2018
DOI: 10.1016/j.jksuci.2017.06.004
|View full text |Cite
|
Sign up to set email alerts
|

A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(58 citation statements)
references
References 5 publications
0
54
0
2
Order By: Relevance
“…where = 1, = 3, = 31; which satisfies the condition 4 3 + 27 2 = 4(1) 3 +27(3) 2 = 4+243 = 247 mod 31 = 30 0. The elliptic curve 31 (1, 3) points are shown in Table 1 [16,18]. Since the order of the elliptic curve 31 (1, 3) is 41, which is a prime number, any point from Table 1 can be chosen to represent the base point or generator point .…”
Section: Experimental Results and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…where = 1, = 3, = 31; which satisfies the condition 4 3 + 27 2 = 4(1) 3 +27(3) 2 = 4+243 = 247 mod 31 = 30 0. The elliptic curve 31 (1, 3) points are shown in Table 1 [16,18]. Since the order of the elliptic curve 31 (1, 3) is 41, which is a prime number, any point from Table 1 can be chosen to represent the base point or generator point .…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…Ramesh [15] introduced an algorithm consists of four stages to eliminate the repetition of the substrings and enhance the security, and double columnar transposition is done for the plaintext twice, each time before applying Hill cipher  ISSN: 2088-8708 encryption. Dawahdeh [16] proposed a new image encryption technique that combined elliptic curve cryptosystem with hill cipher and applied the new technique on grayscale images and got a good results compared with other similar techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The system requires high computation which makes it slower. Dawahdeh et al [ 29 ] have adopted the encryption technique incorporating the Elliptic Curve Cryptosystem with Hill Cipher. The researchers selected ECC asymmetric encryption and Hill Cipher for symmetric encryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The key matrix should be invertible in hill cipher algorithm for decryption process. Later, [8]proposed a new technique called self invertible key matrix (k=kꜗ ) that avoids the above problem. It uses single matrix for encrypting the pixels inside the image but it takes more time.…”
Section: Introductionmentioning
confidence: 99%