Unlock instant, AI-driven research and patent intelligence for your innovation.

Image encryption method based on Montgomery-RSA algorithm

A technology of RSA and encryption method, which is applied in the field of image encryption based on Montgomery-RSA algorithm, can solve the problems of small amount of calculation, slow encryption and decryption speed, insufficient security, etc., and achieve high confidentiality and speed-up effect

Active Publication Date: 2020-01-14
GUANGDONG UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Encryption algorithm is the core of cryptographic technology, mainly divided into symmetric encryption algorithm and asymmetric encryption algorithm: the biggest feature of symmetric encryption algorithm is that encryption and decryption use the same secret key, commonly used algorithms such as AES and DES; the calculation amount of symmetric encryption algorithm Small size, fast encryption speed, but both the sender and receiver must keep the secret key well. Too many secret keys will bring a certain burden to the management of the secret key, which is not safe enough; the most common asymmetric encryption algorithm is the RSA algorithm, and the asymmetry is the main It shows that different secret keys are used in encryption and decryption, which are divided into public key and private key. The public key is used to encrypt data, and the private key is used to unlock encrypted data. The speed of encryption and decryption is slow, and it is only suitable for encrypting a small amount of data. Decryption, although the security is higher than the symmetric encryption algorithm, there is still room for improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on Montgomery-RSA algorithm
  • Image encryption method based on Montgomery-RSA algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Hereinafter, the present invention will be further described in detail with reference to the examples and drawings, but the implementation of the present invention is not limited thereto.

[0041] The present invention proposes an image encryption method based on Montgomery-RSA algorithm. The method first extracts the RGB color bands of pixel values ​​from the image, and uses the pixels to create a matrix for each color band; then the image is divided into multiple Image blocks of the same size are encrypted and decrypted using Montgomery's RSA algorithm.

[0042] Specifically, such as Figure 1~2 As shown, an image encryption method based on Montgomery-RSA algorithm includes the following steps:

[0043] Step one, input image;

[0044] Step 2: Extract RGB pixels from the image and create a separate matrix for each image;

[0045] Step 3: Each image is divided into multiple image blocks, and a mapping table is generated to record the size and location of each block;

[0046] Ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image encryption method based on a Montgomery-RSA algorithm. The method comprises the following steps: S1, inputting an image; s2, extracting RGB pixels from the images, andcreating an independent matrix for each image; s3, dividing each image into a plurality of image blocks, generating a mapping table, and recording the size and the position of each block; s4, performing encryption and decryption operations on each image block and the mapping table by using a Montgomery-RSA algorithm; and s5, outputting an image. According to the method, the image is encrypted according to the RGB color band blocks, so that the transmission of the confidential image has higher confidentiality; meanwhile, the image data transmission speed can be effectively improved through theMontgomery improved RSA algorithm.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to an image encryption method based on Montgomery-RSA algorithm. Background technique [0002] At present, under the increasingly open network environment, people mainly use the Internet to transmit digital images. While the Internet brings convenience to people, it also brings information security issues. This makes it necessary to transmit digital images on unreliable communication channels. Has high security. [0003] The long history of cryptography encryption technology is widely used in data security protection. The purpose of image encryption is to hide the true information of the image, so that the image stealer cannot obtain the original image, and the recipient can easily obtain the encrypted information through a predetermined decryption method. Information encryption technology can provide secure communication in the presence of malicious opponents, thereby ensur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/08H04N1/32H04N1/56
CPCH04L9/302H04L9/3033H04L9/0869H04N1/32272H04N1/56
Inventor 刘珊珊蒋文武
Owner GUANGDONG UNIV OF TECH