Enhanced Security Using Elliptic Curve Cryptography Combined With Hill Cipher
Enhanced Security Using Elliptic Curve Cryptography Combined With Hill Cipher
ISSN No:-2456-2165
Abstract:- Technology has improved significantly, and Steganography is used to conceal data and eliminate the
usage of smart systems has increased the risk to secure possibility that it contains sensitive information [6]. The
data and privacy. Since most operating systems come assurance of secure information becomes crucial, especially
with built-in apps that aren't secure, there is rapid for economic data like money and interest rates. To increase
increase in risk of information or data cloning, forgery, security and data privacy, several approaches have been
tampering, counterfeiting, etc. End users will suffer an enhanced.
unrecoverable loss as a result, particularly with regard to
social media personal data and banking applications. An II. LITERATURE REVIEW
efficient and robust technique which has Hill cipher
combination with elliptic curve cryptography is proposed An improved safe cryptographic system based on the
to deal with major threats and improve data security. Paillier cryptosystem was presented by S. Xiang and X. Luo
This technique uses LSB (Least Significant Bit) [1]. Mirroring Ciphertext Group (MCG) and modular
watermarking to embed DCT coefficients of an image and multiplicative inverse operation are utilized to recover the
ciphertext of message into base image. Using Hill Cipher data in this system. A technique that combines information
algorithm, the ciphertext is produced. Elliptic Curve concealing and encryption was suggested by Xinyi Zhou et
cryptography (ECC) and combination with Hill cipher to al. in [2]. The Rivest Shamir Adleman (RSA) algorithm is
increase complexity, considering the fact that it has poor used to transform the key message into the bitstream before
data security and is readily cracked. The key is generated encrypting it. Secret data and the smallest amount of green
by using ECC algorithm, and this key is used with the are XORed in logic, and the outcome is embedded in the
Hill cipher technique to produce ciphertext. smallest amount of red or blue. When compared to the
Cryptography and Steganography both combined conventional Least Significant Bite (LSB) method, the Peak
provide the data with greater legitimacy and ownership Signal to Noise Ratio (PSNR) improved. Through a partition-
for media applications. Without a proper key, it proves wise quantification Singular Value Decomposition (SVD),
difficult to get the hidden message and the image. For Tao Wang et al. [3] devised a technique for scrambling a
multimedia applications, the performance of hiding data picture and embedding a watermark. Two types of amplitude
and image in image data has been analyzed. modulation-based watermarking techniques were given by
Anil K. Jain et al. in their paper [4]. The user's face data is
Keywords:- Steganography, Cryptography, Elliptic Curve kept in fingerprint representations in the second case,
Cryptography, Hill Cipher, Self-Invertible Matrix, Discrete whereas fingerprint minutiae data is stored in the first case. A
Cosine Transform, Least Significant Bit. watermarking approach based on the Integer Discrete Cosine
Transform (DCT) method was presented by Ayush Vashistha
I. INTRODUCTION et al. in [5]. The Fast Fourier Transform (FFT) filter was used
to improve the fingerprint's binary image, which was then
As multimedia items like photographs, audio clips, and segmented and binarized. A hybrid encryption scheme
video files take up a lot of storage space when uploaded to employing the Advanced Encryption Standard and RSA
the cloud [1], the risk to data security and privacy has grown algorithm was presented by M. Elhoseny et al. in [6]. The
as more digital information and data are exchanged over the suggested method starts by utilizing 2D-DWT-1L or 2D-
internet [2]. Due to the risk of unauthorized copying, DWT-2L to encrypt the secret data and then conceal the end
copyright protection and ownership identification are result in a cover picture. A technique where the input data is
becoming crucial issues [3]. In comparison to knowledge- encrypted and decrypted using the RSA algorithm was
based procedures like identity cards, passwords, etc., proposed by Y. K. Singh et al., [7]. A stego picture is created
biometric-based authentication systems are becoming more by placing the encrypted data in an image and then using the
and more successful[4]. The approach needed to remedy this DCT method, enhancing the stego image. From Elliptic
issue is digital watermarking [5]. However, this paper Curve Cryptography, the Key is generated and cipher-text is
focuses on improving the data privacy, security. generated by Hill Cipher using this key. Elliptic Curve
Cryptography and Hill Cipher (ECCHC) combination not
only increases the security but it also makes system more
efficient compared to the traditional Hill cipher Algorithm.
A. Key Generation
The first and most critical step is the production of
public and private keys. Because ECC is an asymmetric
algorithm, the message is encrypted by the sender using the
receiver's public key, and the message is decrypted by the In above ’I’ is the identity matrix and ’N’ is any random
receiver using its private key. The random numbers 'a' and 'b' number then the self-invertible matrix is as follows
are chosen to represent the sender and recipient private keys.
The following equation is used to produce the public key.
C. Decryption
The LSB technique extracts the DCT coefficients and
the ciphertext from the stego image. The receiver can create
Now the key matrix K used for Hill cipher algorithm is the self-invertible key by employing the ECCHC decryption
technique with the correct sender private key. The original
text may be obtained by multiplying the four-blocks-long
ciphertext with this matrix. By applying Inverse Discrete
Cosine Transform (IDCT) to the obtained DCT coefficients,
the hidden image may be recovered. Using the LSB-based
method, the original base image may be recovered by
The text is decrypted using the inverse matrix of this calculating XOR values between the original image and the
key matrix, however it might not always be present. The text stego image.
could not then be decrypted by the recipient. Therefore, the
idea of a self-invertible matrix, or K = K-1, which is the key D. Embedding Process
matrix itself is the inverse of the matrix, is employed to Both Cryptography and steganography are two main
overcome this problem. Therefore, during the decryption stages of the embedding process.
phase, there is no need to compute the inverse matrix.
Cryptography Steps:
Self-invertible matrix Km is
First step is Key generation which is responsible to
perform User Authentication.
The Steps involved for key generation are
E. Extracting Process
IV. RESULTS
V. CONCLUSIONS
REFERENCES