Image Encryption and Authentication With Elliptic Curve Cryptography and Multidimensional Chaotic Maps
نویسندگان
چکیده
Many researchers have used the properties of popular Elliptic Curve Cryptography(ECC) to devise a stronger and faster image encryption algorithm assure secrecy images during online transmission. In this paper, robust curve based authentication model for both grayscale color has been proposed. The uses secure Diffie-Hellman(ECDH) key exchange compute shared session along with improved ElGamal encoding scheme. 3D 4D Arnold Cat maps are effectively scramble transform values plain pixels. A well-structured digital signature is verify authenticity encrypted prior decryption. produces good-quality cipher an average entropy 7.9993 7.99925 individual components images. high NPCR 99.6%, UACI 33.3% low correlation computational costs minimized point multiplication operations. proposed resilience against statistical, differential, chosen-plaintext(CPA), known-plaintext(KPA) occlusion attacks.
منابع مشابه
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...
متن کاملAchieving Authentication and Integrity using Elliptic Curve Cryptography Architecture
Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties.The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is ...
متن کاملSurvey: Image Encryption using Chaotic Cryptography Schemes
Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and loss of information. Many chaos-based encryption methods have been presented and discussed in the last two decades. In order to reach higher performance, the...
متن کاملChaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps
This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several chaos based ciphers. Using the well-known principles in the cryptanalysis we show that these ciphers do not behave worse than the standard ones, opening in this way a novel approach to the design of block encryption ciphers.
متن کاملImage Encryption Using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression
An abstract is a brief summary of a research article or in-depth analysis of a particular subject or discipline, and is often used to help the reader quickly ascertain the paper's purpose. Images can be encrypted in several ways, by using different techniques and different encryption methods. In this paper, I am using Huffman Coding method for image steganography, Elliptic Curve Cryptography fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3072075