Open Access Open Access  Restricted Access Subscription or Fee Access

A Multivariate Public Key Cryptosystem (MPKC) for Digital Image and Video Encryption based on Multiple Permutation Polynomials over Finite Fields with a Novel Approach for Secure Key Transmission

Chaitanya Vijaykumar Mahamuni

Abstract


The revolutionary idea of a public key cryptosystem has transformed today’s communication system and has added a remarkable contribution to the world of cryptography. The Multivariate Public Key Cryptosystems (MPKCs) are the cryptosystems whose public keys are a set of multivariate polynomials [1]. MPKCs usually have a set of quadratic polynomials over a finite field as its public map. The NP-hardness of the solution of non-linear equations over a finite field is a major security assumption associated with them. MPKCs can prove to be even stronger than quantum computers of the future [2]. This paper presents a novel technique for the encryption of digital images and videos by using multiple multivariate permutation polynomials over finite fields. The strength of any cryptographic scheme is its key. In a polynomial-based encryption scheme, coefficients are used for encryption and hence, they need to be transmitted securely. A new approach for the secure key transmission has been discussed in the paper. It increases the level of complexity to identify the relation between the two keys and makes it almost impossible to crack the private key i.e. the shared secret between communicating parties. The objective of the work reported in this paper is to enhance the strength of the image encryption (the security level) by using multivariate permutation polynomials whose coefficients are unique and transmitting them in a secure manner.


Keywords


Multivariate Public Key Cryptography, Permutation Polynomials, Finite Fields, Secure Key Transmission, etc.

Full Text:

PDF

References


Available:-http://web.stevens.edu/algebraic/Files/SCPQ/SCPQ-2011-02-02-talk-Ding.pdf. Last accessed: 18:47, 14th March, 2017. Article: Multivariate Public Key Cryptography, Presentation by Jintai Ding, University of Cincinnati & Southern Chinese University of Technology, Feb, 2, 2011.

Available: http://www.iis.sinica.edu.tw/papers/byyang/12734-F.pdf,. Last accessed: 18:53, 14thMarch, 2017. Article: Multivariate Public Key Cryptography by Jintai Ding and Bo-Yin Yang, (pp.1-48).

Available: https://en.wikipedia.org/wiki/Cryptography. Last accessed: 19:09, 14th March, 2017. Article: Cryptography, From Wikipedia the Free Encyclopedia.

Subhedar, Mansi S., and Vijay H. Mankar. "Current status and key issues in image steganography: A survey." Computer science review 13 (2014): 95-113.

Available:www.differencebetween.info/difference-between-and-cryptanalysis. Last accessed: 22:10, 17th March, 2017. Content on webpage, difference between cryptography and cryptanalysis.

Available: https://en.wikipedia.org/wiki/Cryptography. Last accessed: 19:09, 14th March, 2017. Article: Classification of cryptography algorithms, From Wikipedia the Free Encyclopedia.

Available: https://en.wikipedia.org/wiki/Key_(cryptography). Last accessed: 19:11, 14th March, 2017. Article: Key (cryptography), From Wikipedia the Free Encyclopedia.

Available: www.periobon.org/SS1/ch1/disadv.html. Last accessed: 22:16, 14th March, 2017. Content of webpage, disadvantages of symmetric key cryptography

Available: https://en.wikipedia.org/wiki/Quantum_cryptography. Last accessed: 22:18, 14thMarch, 2017. Articles: Quantum cryptography, and Post quantum cryptography, From Wikipedia, the Free Encyclopedia.

Arnold's Cat Map. (n.d.). Retrieved 22:29, 14thMarch, 2017, from http://ckw.phys.ncku.edu.tw/public/pub/Notes/NonlinearPhysics/Hilborn/nb_5.2/Chap8/Catmap/catmap3.htm

Available: www.whitec0de.com/quantum.cryptography/. Last accessed: 22:31, 14thMarch, 2017. Content of webpage, limitations of quantum cryptography.

Available:http://www.ic.unicamp.br/ascrypto2013/slides/ascrypto2013_geovandropereira.pdf.Last accessed 22:36, 14thMarch, 2017. A Presentation entitled “Introduction to Multivariate Public Key Cryptography” by Geovandro Carlos C. F. Pereira, LARC - Computer Architecture and Networking Lab Department of Computer Engineering and Digital Systems Escola Politécnica University of Sao Paulo

Neha Balu Wagh et.al, "A Novel Approach utilizing Permutation Polynomials over integer rings as a Cryptological Application for Effective Encryption of Digital Images", International Journal of Computer Sciences and Engineering, Volume-05, Issue-01, Page No (14-21), Jan -2017, E-ISSN: 2347-2693.

Ref-Available:http://www.phcet.ac.in/research/researchprojects/relectronicsandtelecomm.asp .Chaitanya Mahamuni, Abhinay Jain, Sagar Dhotre, “Digital Video Watermarking using DWT and PCA in Encrypted Domain” B.E. Project Report, (referred Chapter1 and Chapter2), Project Guide: Mrs. Swati Nandusekar, Dept. of Electronics and Telecommunication Engineering, PHCET Rasayani, University of Mumbai, May 2013.

Mr.Chaitanya Vijaykumar Mahamuni| Reg. No.: Fr.C 152, Supervisor: Prof (Dr) K T V Reddy, “A Robust Coverage based on Optimal Backoff Sleep Time in Wireless Sensor Networks”, M.E. Dissertation Report (Chapter.1: Methodology referred), (Sem. IV), Department of Electronics and Telecommunication Engg, Fr. C Rodrigues Institute of Technology, Vashi, University of Mumbai, AY 2015-16.

Available: https://en.wikipedia.org/wiki/Permutation_polynomial. Last accessed 22:56, 14thMarch, 2017. Article: Permutation Polynomial, From Wikipedia the Free Encyclopedia.

Available: https://en.wikipedia.org/wiki/Ring_(mathematics). Last accessed 22:59. 14thMarch, 2017. Article: Ring, From Wikipedia the Free Encyclopedia

R.A. Collin and C. Small, “On Permutation Polynomials over finite fields,” Internet. J. Math. & Math. Sci., Volume-10, Issue-03, Page No (535-544), 1987

Ronald L Rivest, “Permutation Polynomial Modulo 2w,ˮ Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA 02139, October 25, 1999.

Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms”, IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIA Com)”,pp(663 to 666), March, 2016, ISBN 978-93-80544-20-5

Charpin, Pascale, Sihem Mesnager, and Sumanta Sarkar. "On involutions of finite fields." Information Theory (ISIT), 2015 IEEE International Symposium on. IEEE, 2015.

Blake, Ian F., et al. "Polynomials over Finite Fields and Applications." (2006).

Available: https://en.wikipedia.org/wiki/Multivariate_cryptography. Last accessed: 12:13, 15th March, 2017. Article: Multivariate Cryptography, From Wikipedia the Free Encyclopedia.

Available: https://eprint.iacr.org/2004/350.pdf. Last accessed: 12:28, 15th March, 2017.Article: Multivariate Public-Key cryptosystems by Jintai Ding and Dieter Schmit.

Ding, Jintai, and Bo-Yin Yang. "Multivariate public key cryptography." Post-quantum cryptography. Springer Berlin Heidelberg, 2009. 193-241.

Wolf, Christopher. "Multivariate Quadratic Polynomials in Public Key Cryptography." IACR Cryptology e-Print Archive 2005 (2005): 393.

Wang, Lih-Chung, et al. "A “medium-field” multivariate public-key encryption scheme." Cryptographers’ Track at the RSA Conference. Springer Berlin Heidelberg, 2006.

Porras, Jaiberth, John Baena, and Jintai Ding, "ZHFE, a new multivariate public key encryption scheme." International Workshop on Post-Quantum Cryptography, Springer International Publishing, 2014.

Feng, Yuan, et al. "A multivariate public key cryptographic-scheme." China-Communications 11.12 (2014): 120-124.

Singh, Rajesh P., B. K. Sarma, and Anupam Saikia. "PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS." IACR Cryptology ePrint Archive 2009 (2009): 208.

Singh, Rajesh P., Anupam Saikia, and B. K. Sarma. "Little dragon two: an efficient multivariate public key cryptosystem." arXiv preprint arXiv: 1005 5028 (2010).

Li, Fada, et al. "Cryptanalysis of little dragon two multivariate public key cryptosystem." Computer Application and System Modeling (ICCASM), 2010 International Conference on. Vol. 9. IEEE, 2010.

H.Zhao and P. Fan, “Simple method for generating mth order permutation polynomials over integer rings,” Electronics letters, Volume-43, Issue-08, April 12, 2007.

Mr.Chaitanya Vijaykumar Mahamuni, “A Comprehensive Study of Cryptography and Content Hiding Techniques for Security of Digital Videos”, International Journal of Advanced Foundation and Research in Computer (IJAFRC), Volume-01, Issue-12, December 2015,(pp.46-52).

Mr. Chaitanya V Mahamuni, “Digital Video Watermarking using DWT and PCA in Encrypted Domain” Research Chronicler International Multidisciplinary Journal (RCIMJ), Volume-2, Issue-2, March 2014, (pp118-128).

Chaitanya Vijaykumar Mahamuni et.al, “Study of CBIR Methods for Retrieval of Digital Images based on Colour and Texture Extraction”, International Conference of Computer Communication and Informatics (ICCCI)-2017, Coimbatore, IEEE Xplore Digital Library, (pp.305-311).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.