2022
DOI: 10.3390/math10203878
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher

Abstract: In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats. Therefore, efficient cryptosystems are highly necessary for the fast and secure transmission of multimedia data. In this article, cryptanalysis is performed on an existing encryption scheme designed using elliptic curve cryptography (ECC) and a Hill cipher. The work shows that the scheme is vulnerable to brute force attacks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…Insert bit_rhs to each entry on mc with the method replace the last nbit of each number in mc with bit_rhs 14. Output: x0, row_rhs and column_rhs , nbit_lsb Finally, Algorithm 3 is about the opening method proposed in this article as follows (Lone et al, 2022).…”
Section: Methodsmentioning
confidence: 99%
“…Insert bit_rhs to each entry on mc with the method replace the last nbit of each number in mc with bit_rhs 14. Output: x0, row_rhs and column_rhs , nbit_lsb Finally, Algorithm 3 is about the opening method proposed in this article as follows (Lone et al, 2022).…”
Section: Methodsmentioning
confidence: 99%
“…where P(m i ) is the probability of the element m i , and T represents the total number of elements m i . For an encrypted image, eight is the ideal value of entropy [16]. In this paper, we used the suggested approach to encrypt colour images and determine the entropy values of the cyphered images, as shown in Table 3.…”
Section: Histogram and Chi-square Testmentioning
confidence: 99%
“…Many image encryption techniques have been suggested and developed by researchers, such as Arnold transformation-based [1][2][3], quantum system-based [4][5][6], compression sensing-based [7][8][9], cellular automata-based [10][11][12], DNA computing-based [13][14][15], elliptic curves-based [16][17][18], and chaotic system-based [19][20][21][22][23] approaches. The approach of digital image encryption based on chaotic systems is considered to be more effective than other approaches due to their ability to improve unpredictability, which makes encryption more resistant to attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Public keys encrypt messages, while private keys decrypt them. Based on the nearly unbreakable elliptic curve discrete logarithm problem, [6,7] the elliptic curve cryptosystem (ECC) achieves the same level of security as the Rivest-Shamir-Adleman system with shorter keys. [8] However, asymmetric algorithms are typically slower compared to symmetric algorithms.…”
Section: Introductionmentioning
confidence: 99%