SlideShare a Scribd company logo
IMAGE ENCRYPTION
TECHNIQUE COMBINING
ELLIPTIC CURVE
CRYPTOSYSTEM WITH
HILL CIPHER
K KARTHIK
(14BEC0679)
G ROOPESH
INTRODUCTION
• Image encryption is rapidly increased recently by the increasing use of the
internet and communication media
• Sharing important images over unsecured channels is liable for attacking
and stealing.Encryption techniques are the suitable methods to protect
images from attacks.
• Encryption is done by the sender to convert the original grayscale image to
encrypted image before sending it via the internet to the other user
(recipient). Decryption is done by the receiver to return the ciphered image
back to the original image.
• Cryptography is one of the mathematical techniques that are used to
protect images from adversaries and increase the security of
communications.
A FEW EXISTING IMAGE ENCRYPTION
TECHNIQUES . .
• Image Encryption Algorithm Based on Hash Function:
Firstly does pre-processing operation to shuffle one half of image then hash function to
generate a random number mask.The mask is then XORed with the other part of the image
which is going to be encrypted.
• Algorithm Based Composition ofTwo Chaotic Logistic Maps:
It composes two chaotic logistic maps and external secret key for encryption of image. In this
an external secret key of 104 bit and two chaotic logistic maps are used to differentiate
between the encrypted image and the plain image.
• Algorithm Using AffineTransform and XOR Operation:
Uses AffineTransform and was based on shuffling the image pixels. It was two phase
encryption decryption algorithm. Firstly using XOR operation they encrypted the resulting
image and then using the affine transformation, the pixel values were redistributed to different
locations with 4 bit keys.
NOTE:All the existing encryption techniques, lack the speed in Encrypting & Decrypting the image but
HILL CIPHERTECHNIQUE with convenient modifications increases the security and reduces the
vulnerability.
HILL CIPHER TECHNIQUE
• Hill cipher algorithm is one of the symmetric techniques, it has a
simple structure and fast computations.
• In symmetric encryption, the same key (private key) is used for both
encryption and decryption processes.
• Hill cipher algorithm has high throughput, high speed, and simple
structure, but weak security because both sender and receiver should
use and share the same key (private key) via unsecured channels.
• Hill cipher employs polygraphic substitution cipher based on linear
algebra. It uses matrices and matrix multiplication to mix up the
plaintext.
ELLIPTIC CURVE CRYPTOGRAPHY(ECC)
• Elliptic Curve Cryptography (ECC) is one of the effective public key
cryptography(Asymmetric) techniques, It was proposed separately by
Miller (1985) and Koblitz (1987).The hardness of solving the Elliptic
Curve Discrete Logarithm Problem (ECDLP) from the adversaries is
one of the ECC advantage.
• ECC works on a small key size with a little amount of memory and low
power compared to other systems like RSA(Rivest–Shamir–
Adleman).
• Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been
proposed in this paper to convert Hill cipher from symmetric
technique to asymmetric one by increasing its security & efficiency
and resist the hackers.
ECC PROPOSED ALGORITHM & EXPLAINATION
FIXING ELLIPTICAL
CURVE
PARAMETERS
KEY GENERATION
FOR DIFFERENT
USERS
ENCRYPTION DECRYPTION
1.FIXING ELLIPTICAL CURVE PARAMETERS:
An elliptic curve E over a prime field Fp is defined by E : y2=x3+ax+b(mod p),Where a,bєFp p≠2,3; and
satisfy the condition 4a3 +27b2=0(mod p). where a,b are the coefficients of the elliptic function, p is a large
prime number, and G is the generator point.The elliptic curve group E(Fp)consists of all points (x,y) that
satisfy the elliptic curve E and the point at the infinity O
Scalar multiplication is the main operation on EC that consumes more time in encryption and decryption
operations, it depends on point addition and point doubling
Point addition: Suppose P1 =(x1,y1) and P2 =(x2,y2), where P1 ≠ P2, are two points lie on an elliptic
curve E. Adding the two points P1 and P2 giving a third point R that should lie on the same curve E
Point doubling: Adding the point P1 =(x1,y1) that lies on the elliptic curve E to itself is called point
doubling.The point R that results from doubling the point P is also lies on the elliptic curve E
CALCULATION OF ELLIPTICAL CURVE PARAMETERS
POINT ADDITION POINT DOUBLING
SCALAR MULTIPLICATION
The scalar multiplication of an integer k by the point Q=(x1,y1) that lies on the curve E can
be defined by repeating the addition of the point Q to itself k times.The result point R also
lies on the elliptic curve E.
For example, computing 15Q can be done using point addition and point doubling as
follows:
FIXING ELLIPTICAL
CURVE
PARAMETERS
KEY GENERATION
FOR DIFFERENT
USERS
ENCRYPTION
DECRYPTION
2.KEY GENERATION
Key Generation :User A (The Sender)
Choose the private key :nA є [ 1,p-1]
Compute the public key PA =nA.G
Compute the initial key KI= nA.PB =(x,y)
Compute K1 = x.G = (k11,k12) and K2 =y.G =(k21, k22)
Generate the self-invertible key matrix Km
Key Generation :User B (The Receiver)
Choose the private key :nB є [ 1,p-1]
Compute the public key PB=nB.G
Compute the initial key KI= nB.PA =(x,y)
Compute K1 = x.G = (k11,k12) and K2 =y.G =(k21, k22)
Generate the self-invertible key matrix Km
FIXING ELLIPTICAL
CURVE
PARAMETERS
KEY GENERATION
FOR DIFFERENT
USERS
ENCRYPTION
DECRYPTION
Encryption (User A)
1)Separate the original image pixel values into blocks of size four.
2)Arrange each block into four rows column vector (4×1)
3)Multiply the self-invertible key matrix Km by each vector (P1, P2, P3, ...)
and take modulo 256 for each value C1 =(Km.P1) mod 256.
4)Construct the ciphered image C from the values in the ciphered vectors
(C1,C2,C3,….)
3.ENCRYPTION
4.DECRYPTION
Decryption (User B)
1)Separate the ciphered image pixel values into blocks of size four.
2)Arrange each block into four rows column vector (4×1)
3)Multiply the self-invertible key matrix Km by each vector (C1,C2,C3, ...)
and take modulo 256 for each value P1=(Km.C1)mod 256
4)Construct the original image from the values in the deciphered
vectors (P1,P2,P3,….)
FIXING ELLIPTICAL
CURVE
PARAMETERS
KEY GENERATION
FOR DIFFERENT
USERS
ENCRYPTION
DECRYPTION
IMPLEMENTATION EXAMPLE
EXPECTED OUTCOME
REFERENCE
A new Image EncryptionTechnique combining Elliptic Curve Cryptosystem
with Hill Cipher
By Ziad E.Dawahdeh Shahrul N.Yaakob RozmieRazif bin Othman
https://www.sciencedirect.com/science/article/pii/S1319157817301039
DOI:https://doi.org/10.1016/j.jksuci.2017.06.004
TIME LINE (DEC to APR 2018)
Sl NO: MONTH TASKTO BE COMPLETED
1. DECEMBER  Learning theory and coding for existing paper
2. JANUARY  Design and Experimentation
3. FEBRUARY  Modification of the results obtained
4. MARCH  Tuning results and writing the paper
5. APRIL  Final review

More Related Content

What's hot

Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6limsh
 
Ch01
Ch01Ch01
Ch01n C
 
Block Cipher
Block CipherBlock Cipher
Block Cipher
Brandon Byungyong Jo
 
Sample test-plan-template
Sample test-plan-templateSample test-plan-template
Sample test-plan-template
amikdamaru
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Test cases
Test casesTest cases
Test cases
Chandra Maddigapu
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
Sam Bowne
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
diaa46
 
Applications of various latest coprocessors
Applications of various latest coprocessorsApplications of various latest coprocessors
Applications of various latest coprocessors
Sejal Anand
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
pallavikhandekar212
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
Mazin Alwaaly
 
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
Metropolitan  Area Network(MAN) design with Cisco Packet TracerMetropolitan  Area Network(MAN) design with Cisco Packet Tracer
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
ShofiqulIslam38
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
Stephane Potier
 
ElGamal Encryption in Go
ElGamal Encryption in GoElGamal Encryption in Go
ElGamal Encryption in Go
Napier University
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 

What's hot (20)

Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
Ch01
Ch01Ch01
Ch01
 
Block Cipher
Block CipherBlock Cipher
Block Cipher
 
Sample test-plan-template
Sample test-plan-templateSample test-plan-template
Sample test-plan-template
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Test cases
Test casesTest cases
Test cases
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Scilab
ScilabScilab
Scilab
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
 
Applications of various latest coprocessors
Applications of various latest coprocessorsApplications of various latest coprocessors
Applications of various latest coprocessors
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
Metropolitan  Area Network(MAN) design with Cisco Packet TracerMetropolitan  Area Network(MAN) design with Cisco Packet Tracer
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
ElGamal Encryption in Go
ElGamal Encryption in GoElGamal Encryption in Go
ElGamal Encryption in Go
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 

Similar to Image encryption using elliptical curve cryptosytem with hill cipher

Hillcipher and eliptic curve
Hillcipher and eliptic curve Hillcipher and eliptic curve
Hillcipher and eliptic curve
aya_hatem
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
IJCERT
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
International Journal of Engineering Inventions www.ijeijournal.com
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
TELKOMNIKA JOURNAL
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
IDES Editor
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
IRJET Journal
 
Fully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptxFully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptx
ssuser1716c81
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12IJASCSE
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
Soham Mondal
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
Soham Mondal
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
IDES Editor
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
ams1ams11
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
rahulmonikasharma
 
ellipticcurvecryptography.pptx
ellipticcurvecryptography.pptxellipticcurvecryptography.pptx
ellipticcurvecryptography.pptx
AYUSHJAIN152065
 

Similar to Image encryption using elliptical curve cryptosytem with hill cipher (20)

Hillcipher and eliptic curve
Hillcipher and eliptic curve Hillcipher and eliptic curve
Hillcipher and eliptic curve
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Fully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptxFully Homomorphic Encryption (1).pptx
Fully Homomorphic Encryption (1).pptx
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 
ellipticcurvecryptography.pptx
ellipticcurvecryptography.pptxellipticcurvecryptography.pptx
ellipticcurvecryptography.pptx
 

Recently uploaded

Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
Nettur Technical Training Foundation
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Steel & Timber Design according to British Standard
Steel & Timber Design according to British StandardSteel & Timber Design according to British Standard
Steel & Timber Design according to British Standard
AkolbilaEmmanuel1
 

Recently uploaded (20)

Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Steel & Timber Design according to British Standard
Steel & Timber Design according to British StandardSteel & Timber Design according to British Standard
Steel & Timber Design according to British Standard
 

Image encryption using elliptical curve cryptosytem with hill cipher

  • 1. IMAGE ENCRYPTION TECHNIQUE COMBINING ELLIPTIC CURVE CRYPTOSYSTEM WITH HILL CIPHER K KARTHIK (14BEC0679) G ROOPESH
  • 2. INTRODUCTION • Image encryption is rapidly increased recently by the increasing use of the internet and communication media • Sharing important images over unsecured channels is liable for attacking and stealing.Encryption techniques are the suitable methods to protect images from attacks. • Encryption is done by the sender to convert the original grayscale image to encrypted image before sending it via the internet to the other user (recipient). Decryption is done by the receiver to return the ciphered image back to the original image. • Cryptography is one of the mathematical techniques that are used to protect images from adversaries and increase the security of communications.
  • 3. A FEW EXISTING IMAGE ENCRYPTION TECHNIQUES . . • Image Encryption Algorithm Based on Hash Function: Firstly does pre-processing operation to shuffle one half of image then hash function to generate a random number mask.The mask is then XORed with the other part of the image which is going to be encrypted. • Algorithm Based Composition ofTwo Chaotic Logistic Maps: It composes two chaotic logistic maps and external secret key for encryption of image. In this an external secret key of 104 bit and two chaotic logistic maps are used to differentiate between the encrypted image and the plain image. • Algorithm Using AffineTransform and XOR Operation: Uses AffineTransform and was based on shuffling the image pixels. It was two phase encryption decryption algorithm. Firstly using XOR operation they encrypted the resulting image and then using the affine transformation, the pixel values were redistributed to different locations with 4 bit keys. NOTE:All the existing encryption techniques, lack the speed in Encrypting & Decrypting the image but HILL CIPHERTECHNIQUE with convenient modifications increases the security and reduces the vulnerability.
  • 4. HILL CIPHER TECHNIQUE • Hill cipher algorithm is one of the symmetric techniques, it has a simple structure and fast computations. • In symmetric encryption, the same key (private key) is used for both encryption and decryption processes. • Hill cipher algorithm has high throughput, high speed, and simple structure, but weak security because both sender and receiver should use and share the same key (private key) via unsecured channels. • Hill cipher employs polygraphic substitution cipher based on linear algebra. It uses matrices and matrix multiplication to mix up the plaintext.
  • 5. ELLIPTIC CURVE CRYPTOGRAPHY(ECC) • Elliptic Curve Cryptography (ECC) is one of the effective public key cryptography(Asymmetric) techniques, It was proposed separately by Miller (1985) and Koblitz (1987).The hardness of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) from the adversaries is one of the ECC advantage. • ECC works on a small key size with a little amount of memory and low power compared to other systems like RSA(Rivest–Shamir– Adleman). • Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed in this paper to convert Hill cipher from symmetric technique to asymmetric one by increasing its security & efficiency and resist the hackers.
  • 6. ECC PROPOSED ALGORITHM & EXPLAINATION FIXING ELLIPTICAL CURVE PARAMETERS KEY GENERATION FOR DIFFERENT USERS ENCRYPTION DECRYPTION 1.FIXING ELLIPTICAL CURVE PARAMETERS: An elliptic curve E over a prime field Fp is defined by E : y2=x3+ax+b(mod p),Where a,bєFp p≠2,3; and satisfy the condition 4a3 +27b2=0(mod p). where a,b are the coefficients of the elliptic function, p is a large prime number, and G is the generator point.The elliptic curve group E(Fp)consists of all points (x,y) that satisfy the elliptic curve E and the point at the infinity O Scalar multiplication is the main operation on EC that consumes more time in encryption and decryption operations, it depends on point addition and point doubling Point addition: Suppose P1 =(x1,y1) and P2 =(x2,y2), where P1 ≠ P2, are two points lie on an elliptic curve E. Adding the two points P1 and P2 giving a third point R that should lie on the same curve E Point doubling: Adding the point P1 =(x1,y1) that lies on the elliptic curve E to itself is called point doubling.The point R that results from doubling the point P is also lies on the elliptic curve E
  • 7. CALCULATION OF ELLIPTICAL CURVE PARAMETERS POINT ADDITION POINT DOUBLING SCALAR MULTIPLICATION The scalar multiplication of an integer k by the point Q=(x1,y1) that lies on the curve E can be defined by repeating the addition of the point Q to itself k times.The result point R also lies on the elliptic curve E. For example, computing 15Q can be done using point addition and point doubling as follows: FIXING ELLIPTICAL CURVE PARAMETERS KEY GENERATION FOR DIFFERENT USERS ENCRYPTION DECRYPTION
  • 8. 2.KEY GENERATION Key Generation :User A (The Sender) Choose the private key :nA є [ 1,p-1] Compute the public key PA =nA.G Compute the initial key KI= nA.PB =(x,y) Compute K1 = x.G = (k11,k12) and K2 =y.G =(k21, k22) Generate the self-invertible key matrix Km Key Generation :User B (The Receiver) Choose the private key :nB є [ 1,p-1] Compute the public key PB=nB.G Compute the initial key KI= nB.PA =(x,y) Compute K1 = x.G = (k11,k12) and K2 =y.G =(k21, k22) Generate the self-invertible key matrix Km FIXING ELLIPTICAL CURVE PARAMETERS KEY GENERATION FOR DIFFERENT USERS ENCRYPTION DECRYPTION
  • 9. Encryption (User A) 1)Separate the original image pixel values into blocks of size four. 2)Arrange each block into four rows column vector (4×1) 3)Multiply the self-invertible key matrix Km by each vector (P1, P2, P3, ...) and take modulo 256 for each value C1 =(Km.P1) mod 256. 4)Construct the ciphered image C from the values in the ciphered vectors (C1,C2,C3,….) 3.ENCRYPTION 4.DECRYPTION Decryption (User B) 1)Separate the ciphered image pixel values into blocks of size four. 2)Arrange each block into four rows column vector (4×1) 3)Multiply the self-invertible key matrix Km by each vector (C1,C2,C3, ...) and take modulo 256 for each value P1=(Km.C1)mod 256 4)Construct the original image from the values in the deciphered vectors (P1,P2,P3,….) FIXING ELLIPTICAL CURVE PARAMETERS KEY GENERATION FOR DIFFERENT USERS ENCRYPTION DECRYPTION
  • 11.
  • 13. REFERENCE A new Image EncryptionTechnique combining Elliptic Curve Cryptosystem with Hill Cipher By Ziad E.Dawahdeh Shahrul N.Yaakob RozmieRazif bin Othman https://www.sciencedirect.com/science/article/pii/S1319157817301039 DOI:https://doi.org/10.1016/j.jksuci.2017.06.004
  • 14. TIME LINE (DEC to APR 2018) Sl NO: MONTH TASKTO BE COMPLETED 1. DECEMBER  Learning theory and coding for existing paper 2. JANUARY  Design and Experimentation 3. FEBRUARY  Modification of the results obtained 4. MARCH  Tuning results and writing the paper 5. APRIL  Final review