Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption

Dublin Core

Title

Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption

Subject

Man-in-the-middle attack (MITM); Elliptic Curve Cryptography (ECC); Advanced Encryption System (AES); National Institute of Standards and Technology (NIST)

Description

I
n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram

Creator

Farah Tawfiq Abdul Hussien
Teaba Wala Aldeen Khairi

Source

International Journal of Interactive Mobile Technologies (iJIM); Vol. 17 No. 10 (2023); pp. 193-211
1865-7923

Publisher

International Association of Online Engineering (IAOE), Vienna, Austria

Date

2023-05-22

Rights

Copyright (c) 2023 Haider TH.Salim ALRikabi, Farah Tawfiq Abdul Hussien, Teaba Wala Aldeen Khairi
https://creativecommons.org/licenses/by/4.0

Relation

Format

application/pdf

Language

eng

Type

info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article

Identifier

Citation

Farah Tawfiq Abdul Hussien and Teaba Wala Aldeen Khairi, Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption, International Association of Online Engineering (IAOE), Vienna, Austria, 2023, accessed September 23, 2024, https://igi.indrastra.com/items/show/2534

Social Bookmarking