مشخصات مقاله | |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 6 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه الزویر |
نوع نگارش مقاله | مقاله پژوهشی (Research article) |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Cryptanalysis of multimedia encryption using elliptic curve cryptography |
ترجمه عنوان مقاله | رمزنگاری چندرسانه ای سری با استفاده از رمزنگاری منحنی بیضی شکل |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی کامپیوتر |
گرایش های مرتبط | امنیت اطلاعات |
مجله | اپتیک – Optik |
دانشگاه | Department of Computer Science and Engineering – National Institute of Technology – India |
کلمات کلیدی | رمزگذاری چندرسانه ای، رمزنگاری منحنی بیضوی، مشکل لگاریتم گسسته منحنی بیضوی، تحلیل رمز |
کلمات کلیدی انگلیسی | Multimedia encryption, Elliptic curve cryptography, Elliptic curve discrete logarithmic problem, Cryptanalysis |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.ijleo.2018.04.068 |
کد محصول | E8881 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1. Introduction
With the rapid growth in Internet and modern information communication technology, multimedia data are easily stored and shared between communication parties. Many researchers have come up with several cryptographic schemes in order to avoid unauthorized access to sensitive multimedia data. Classical encryption scheme such as Rivest–Shamir–Adleman (RSA), Data Encryption Standard (DES) are not effective for large and highly correlated data. Chaotic system, being the most commonly used techniques for encrypting data, many researchers have utilized its properties. The properties include sensitivity to initial conditions and ergodicity to define various encryption schemes. Despite of its benefits in applying to an encryption scheme, there are certain issues that need to address such as small key size and weak security. Many chaos-based encryption schemes [2–6] have already been cryptanalysed by various authors [7–11] respectively. ECC is a strong public key encryption scheme which can provide high security for a given key size compared to other encryption schemes whose difficulty depends on integer factorization or discrete logarithmic problem [12,13]. Detail explanation about ECC, mathematical proofs and applications are given in [14,15]. Various authors have used ECC base encryption scheme for securing multimedia data [16–19]. Hong et al. [20] cryptanalyse the encryption scheme proposed by Ahmed et al. [21] based on hybrid chaotic system and cyclic elliptic curve using known-plaintext attack. In this paper, cryptanalysis ofthe encryption scheme proposed by Tawalbeh et al. [1] is carried out, revealing the private key from the public key. Using the retrieved private key, the cipher image generated using Tawalbeh et al. encryption scheme is deciphered recovering the plain image transmitted by the sender. The rest of the paper is organized as: Tawalbeh et al. encryption scheme is explained in Section 2. Section 3 explains the concept of attacks applied on ECC (Naive attack, Baby Step, Giant Step attack and Pollard’s Rho attack). The simulation of the cryptanalysis performed on Tawalbeh et al. chosen elliptic curve is shown in Section 4. Conclusion is given in Section 5. |