Abstract
Currently, embedded systems can be found everywhere in quotidian life. In the development of embedded systems, information security is one of the important factors. Encryption is an efficient technique to protect information against attacks. However, because of constraints, existing encryption functions are not compatible and do not agree with real-time applications in embedded systems. In this paper, an improved cryptographic approach with a high level of security and high speed is put forward. Our work uses an efficient version of a hybrid scheme comprising an Advanced Encryption Standard (AES) - Elliptic Curve Cryptography (ECC) for medical image encryption, which combines the benefits of the symmetric AES to speed-up data encryption and asymmetric ECC in order to secure the interchange of a symmetric session key. The contribution of this paper consists of the following two main points: First, we put forward an optimized ECC hardware architecture to respect the compromise between area, power dissipation, and speed. Thus, we primarily utilize only two multipliers to develop the Point Addition (PA) block and the Point Doubling (PD) block, which reduces time complexity. Then, a 32-bit multiplier and a 32-bit inverter architecture based on shifts and XORs are proposed to reduce power consumption and area occupancy. Second, for image encryption, we primarily propose to modify the AES by eliminating the mix-columns transformation and replacing it with a permutation based on the shifts of columns, which decreases time complexity while maintaining the Shannon diffusion and the confusion principle. Then, an adjustment of the rearrangement of the general structure is given to enhance the entropy value. The global cryptosystem is implemented using a co-design approach where the modified AES runs on the NIOS II processor, and the scalar ECC multiplication is designed as a hardware accelerator. The suggested cryptographic system spends much less execution time, which is a significant factor for being applied in practice. Security analysis is successfully performed, and our experiments prove that our proposed technique provides the basics of cryptography with more simplicity and correctness. In fact, the results of the evaluation prove the effectiveness, rapidity and high security of the suggested algorithm.
Similar content being viewed by others
References
Abd El-Latif AA, Niu X (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. Elsevier AEU – Int J Electron Commun 67(2):136–143. https://doi.org/10.1016/j.aeue.2012.07.004
Ansarmohammadi S. A, Shahinfar S, Nejatollahi H (2015) Fast and area efficient implementation for chaotic image encryption algorithms. 18th CSI International Symposium on Computer Architecture and Digital Systems (CADS), Tehran, pp. 1–4. https://doi.org/10.1109/CADS.2015.7377788.
Atteya A M, Madian A H (2014) A hybrid Chaos-AES encryption algorithm and its implementation based on FPGA. International new circuits and systems conference (NEWCAS), Trois-Rivieres, QC, 2014, pp. 217–220. https://doi.org/10.1109/NEWCAS.2014.6934022.
Bentoutou Y, Bensikaddour El H, Taleb N, Bounoua N (2020) An improved image encryption algorithm for satellite applications. Adv Space Res 66(1):176–192. https://doi.org/10.1016/j.asr.2019.09.027
Elhoseny M, Ramírez-González G, Abu-Elnasr O M, Shawkat S A, Arunkumar N, Farouk A (2018) Secure Medical Data Transmission Model for IoT-Based Healthcare Systems. IEEE Access, vol. 6, pp. 20596–20608. https://doi.org/10.1109/ACCESS.2018.2817615.
FIPS PUB 197 (2001) Advanced encryption standard (AES). Information Technology Laboratory. Computer Security Resource Center
Gafsi M, Hajjaji M A, Malek J, Mtibaa A (2020) Efficient Encryption System for Numerical Image Safe Transmission. J Electric Comput Eng, vol. 2020, Article ID 8937676. https://doi.org/10.1155/2020/8937676
Ganesh A R, Manikandan P N, Sethu SP, Sundararajan R, Pargunarajan K (2011) An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based wireless sensor networks. International conference on recent trends in information technology (ICRTIT). Chennai, Tamil Nadu. 1209-1214. https://doi.org/10.1109/ICRTIT.2011.5972351.
Hafsa A, Alimi N, Sghaier N, Zeghid M, Machhout M (2017) A hardware-software co-designed AES-ECC cryptosystem. International conference on advanced systems and electric technologies (IC_ASET), Hammamet, pp. 50-54, https://doi.org/10.1109/ASET.2017.7983665.
Hafsa A, Sghaier A, Zeghid M, Malek J, Machhout M (2020) An improved co-designed AES-ECC cryptosystem for secure data transmission. Int J Inf Comput Secur 13(1):118–140. https://doi.org/10.1504/IJICS.2020.108145
Hajajneh T, Mohd B J, Itradat A, Quttoum A N (2013) Performance and information security evaluation with firewalls. International Journal of Security and Its Applications Vol.7, No.6 (2013), pp.355–372. https://doi.org/10.14257/ijsia.2013.7.6.36.
Hayajneh T, Ullah S, Mohd BJ, Balagani KS (2017) An enhanced WLAN security system with FPGA implementation for multimedia applications. IEEE Syst J 11(4):2536–2545. https://doi.org/10.1109/JSYST.2015.2424702
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–203
Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik 147:88–102. https://doi.org/10.1016/j.ijleo.2017.08.028
Lin Z, Liu J, Lian J, Ma Y, Zhang X (2019) A novel fast image encryption algorithm for embedded systems. Multimed Tools Appl 78:20511–20531. https://doi.org/10.1007/s11042-018-6824-5
Liu H, Liu Y (2014) Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve. Opt Laser Technol 56:15–19. https://doi.org/10.1016/j.optlastec.2013.07.009
Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77:22787–22808. https://doi.org/10.1007/s11042-017-5534-8
Sbiaa F, Kotel S, Zeghid M, Tourki R, Machhout M, Baganne A (2017) High-Level Implementation of a Chaotic and AES Based Crypto-System. J Circuits Syst Comput 26(07):1750122. https://doi.org/10.1142/S0218126617501225
Sghaier A, Zeghid M, Masoud CH, Machhout M (2017) Design and implementation of low area/power elliptic curve digital signature hardware Core. Electron 6(2):46. https://doi.org/10.3390/electronics6020046
Shankar K., Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Artificial intelligence and evolutionary computations in engineering systems. Adv intell syst comput, vol 394, pp 705-714. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2656-7_64.
Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve Pseudo random and advanced encryption system. Signal Process 141:217–227. https://doi.org/10.1016/j.sigpro.2017.06.010
Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79–86. https://doi.org/10.1016/j.optlaseng.2015.12.006
Yang CH, Wu HC, Su FS (2019) Implementation of encryption algorithm and wireless image transmission system on FPGA. IEEE Access 7:50513–50523. https://doi.org/10.1109/ACCESS.2019.2910859
Zhao Z, Zhang X (2013) ECC-based image encryption using code computing. International conference on communication, electronics and automation engineering. Advances in intelligent systems and computing, vol 181. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31698-2_121.
Acknowledgments
This work is backed through EuE Laboratory.
Author information
Authors and Affiliations
Contributions
All the authors have helped to conceive these simulation experiments. Amal Hafsa and Anissa Sghaier have designed and performed such experiments and have written the main part of the manuscript with the help of Mohamed Gafsi. Amal Hafsa, Anissa Sghaier, Jihene Malek and Mohsen Machhout have contributed to the interpretation of the results, as well as the revision and writing of the paper.
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hafsa, A., Sghaier, A., Malek, J. et al. Image encryption method based on improved ECC and modified AES algorithm. Multimed Tools Appl 80, 19769–19801 (2021). https://doi.org/10.1007/s11042-021-10700-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10700-x