Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information hiding method and system based on elliptic curve cryptography

An elliptic curve and information hiding technology, which is applied in the field of information hiding based on elliptic curve cryptography, can solve the problems of single type of encryption technology, small key space, and no information hiding method based on elliptic curve cryptography. The effect of low cost, encrypted security, and complex algorithm structure

Pending Publication Date: 2021-11-12
SHANGHAI UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Recently, Liu Zeyu and Xia Tiecheng reported that there is indeed chaos in the two-dimensional chaotic map TFCDM, and the obtained discrete chaotic signal has the advantages of strong randomness and high complexity, but it does not provide an information hiding method based on elliptic curve cryptography, and encryption has not yet been achieved. The purpose of the existing encryption technology is single, the secret key space is small, and the encryption effect and security of the traditional chaotic map encryption image method need to be further improved, which has become a technical problem that needs to be solved urgently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding method and system based on elliptic curve cryptography
  • Information hiding method and system based on elliptic curve cryptography
  • Information hiding method and system based on elliptic curve cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In this example, see figure 1 , an information hiding method based on elliptic curve cryptography, the steps are as follows:

[0050]a. Use the cryptographic system based on the elliptic curve on the finite field to generate the secret key as follows:

[0051] Choose one defined in the prime field F p Elliptic curves on:

[0052] E:y 2 ≡x 3 +ax+b(mod p)

[0053] The basic elliptic curve that constitutes the MVECC encryption system;

[0054] b. Select the base point α, the private key K of the communication parties A and B A and K B ;

[0055] Calculate P A =K A ·α,P B =K B α,P A and P B are the public keys of A and B respectively, and then calculate the encryption key (c 1 ,c 2 )=K B ·P A =K A ·P B ;

[0056] c. Take the initial secret key as ν; then take in is rounded down;

[0057] ν' 01 = c 1 ·ν 01 mod p

[0058] ν' 02 = c 2 ·ν 02 mod p

[0059] The ciphertext is ((c 1 ,c 2 ),ν′ 01 ,ν′ 02 ),thereby is the encrypted secret key...

Embodiment 2

[0066] This embodiment is basically the same as Embodiment 1, especially in that:

[0067] In this example, see Figure 1-Figure 2 , an information hiding method based on elliptic curve cryptography, characterized in that the steps are as follows:

[0068] a. Use the cryptographic system based on the elliptic curve on the finite field to generate the secret key as follows:

[0069] Choose one defined in the prime field F p Elliptic curves on:

[0070] E:y 2 ≡x 3 +ax+b(mod p)

[0071] The prime number p is 100003; the coefficient a is 1; the coefficient b=6; the basic elliptic curve constituting the MVECC encryption system;

[0072] b. Select the base point α, the private key K of the communication parties A and B A and K B ;

[0073] Calculate P A =K A ·α,P B =K B α,P A and P B are the public keys of A and B respectively, and then calculate the encryption key (c 1 ,c 2 )=K B ·P A =K A ·P B ; In this embodiment, select α=(2,4), the private key K of the comm...

Embodiment 3

[0090] This embodiment is basically the same as Embodiment 1, especially in that:

[0091] In this example, see Figure 1-Figure 2 , an information hiding system based on elliptic curve cryptography, implements the information hiding method based on elliptic curve cryptography described in the above embodiment, scrambles pixel values ​​of plaintext pictures, and encrypts pixel values.

[0092]To sum up, the above embodiments are based on the information hiding technology of elliptic curve cryptography, using the elliptic curve based on the finite field as the substrate, after the key is scrambled, the fractional order chaotic map is used to generate the chaotic sequence. Use the randomness of the chaotic sequence to scramble the plaintext image, and then use the chaotic sequence and the pixel value to perform XOR operation to encrypt the picture pixels, so as to achieve the effect of scrambling and diffusion. The above embodiments combine elliptic curve public key cryptograph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information hiding method and system based on elliptic curve cryptography, and the method comprises the steps: employing an elliptic curve based on a finite field as a substrate, carrying out the scrambling of a secret key, and generating a chaotic sequence through fractional order chaotic mapping. A plaintext picture is scrambled by using the randomness of a chaos sequence, and then picture pixels are encrypted by using the chaos sequence and pixel values to carry out XOR operation, so that the scrambling and diffusion effects are achieved. According to the method, the elliptic curve public key cryptography and the private key encryption based on the fractional order chaotic mapping are combined, the algorithm complexity is improved, the key space is increased, and the algorithm has good anti-attack ability.

Description

technical field [0001] The invention belongs to the technical field of information hiding, relates to an information hiding technology based on elliptic curve cryptography, and is applied in the field of secure communication. Background technique [0002] After the encryption technology based on elliptic curves was proposed in the late 1980s, there have been a large number of literature reports, and a variety of information hiding technologies based on elliptic curves and a combination of different elliptic curve-based encryption methods have been selected. [0003] Pictures are one of the ways for people to transmit information in daily life, especially with the rapid development of Internet technology (Internet) and the use of various communication technologies and multimedia technologies, pictures are increasingly becoming a medium for people to transmit information. [0004] The chaotic signal has the characteristics of boundedness, aperiodicity, and sensitivity to initi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/30H04N1/32
CPCH04L9/001H04L9/3066H04N1/32272
Inventor 夏铁成刘泽宇
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products