首页> 外文会议>International Conference on Contemporary Computing and Informatics >Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p)
【24h】

Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p)

机译:GF(p)上具有循环椭圆曲线点随机序列的密钥序列的对称密钥图像加密方案

获取原文

摘要

Until recently, Cryptography has been of interest primarily to the military and diplomatic communities. But the dawning of the information age has revealed an urgent need for cryptography in the private sector too. Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. In this paper, cyclic elliptic curve of the form y = x + ax + b, a, b ∈ GF(p) with order M is considered and key Sequences are derived from random sequence of cyclic elliptic Curve points. Elliptic Curve is a cubic equation in two variables, x and y, with coefficients from a field satisfying certain conditions. For cryptographic applications the coefficients are chosen from finite fields. A point on the Elliptic curve is a pair of (x, y) which satisfies the Elliptic curve equation. The total number of points (x, y) which satisfy the elliptic curve equation along with x=∞, y=∞ is called the Order of the curve `M'. The least integer N for which NP is equal to point at infinity O is called order of the point P. Elliptic curves for which there exists a point P having the same order N, as that of the curve M are called cyclic elliptic curves. A pseudorandom sequence generator based on chaotic function and Elliptic Curve arithmetic over GF(p) is proposed here. The logistic Map is used as a chaotic function which generates a random sequence of real numbers. This random real sequence is converted to binary which drives an Elliptic Curve arithmetic module generating a random sequence of Elliptic Curve points. The sequence of points {P, 2P, ..., NP} is calculated from a base point P, and stored in a file. Every element in this sequence is a point on the cyclic elliptic curve. The Chaotic binary sequence selects x or y-coordinates of elliptic curve points, pre-computed and stored. This forms a random integer sequence. The randomness properties of this sequence have been tested using various techniques like, autocor- elation distribution, crosscorrelation distribution and first return map. It is observed that the sequence generated satisfies the required randomness properties. These sequences find applications in Stream Cipher Systems. An additive Stream Cipher system is designed using this sequence as the key sequence to encrypt images. Results of image encryption and decryption for a medical image is discussed and analyzed in this paper. The results are also compared with the scheme proposed by Lap-Piu Lee and Kwok-Wo Wong [1]. The security analysis of the proposed system is also discussed. It is interesting to observe that, proposed algorithm is superior compared to Lap-Piu Lee scheme [1].
机译:直到最近,加密学主要是军事和外交社区的兴趣。但信息时代的曙光也揭示了私营部门在私营部门的加密需求。密码术是对确保信息保密和认证的技术的研究。在本文中,考虑y = x + x + b,a,b = gf(p)的循环椭圆曲线,并且键序列从循环椭圆曲线点的随机序列导出。椭圆曲线是两个变量,x和y中的立方方程,具有来自满足某些条件的场的系数。对于加密应用程序,系数从有限字段中选择。椭圆曲线上的点是满足椭圆曲线方程的一对(x,y)。满足椭圆曲线方程以及x =∞,y =∞的点(x,y)的总数称为曲线`m'的顺序。其中NP等于Infinity O的点的最小整数N被称为点P.椭圆曲线的顺序,其中存在具有相同顺序N的点P,因为曲线M的曲线M称为循环椭圆曲线。提出了一种基于混沌功能和GF(P)椭圆曲线算法的伪随机序列发生器。 Logistic Map用作混沌函数,该函数产生随机的实数序列。该随机实际序列被转换为二进制,其驱动椭圆曲线算术模块生成椭圆曲线点的随机序列。点{p,2p,...,np}的序列由基点p计算,并存储在文件中。该序列中的每个元素都是循环椭圆曲线上的点。混沌二进制序列选择椭圆曲线点的X或Y坐标,预先计算和存储。这形成了随机整数序列。使用诸如自动传播分布,横刷分布和第一返回地图的各种技术测试了该序列的随机性属性。观察到所产生的序列满足所需的随机性属性。这些序列在流密码系统中查找应用程序。添加数据流密码系统使用该序列设计为以加密图像的密钥序列。本文讨论和分析了图像加密的结果和医学图像的解密。结果也将结果与Lap-Piu Lee和Kwok-Wo Wong提出的方案进行了比较[1]。还讨论了所提出的系统的安全分析。观察到,与LAP-PIU LEE方案相比,所提出的算法优越[1]。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号