Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption
Dublin Core
Title
Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption
Subject
Man-in-the-middle attack (MITM); Elliptic Curve Cryptography (ECC); Advanced Encryption System (AES); National Institute of Standards and Technology (NIST)
Description
I
n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram
n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram
Creator
Farah Tawfiq Abdul Hussien
Teaba Wala Aldeen Khairi
Source
International Journal of Interactive Mobile Technologies (iJIM); Vol. 17 No. 10 (2023); pp. 193-211
1865-7923
Publisher
International Association of Online Engineering (IAOE), Vienna, Austria
Date
2023-05-22
Rights
Copyright (c) 2023 Haider TH.Salim ALRikabi, Farah Tawfiq Abdul Hussien, Teaba Wala Aldeen Khairi
https://creativecommons.org/licenses/by/4.0
Relation
Format
application/pdf
Language
eng
Type
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Identifier
Citation
Farah Tawfiq Abdul Hussien and Teaba Wala Aldeen Khairi, Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption, International Association of Online Engineering (IAOE), Vienna, Austria, 2023, accessed November 5, 2024, https://igi.indrastra.com/items/show/2534