automatic Falls Detection for Elders by Analyzing Carrier State Information (CSI) Employing Wi-Fi Devices , 2020, Wirel. Pers. Commun..

[16]  L. Washington Elliptic Curves: Number Theory and Cryptography, Second Edition , 2008 .

[17]  S. El-Rabaie,et al.  Efficient audio cryptosystem based on chaotic maps and double random phase encoding , 2015, Int. J. Speech Technol..

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  S.A Vanstone Next generation security for wireless: elliptic curve cryptography , 2003, Comput. Secur..

[20]  Stefan Katzenbeisser,et al.  A secure multidimensional point inclusion protocol , 2007, MM&Sec.

[21]  Soumya Paul,et al.  DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data , 2019, Multimedia Tools and Applications.

[22]  R. Schoof Journal de Theorie des Nombres de Bordeaux 7 (1995), 219{254 , 2022 .

[23]  S. Ramakrishnan,et al.  Speech encryption using chaotic shift keying for secured speech communication , 2017, EURASIP J. Audio Speech Music. Process..

[24]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[25]  Juliano B. Lima,et al.  Audio encryption based on the cosine number transform , 2016, Multimedia Tools and Applications.

[26]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[27]  J. Pollard,et al.  Monte Carlo methods for index computation () , 1978 .

[28]  Mariusz Dzwonkowski,et al.  A New Quaternion-Based Encryption Method for DICOM Images , 2015, IEEE Transactions on Image Processing.