Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Image Encryption Using Elliptic Curve Cryptography


Affiliations
1 Department of Computer Science and Engineering, Govt. Engineering College, Bikaner, Rajasthan, India
     

   Subscribe/Renew Journal


Elliptic Curve Cryptography or Cryptosystem (ECC) is one of the public-key cryptosystem. The main advantage and benefit of ECC instead of RSA is that it gives equivalent security by using smaller key then in RSA; thereby it consumes less number of resource and also less amount of memory. There are various advantages of ECC over RSA such as low bandwidth usage, low computational time and small key size; it can also be used for image encryption. Through this paper image encryption with using ECC is presented. It discusses the encryption, compression and decryption of image using ECC on matlab as platform.

Keywords

Cryptography, Decryption, Elliptic Curve, Encryption.
Subscription Login to verify subscription
User
Notifications
Font Size


  • R. Soram, and E. S. Meitei, International Symposium on Advanced Computing and Communication (ISACC), 2015.
  • K. Lauter, “The advantages of elliptic curve cryptography for wireless security,” IEEE Wireless Communications, vol. 11, no. 1.
  • G. Vennila, M. Manikandan, and S. Aswathi, “Performance analysis of point multiplication algorithms in ECDH for an end-to-end VoIP network,” INDICON, 2015.
  • P. Mathew, P. Jilna, and P. P. Deepthi, “Efficient implementation of EC based key management scheme on FPGA for WSN,” International Conference on Telecommunication Systems Services and Applications (TSSA), 2015.
  • X. Fang, and Y. Wu “Investigation into the elliptic curve cryptography,” 3rd International Conference on Information Management (ICIM), 2017.
  • S. R. Singh, A. K. Khan, and S. R. Singh, “Performance evaluation of RSA and elliptic curve cryptography,” 2nd International Conference on Contemporary Computing and Informatics (IC3I), 2016.
  • R. V. Rijswijk-Deij, K. Hageman, A. Sperotto, and A. Pras “The performance impact of elliptic curve cryptography on DNSSEC validation,” IEEE/ACM Transactions on Networking, 2017.
  • S. R. Singh, A. K. Khan, T. S. Singh, “A critical review on Elliptic Curve Cryptography,” International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016.
  • K. Jiang, B. Zhao, W. Shan, L. Wang, and J. Liu, “Profiling attack on modular multiplication of elliptic curve cryptography,” 12th International Conference on Computational Intelligence and Security (CIS), 2016.
  • F. Akhter, “A novel elliptic curve cryptography scheme using random sequence,”.
  • 2015 International Conference on Computer and Information Engineering (ICCIE).
  • M. S. Salah, A. Maizate, and M. Ouzzif, “Security approaches based on elliptic curve cryptography in wireless sensor networks,” 27th International Conference on Microelectronics (ICM), 2015.
  • P. Chandrakar, and H. Om, “A secure two-factor mutual authentication and session key agreement protocol using Elliptic curve cryptography,” IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS), 2015.
  • N. Alimi, Y. Lahbib, M. Machhout, and R. Tourki, “Elliptic curve cryptography implementations and evaluation,” 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2016.
  • D. He, H. Wang, M. K. Khan, and L. Wang, “Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography,” IET Communications, vol. 10, no. 14, pp. 1795-1802, Sep. 2016.
  • L. Deligiannidis, “Elliptic curve cryptography in Java,” IEEE International Conference on Intelligence and Security Informatics (ISI), 2015.
  • J. H. Silverman, “Elliptic curve,” Springer International Edition, 2010.
  • L. C. Washington, “Elliptic curves: Number theory and cryptography,” 2nd ed., 2008.
  • I. F. Blake, G. Seroussi, and N. P. Smart, “Elliptic curves in cryptography,” Cambridge University Press,1999.
  • D. B. Johnson, A. J. Menezes, “Elliptic curve DSA (ECDSA): An enhanced DSA,” 2012.
  • K. Lauter, The Advantages of Elliptic Curve Cryptography for Wireless Security, Microsoft Corporation.

Abstract Views: 289

PDF Views: 8




  • Image Encryption Using Elliptic Curve Cryptography

Abstract Views: 289  |  PDF Views: 8

Authors

N. Gupta
Department of Computer Science and Engineering, Govt. Engineering College, Bikaner, Rajasthan, India

Abstract


Elliptic Curve Cryptography or Cryptosystem (ECC) is one of the public-key cryptosystem. The main advantage and benefit of ECC instead of RSA is that it gives equivalent security by using smaller key then in RSA; thereby it consumes less number of resource and also less amount of memory. There are various advantages of ECC over RSA such as low bandwidth usage, low computational time and small key size; it can also be used for image encryption. Through this paper image encryption with using ECC is presented. It discusses the encryption, compression and decryption of image using ECC on matlab as platform.

Keywords


Cryptography, Decryption, Elliptic Curve, Encryption.

References