Elliptic Curve Video Encryption in Mobile Phone Based on Multi-Keys and Chaotic Map
نویسندگان
چکیده
منابع مشابه
Image encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملChaotic Map based Block Encryption
Number of cryptosystems based on chaos has been proposed, in recent years. Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this system, an encryption /decryption scheme was proposed, a cryptographic...
متن کاملA Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem
This paper proposes a new modified variant of Menezes and Vanstone elliptic curve cryptosystem. This new variant uses the same original Menezes and Vanstone elliptic curve cryptosystem but in an elegant way. The new variant uses a not only one elliptic curve but a number of curves. Each curve is chosen with its corresponding keys to constitute a separate cryptosystem. The message is then divide...
متن کاملGenerating Keys in Elliptic Curve Cryptosystems
In this paper, we will present how to find keys elliptic curve cryptosystems (ECC) with simple tools of Delphi 7 console application, using the software problem solving of the scalar point multiplication in the field GF (p), where p is an arbitrary prime number.
متن کاملA Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we propo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Al-Mustansiriyah Journal of Science
سال: 2018
ISSN: 2521-3520,1814-635X
DOI: 10.23851/mjs.v29i2.438