An asymmetric encryption method for 3D mesh model using elgamal with elliptic curve cryptography
نویسندگان
چکیده
The 3D mesh <span lang="EN-US">(Polygon mesh) model has been widely used in multiple computer technology fields such as graphic design and modern animation. repositories were created to support the contribution of many artist-designers have become an important data source. This research is aimed at introducing asymmetric encryption for a improve using elgamal elliptic curve cryptography with Fischer-Yates shuffling. researchers evaluated performance proposed Entropy, mean squared error (MSE), peak signal noise ratio (PSNR) evaluation matrices. results decrypted our approach double-precision floating point showed zero means infinite value PSNR</span>.
منابع مشابه
An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System
Wireless Body Area Networks (WBANs) has been recognized as one of the promising wireless sensor technologies for improving healthcare service thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make it potential users worry about the leakage of their privat...
متن کاملAn On-chip Data Storage with ElGamal Elliptic Curve Cryptosystems
An On-chip Data Storage with cryptosystem proposed in this paper was designed for modern smart card system and “on the fly data encryption/decryption”. To ensure the security, the ElGamal Elliptic curve cryptosystems with the key size of 176 bits was embeded. The design can be configured to be either the encrypter or the decryptor with simple control signals. To minimize the hardware cost, size...
متن کاملImage Encryption Using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression
An abstract is a brief summary of a research article or in-depth analysis of a particular subject or discipline, and is often used to help the reader quickly ascertain the paper's purpose. Images can be encrypted in several ways, by using different techniques and different encryption methods. In this paper, I am using Huffman Coding method for image steganography, Elliptic Curve Cryptography fo...
متن کاملRSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs
A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in these networks is challenging. Threshold Cryptography (TC) provides a promise of securing these networks. In this paper, we discuss our RSA-based Threshold Cryptography (RSA-TC) and...
متن کاملSoftware Elliptic Curve Cryptography
In this thesis, we study the software implementation of the NIST-recommended elliptic curves over prime fields. Our implementation goals are to achieve a fast, small, and portable cryptographic library, which supports elliptic curve digital signature generation and verification. The implementation results are presented on a Pentium I1 448.81 MHz. We also consider the sliding window algorithm (S...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v27.i2.pp959-969