Cryptography Based on Elliptic Curve and Special Matrix with Linear System Algorithm

Authors

  • Ameer H. Mahdi Computer science and mathematics/university of kufa
  • Adil AL-Rammahi University of Kufa

DOI:

https://doi.org/10.31642/JoKMC/2018/110113%20

Keywords:

Elliptic curve cryptosystem, circulant matrix, Logical operation XOR, Modulo and Multiplicative Inverses Modulo, Image encryption

Abstract

Elliptic Curve Cryptosystem, which offers a high level of security with a reduced key size, has emerged as the best option for public key encryption. Elliptic curve cryptosystem has proven to be the best solution for public key encryption, where it provides a good level of security with smaller key size. In this paper, we attempt to develop an enhanced image encryption algorithms based on ECC by use two keys as circulant matrix in one of them, while generation another key from simple linear system modulo to purpose of image cryptography. The results of the suggested algorithm comparison with recent research are used to assess it where results were better than previous works”

Downloads

Download data is not yet available.

References

A Shreef, M., & K Hoomod, H. (2013). Image encryption using lagrange-least squares interpolation. International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol, 2, 35-55.

John Justin, M., & Manimurugan, S. (2012). A survey on various encryption techniques. International Journal of Soft Computing and Engineering (IJSCE) ISSN, 2231, 2307.‏

I.M.Alamsyah.(2014)."ALGEBRAICSTRUCTURES INCRYPTOGRAPHY " Algebra Research Group, Faculty of Mathematics and Natural Sciences..

J. S. Chauhan and S. K. Sharma. (2015). “A Comparative Study of Cryptographic Algorithms,” Int. J. Innov. Res., 24–28.

Narasimham, C., & Pradhan, J. (2008). Evaluation of performance characteristics of cryptosystem using text files. Journal of Theoretical & Applied Information Technology, 4(1).‏

Naureen, A., Akram, A., Maqsood, T., Riaz, R., Kim, K. H., & Ahmed, H. F. (2008, May). Performance and security assessment of a PKC based key management scheme for hierarchical sensor networks. In VTC Spring 2008-IEEE Vehicular Technology Conference (pp. 163-167). IEEE.‏

S. Farah, M. Y. Javed, A. Shamim, and T. Nawaz.(2012) “An experimental study on Performance Evaluation of Asymmetric Encryption Algorithms,” Recent advaces Inf. Sci., vol. 8,121–124.

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography crc press. Boca Raton.‏

Jurišic, A., & Menezes, A. (1997). Elliptic curves and cryptography. Dr. Dobb’s Journal, 26-36.‏

Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203-209.‏

Miller, V. S. (1985, August). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417-426). Berlin, Heidelberg: Springer Berlin Heidelberg.‏

Abd El-Latif, A. A., & Niu, X. (2013). A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU-International Journal of Electronics and Communications, 67(2), 136-143.‏

Nagaraj, S., Raju, G. S. V. P., & Rao, K. K. (2015). Image encryption using elliptic curve cryptograhy and matrix. Procedia Computer Science, 48, 276-281.‏

Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography. Designs, codes and cryptography, 19, 173-193.‏

Analytics, D. P. M. U. C. Computing, Communications and Informatics (ICACCI).‏

Al Saffar, N. F. H., & Said, M. R. M. (2014). High Performance Methods of Elliptic Curve Scalar Multiplication. International Journal of Computer Application, 108(20), 39-45.‏

Deb, S., & Haque, M. M. (2019). Elliptic curve and pseudo-inverse matrix based cryptosystem for wireless sensor networks. International Journal of Electrical and Computer Engineering (IJECE), 9(5), 4479-4492.‏

Faz-Hernández, A., López, J., & Dahab, R. (2019). High-performance implementation of elliptic curve cryptography using vector instructions. ACM Transactions on Mathematical Software (TOMS), 45(3), 1-35.‏

Faz-Hernández, et al., “High-performance implementation of elliptic curve cryptography using vector instructions,” ACM Transactions on Mathematical Software, vol. 45, no. 3, pp. 1-35, 2019.

Obaid, Z. K., & Al Saffar, N. F. H. (2021). Image encryption based on elliptic curve cryptosystem. International Journal of Electrical and Computer Engineering, 11(2), 1293.‏

Biggs, N. (1993). Algebraic graph theory (No. 67). Cambridge university press.‏

Gray, R. M. (2000). Toeplitz and circulant matrices: A review, 2002. URL http://ee. stanford. edu/~ gray/toeplitz. pdf.‏

Arya, M. C., Chandra, N., Joshi, M. C., & Campus, D. S. B. (2018). A coincidence point theorem in partial metric space. Ganita J, 68, 1-6.‏

L.Michael.(June 2012). "All About XOR". Overload. 2 ((109): 14–19.

Paar, C., & Pelzl, J. (2009). Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media.‏

D. M. Burton. (2009)."Elementary Number Theory", Seventh Edition, McGraw-Hill.

Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749-761.‏

C. X. Zhu, Z. G. Chen, and W. W. Ouyang. (2006)."A new image encryption algorithm based on general Chen's chaotic system," Journal of Central South University (Science and Technology .

Wu, Y., Noonan, J. P., & Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), 31-38.‏

Downloads

Published

2024-03-30

How to Cite

Mahdi, A. H., & AL-Rammahi , A. (2024). Cryptography Based on Elliptic Curve and Special Matrix with Linear System Algorithm. Journal of Kufa for Mathematics and Computer, 11(1), 83–91. https://doi.org/10.31642/JoKMC/2018/110113

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.