Enhanced Security using Elliptic Curve Cryptography Combined with Hill Cipher


Authors : Dr. T. Madhavi Kumari; K. Shyam Kumar

Volume/Issue : Volume 8 - 2023, Issue 9 - September

Google Scholar : https://bit.ly/3TmGbDi

Scribd : https://tinyurl.com/2nmdt3fx

DOI : https://doi.org/10.5281/zenodo.8358269

Abstract : Technology has improved significantly, and usage of smart systems has increased the risk to secure data and privacy. Since most operating systems come with built-in apps that aren't secure, there is rapid increase in risk of information or data cloning, forgery, tampering, counterfeiting, etc. End users will suffer an unrecoverable loss as a result, particularly with regard to social media personal data and banking applications. An efficient and robust technique which has Hill cipher combination with elliptic curve cryptography is proposed to deal with major threats and improve data security. This technique uses LSB (Least Significant Bit) watermarking to embed DCT coefficients of an image and ciphertext of message into base image. Using Hill Cipher algorithm, the ciphertext is produced. Elliptic Curve cryptography (ECC) and combination with Hill cipher to increase complexity, considering the fact that it has poor data security and is readily cracked. The key is generated by using ECC algorithm, and this key is used with the Hill cipher technique to produce ciphertext. Cryptography and Steganography both combined provide the data with greater legitimacy and ownership for media applications. Without a proper key, it proves difficult to get the hidden message and the image. For multimedia applications, the performance of hiding data and image in image data has been analyzed.

Keywords : Steganography, Cryptography, Elliptic Curve Cryptography, Hill Cipher, Self-Invertible Matrix, Discrete Cosine Transform, Least Significant Bit.

Technology has improved significantly, and usage of smart systems has increased the risk to secure data and privacy. Since most operating systems come with built-in apps that aren't secure, there is rapid increase in risk of information or data cloning, forgery, tampering, counterfeiting, etc. End users will suffer an unrecoverable loss as a result, particularly with regard to social media personal data and banking applications. An efficient and robust technique which has Hill cipher combination with elliptic curve cryptography is proposed to deal with major threats and improve data security. This technique uses LSB (Least Significant Bit) watermarking to embed DCT coefficients of an image and ciphertext of message into base image. Using Hill Cipher algorithm, the ciphertext is produced. Elliptic Curve cryptography (ECC) and combination with Hill cipher to increase complexity, considering the fact that it has poor data security and is readily cracked. The key is generated by using ECC algorithm, and this key is used with the Hill cipher technique to produce ciphertext. Cryptography and Steganography both combined provide the data with greater legitimacy and ownership for media applications. Without a proper key, it proves difficult to get the hidden message and the image. For multimedia applications, the performance of hiding data and image in image data has been analyzed.

Keywords : Steganography, Cryptography, Elliptic Curve Cryptography, Hill Cipher, Self-Invertible Matrix, Discrete Cosine Transform, Least Significant Bit.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe