SlideShare a Scribd company logo
1 of 37
“A NEW IMAGE ENCRYPTION TECHNIQUE
COMBINING ELLIPTIC CURVE
CRYPTOSYSTEM WITH HILL CIPHER”
Presented By :
Aya Hatem Allam
Agenda
■ Introduction.
■ Problem Statement.
■ Contribution.
■ Related Work.
■ Elliptic curve.
■ Hill cipher algorithm.
■ The proposed cryptosystem.
■ Implementation example.
■ Security analysis.
■ Conclusions.
Introduction
Cryptography is the practice and study of techniques for securing communication and data
in the presence of adversaries. Cryptography is one of the mathematical techniques that
are used to protect images from adversaries and increase the security of communications.
Introduction
Introduction
Introduction
Problem Statement
■ Image encryption is rapidly increased recently by the increasing use of the internet and
communication media. Sharing important images over unsecured channels is liable for
attacking and stealing.
■ Encryption techniques are the suitable methods to protect images from attacks.
■ Hill cipher algorithm is one of the symmetric techniques, it has a simple structure and
fast computations, but weak security because sender and receiver need to use and
share the same private key within a non-secure channels.
Contribution
■ new image encryption technique that combines Elliptic Curve Cryptosystem with Hill
Cipher (ECCHC) has been proposed
■ in this paper to convert Hill cipher from symmetric technique to asymmetric one and
increase its security and efficiency and resist the hackers.
Related Work
■ A new encryption technique has been proposed in this paper to combine Elliptic Curve
Cryptosystem (ECC) with Hill cipher (HC) technique to strengthen the security and
produce a new approach (ECCHC) similar in principle to the work proposed in Gutub
and Khan (2012). The new approach uses ECC to generate the private and public keys,
and then both sender and receiver have the ability to produce the secret key with no
need to share it through the internet or unsecured communication channel.
■ drawbacks in Hill cipher algorithm is that the inverse of the key matrix does not
always exist. So, if the key matrix is not invertible.
■ This paper avoids this problem by using the self invertible key matrix.
Elliptic Curve Cryptography (ECC)
■ Elliptic Curve Cryptography (ECC) is a suitable encryption technique to be used in
portable devices, embedded systems, and mobile devices because it can provide high
security with smaller key size and fewer computations with less memory usage and
lower power consumptions compared by RSA.
■ The hardness of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) from the
adversaries is one of the ECC advantages.
Elliptic Curve Cryptography (ECC)
■ E : Elliptic Curve
■ P : Point on the curve
■ m,n :should be a prime numbers
■ O : original image or message.
Hill Cipher (HC)
■ Hill cipher is a symmetric block cipher technique. Both sender and receiver should
share and use the same key matrix for ciphering and deciphering.
■ Encryption
C = K * P Mod26
■ K : Key Matrix.
■ P: Plaintext.
Hill Cipher (HC)
■ Decryption
P= K-1 * C Mod26
■ the recipient needs to compute the key matrix inverse (K-1) where K.K-1 =1 ; I is the
identity matrix, then use the following equation to produce the plaintext P (original
message) (Hill, 1929; Acharya et al., 2009)
Hill Cipher (HC)
■ Example, a = 0, b = 1, . . ., z = 25. Then divide the plaintext (message) into blocks consist
of the same size m depending on the key matrix size m × m.
The proposed cryptosystem
■ Suppose the sender (User A) wants to send an image M to the other party (User B)
using ECCHC over an insecure channel.
■ Firstly, they should agree on the elliptic curve function E and share the domain
parameters {a; b; p; G}, where
■ a; b are the coefficients of the elliptic function.
■ p is a large prime number.
■ G is the generator point.
■ Then each party needs to choose randomly his private key from the interval [1; p – 1];
nA for User A and nB for User B, and generates his public key as follows
PA = nA.G
PB = nB.G
■ Each user multiplies his private key by the public key of the other user to get the
initial key KI = (x; y)
The proposed cryptosystem
The proposed cryptosystem
The proposed cryptosystem
Step 1: Key Generation
1.1. User A (The sender)
■ 1.1.1. Choose the private key nA ϵ[1,p – 1]
■ 1.1.2. Compute the public key PA = nA. G
■ 1.1.3. Compute the initial key KI = nA.PB = (x, y)
■ 1.1.4. Compute K1 = x.G = (k11, k12) and K2 = y.G = (k21, k22)
■ 1.1.5. Generate the self-invertible key matrix Km.
1.2. User B (The receiver)
■ 1.2.1. Choose the private key nB ϵ [1, p -1]
■ 1.2.2. Compute the public key PB =nB.G
■ 1.2.3. Compute the initial key KI = nB.PA = (x, y)
■ 1.2.4. Compute K1 = x.G = (k11, k12) and K2 = y.G = (k21, k22)
■ 1.2.5. Generate the self-invertible key matrix Km
The proposed cryptosystem
Step 2: Encryption (User A)
■ 2.1. Separate the original image pixel values into blocks of size four.
■ 2.2. Arrange each block into four rows column vector (4 ×1).
■ 2.3. Multiply the self-invertible key matrix Km by each vector (P1; P2; P3; . . .) and take
modulo 256 for each value C1 = (Km,P1) mod 256.
■ 2.4. Construct the ciphered image C from the values in the ciphered vectors (C1; C2; C3 ….).
The proposed cryptosystem
Step 3: Decryption (User B)
■ 3.1. Separate the ciphered image pixel values into blocks of size four.
■ 3.2. Arrange each block into four rows column vector (4 × 1).
■ 3.3. Multiply the self-invertible key matrix Km by each vector (C1; C2; C3; . . .) and take
modulo 256 for each value P1 =(Km. C1) mod 256.
■ 3.4. Construct the original image from the values in the deciphered vectors (P1; P2; P3; …).
Implementation example
■ Assume that User A wants to send an image M to User B
■ if we choose G = (1, 6), the domain parameters for E are {A, B, p, G} = {1, 3, 31,(1; 6)}.
■ If User A wants to send the grayscale image (Lena 256 ×256) to User B. Both sender and
receiver should apply the proposed approach (ECCHC) on the image as shown in the next
steps.
Step 1: Key Generation
User A
■ 1. Choose the private key nA = 13 ϵ [1, 30]
■ 2. Compute the public key PA = nA.G =13(1, 6) =(3, 23)
■ 3. Compute the initial key KI = nA.PB = 13(24,5) =(20, 5)= (x, y)
Implementation example
Implementation example
Step 1: Key Generation
User A
■ 1. Choose the private key nA =
13 ϵ [1, 30]
■ 2. Compute the public key PA =
nA.G =13(1, 6) =(3, 23)
Implementation example
Step 1: Key Generation
User A
■ KI = nA.PB = 13(24,5) =(20, 5)=
(x, y)
Implementation example
Step 1: Key Generation
User A
Step 2: Encryption (User A)
Step 3: Decryption (User B)
Result
Security analysis
■ There are some measures (parameters) used to assess the grayscale image encryption
efficiency and compare the encrypted image with the original image to evaluate the
performance of the encryption approach. A comparison between the proposed
approach and the existing approaches (previous approaches) has been done. Various
methods are applied in this research for the evaluation of the encryption efficiency, for
instance, Entropy, Peak Signal to Noise Ratio (PSNR), and Unified Average Changing
Intensity (UACI).
Security analysis
The Entropy
■ It shows the most frequency occurring patterns. It depends on the probability of the pixels
values and measures the degree of randomness. The theoretical and ideal entropy value for the
grayscale image of size 256 ×256 is eight, and the encrypted image efficiency is better if the
entropy value is closed to eight. In general, the greater the entropy, the harder it becomes to
break the cryptosystem.
Peak Signal to Noise Ratio (PSNR)
■ Peak Signal to Noise Ratio is used to assess the performance of an image encryption algorithm.
PSNR reflects the encryption quality and measures the distortion in the decrypted image
compared with the original image. Higher PSNR value means the loss data in the decrypted
image is zero or negligible, and this indicates that the decrypted image is identical to the
original image.
Security analysis
Unified Average Changing Intensity (UACI)
■ The difference between the original image and the ciphered image is measured by
UACI. UACI measures the average changing in intensity between the original and
ciphered images. The highest UACI means that the proposed technique is resistant
against differential attacks.
Security analysis
Security analysis
Security analysis
Conclusions
■ the proposed approach on Lena image gives good results for Entropy, PSNR, and UACI
better than other techniques. The Entropy value in the proposed approach 7.9970 is
the nearest to the expected value 8. PSNR value 8.5777 is better in the proposed
technique than Pandurang and Naveen Kumar techniques. Also, UACI value 30.4814 is
the nearest to the expected value
■ The proposed approach can be used efficiently in wireless applications and suitable for
small devices and embedded systems because it has a simple structure and faster
computations.
Reference
■ Dawahdeh, Z. E., Yaakob, S. N., & bin Othman, R. R. (2018). A new image encryption
technique combining Elliptic Curve Cryptosystem with Hill Cipher. Journal of King Saud
University-Computer and Information Sciences, 30(3), 349-355.
■ Acharya, B., Rath, G. S., Patra, S. K., & Panigrahy, S. K. (2007). Novel methods of
generating self-invertible matrix for hill cipher algorithm.
■ https://andrea.corbellini.name/ecc/interactive/modk-mul.html
Any Question??

More Related Content

What's hot

“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...IJORCS
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesiaemedu
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystemxlyle
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color imagesIIT Delhi
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairingeSAT Publishing House
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairingeSAT Journals
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual CryptographyAneeshGKumar
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueIRJET Journal
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 

What's hot (20)

“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Attention Models (D3L6 2017 UPC Deep Learning for Computer Vision)
Attention Models (D3L6 2017 UPC Deep Learning for Computer Vision)Attention Models (D3L6 2017 UPC Deep Learning for Computer Vision)
Attention Models (D3L6 2017 UPC Deep Learning for Computer Vision)
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Bt32444450
Bt32444450Bt32444450
Bt32444450
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color images
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 

Similar to Image Encryption Using ECC and Hill Cipher

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storageShivam Singh
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalIRJET Journal
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust ChannelsIRJET Journal
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsIRJET Journal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 

Similar to Image Encryption Using ECC and Hill Cipher (20)

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
N017327985
N017327985N017327985
N017327985
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Image Encryption Using ECC and Hill Cipher

  • 1. “A NEW IMAGE ENCRYPTION TECHNIQUE COMBINING ELLIPTIC CURVE CRYPTOSYSTEM WITH HILL CIPHER” Presented By : Aya Hatem Allam
  • 2. Agenda ■ Introduction. ■ Problem Statement. ■ Contribution. ■ Related Work. ■ Elliptic curve. ■ Hill cipher algorithm. ■ The proposed cryptosystem. ■ Implementation example. ■ Security analysis. ■ Conclusions.
  • 3. Introduction Cryptography is the practice and study of techniques for securing communication and data in the presence of adversaries. Cryptography is one of the mathematical techniques that are used to protect images from adversaries and increase the security of communications.
  • 7. Problem Statement ■ Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. ■ Encryption techniques are the suitable methods to protect images from attacks. ■ Hill cipher algorithm is one of the symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channels.
  • 8. Contribution ■ new image encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed ■ in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its security and efficiency and resist the hackers.
  • 9. Related Work ■ A new encryption technique has been proposed in this paper to combine Elliptic Curve Cryptosystem (ECC) with Hill cipher (HC) technique to strengthen the security and produce a new approach (ECCHC) similar in principle to the work proposed in Gutub and Khan (2012). The new approach uses ECC to generate the private and public keys, and then both sender and receiver have the ability to produce the secret key with no need to share it through the internet or unsecured communication channel. ■ drawbacks in Hill cipher algorithm is that the inverse of the key matrix does not always exist. So, if the key matrix is not invertible. ■ This paper avoids this problem by using the self invertible key matrix.
  • 10. Elliptic Curve Cryptography (ECC) ■ Elliptic Curve Cryptography (ECC) is a suitable encryption technique to be used in portable devices, embedded systems, and mobile devices because it can provide high security with smaller key size and fewer computations with less memory usage and lower power consumptions compared by RSA. ■ The hardness of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) from the adversaries is one of the ECC advantages.
  • 11. Elliptic Curve Cryptography (ECC) ■ E : Elliptic Curve ■ P : Point on the curve ■ m,n :should be a prime numbers ■ O : original image or message.
  • 12. Hill Cipher (HC) ■ Hill cipher is a symmetric block cipher technique. Both sender and receiver should share and use the same key matrix for ciphering and deciphering. ■ Encryption C = K * P Mod26 ■ K : Key Matrix. ■ P: Plaintext.
  • 13. Hill Cipher (HC) ■ Decryption P= K-1 * C Mod26 ■ the recipient needs to compute the key matrix inverse (K-1) where K.K-1 =1 ; I is the identity matrix, then use the following equation to produce the plaintext P (original message) (Hill, 1929; Acharya et al., 2009)
  • 14. Hill Cipher (HC) ■ Example, a = 0, b = 1, . . ., z = 25. Then divide the plaintext (message) into blocks consist of the same size m depending on the key matrix size m × m.
  • 15. The proposed cryptosystem ■ Suppose the sender (User A) wants to send an image M to the other party (User B) using ECCHC over an insecure channel. ■ Firstly, they should agree on the elliptic curve function E and share the domain parameters {a; b; p; G}, where ■ a; b are the coefficients of the elliptic function. ■ p is a large prime number. ■ G is the generator point. ■ Then each party needs to choose randomly his private key from the interval [1; p – 1]; nA for User A and nB for User B, and generates his public key as follows PA = nA.G PB = nB.G ■ Each user multiplies his private key by the public key of the other user to get the initial key KI = (x; y)
  • 18. The proposed cryptosystem Step 1: Key Generation 1.1. User A (The sender) ■ 1.1.1. Choose the private key nA ϵ[1,p – 1] ■ 1.1.2. Compute the public key PA = nA. G ■ 1.1.3. Compute the initial key KI = nA.PB = (x, y) ■ 1.1.4. Compute K1 = x.G = (k11, k12) and K2 = y.G = (k21, k22) ■ 1.1.5. Generate the self-invertible key matrix Km. 1.2. User B (The receiver) ■ 1.2.1. Choose the private key nB ϵ [1, p -1] ■ 1.2.2. Compute the public key PB =nB.G ■ 1.2.3. Compute the initial key KI = nB.PA = (x, y) ■ 1.2.4. Compute K1 = x.G = (k11, k12) and K2 = y.G = (k21, k22) ■ 1.2.5. Generate the self-invertible key matrix Km
  • 19. The proposed cryptosystem Step 2: Encryption (User A) ■ 2.1. Separate the original image pixel values into blocks of size four. ■ 2.2. Arrange each block into four rows column vector (4 ×1). ■ 2.3. Multiply the self-invertible key matrix Km by each vector (P1; P2; P3; . . .) and take modulo 256 for each value C1 = (Km,P1) mod 256. ■ 2.4. Construct the ciphered image C from the values in the ciphered vectors (C1; C2; C3 ….).
  • 20. The proposed cryptosystem Step 3: Decryption (User B) ■ 3.1. Separate the ciphered image pixel values into blocks of size four. ■ 3.2. Arrange each block into four rows column vector (4 × 1). ■ 3.3. Multiply the self-invertible key matrix Km by each vector (C1; C2; C3; . . .) and take modulo 256 for each value P1 =(Km. C1) mod 256. ■ 3.4. Construct the original image from the values in the deciphered vectors (P1; P2; P3; …).
  • 21. Implementation example ■ Assume that User A wants to send an image M to User B ■ if we choose G = (1, 6), the domain parameters for E are {A, B, p, G} = {1, 3, 31,(1; 6)}. ■ If User A wants to send the grayscale image (Lena 256 ×256) to User B. Both sender and receiver should apply the proposed approach (ECCHC) on the image as shown in the next steps. Step 1: Key Generation User A ■ 1. Choose the private key nA = 13 ϵ [1, 30] ■ 2. Compute the public key PA = nA.G =13(1, 6) =(3, 23) ■ 3. Compute the initial key KI = nA.PB = 13(24,5) =(20, 5)= (x, y)
  • 23. Implementation example Step 1: Key Generation User A ■ 1. Choose the private key nA = 13 ϵ [1, 30] ■ 2. Compute the public key PA = nA.G =13(1, 6) =(3, 23)
  • 24. Implementation example Step 1: Key Generation User A ■ KI = nA.PB = 13(24,5) =(20, 5)= (x, y)
  • 25. Implementation example Step 1: Key Generation User A
  • 26. Step 2: Encryption (User A)
  • 27. Step 3: Decryption (User B)
  • 29. Security analysis ■ There are some measures (parameters) used to assess the grayscale image encryption efficiency and compare the encrypted image with the original image to evaluate the performance of the encryption approach. A comparison between the proposed approach and the existing approaches (previous approaches) has been done. Various methods are applied in this research for the evaluation of the encryption efficiency, for instance, Entropy, Peak Signal to Noise Ratio (PSNR), and Unified Average Changing Intensity (UACI).
  • 30. Security analysis The Entropy ■ It shows the most frequency occurring patterns. It depends on the probability of the pixels values and measures the degree of randomness. The theoretical and ideal entropy value for the grayscale image of size 256 ×256 is eight, and the encrypted image efficiency is better if the entropy value is closed to eight. In general, the greater the entropy, the harder it becomes to break the cryptosystem. Peak Signal to Noise Ratio (PSNR) ■ Peak Signal to Noise Ratio is used to assess the performance of an image encryption algorithm. PSNR reflects the encryption quality and measures the distortion in the decrypted image compared with the original image. Higher PSNR value means the loss data in the decrypted image is zero or negligible, and this indicates that the decrypted image is identical to the original image.
  • 31. Security analysis Unified Average Changing Intensity (UACI) ■ The difference between the original image and the ciphered image is measured by UACI. UACI measures the average changing in intensity between the original and ciphered images. The highest UACI means that the proposed technique is resistant against differential attacks.
  • 35. Conclusions ■ the proposed approach on Lena image gives good results for Entropy, PSNR, and UACI better than other techniques. The Entropy value in the proposed approach 7.9970 is the nearest to the expected value 8. PSNR value 8.5777 is better in the proposed technique than Pandurang and Naveen Kumar techniques. Also, UACI value 30.4814 is the nearest to the expected value ■ The proposed approach can be used efficiently in wireless applications and suitable for small devices and embedded systems because it has a simple structure and faster computations.
  • 36. Reference ■ Dawahdeh, Z. E., Yaakob, S. N., & bin Othman, R. R. (2018). A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher. Journal of King Saud University-Computer and Information Sciences, 30(3), 349-355. ■ Acharya, B., Rath, G. S., Patra, S. K., & Panigrahy, S. K. (2007). Novel methods of generating self-invertible matrix for hill cipher algorithm. ■ https://andrea.corbellini.name/ecc/interactive/modk-mul.html