Elliptic Curve Video Encryption in Mobile Phone Based on Multi-Keys and Chaotic Map
Keywords:Video, Mobile devices, ECC, Chaotic Key Generator, Multi keys, Android OS
AbstractThe security of video applications in mobile devices has become recently an important field research. Dealing with video data, which is large compared to text and image and processing it in the mobile platform is a big challenge. Generally, the efficiency of any video encryption algorithm is concerned with two criteria, the computational time required to process video data, and the memory usage according to the resources on the smartphone. The secured system in 3G devices has become a matter of importance. This paper presents an implementation of full video encryption using Elliptic Curve Cryptography (ECC) on a mobile device. The operations on ECC include doubling and addition on the finite field as the backbone for an elliptic curve. Also, mapping representation is introduced to convert every byte of plain video into a point on EC. The paper proposed multi-keys instead of using one key as usual. Also, Chaotic Key Generator (CKG) is exploited for the randomness of the multi-keys. The proposed work focuses on increasing the security with multi-keys and to get acceptable time for encryption and decryption in a limited environment like mobile. The system is implemented using Android Studio with version (3.0) and using java language, it is implemented on Android version 7.0 (Nougat) and on mobile Galaxy S8.
P.Saranya , L.M.Varalakshmi, " H.264 based Selective Video Encryption for Mobile Application" International Journal of Computer Applications, vol. Volume 17– No.4, pp. 21-25, 2011.
L.D.Singh, K. M. Singh, "Implementation of Text Encryption using Elliptic Curve Cryptography" in Eleventh International Multi-Conference on Information Processing, Elsevier, 2015.
"Technical Guideline – Cryptographic Algorithms and Key Lengths" Federal Office for Information Security, Germany, 2017.
C.Paar,J.Pelzl,"Understanding Cryptography A Textbook for Students and Practitioners" Springer, 2010.
Z. E. Dawahdeh, S. N. Yaakob, R. R. B. Othman, "A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem," Journal of Theoretical and Applied Information Technology, vol. 85, no. 3, pp. 290-297, March 2016.
P. S. Yadav, P. Sharma, K. P. Yadav, "Implementation of RSA Algorithm Using Elliptic Curve Algorithm for Security and Performance Enhancement," International Journal of Scientific & Technology Research, vol. 1, no. 4, pp. 102-105, May 2012 ISSN 2277-8616.
L. Tawalbeh, M. Mowafi, W. Aljoby, "Use of Elliptic Curve Cryptography for Multimedia Encryption," IET Information Security, pp. 1-8, 2012.
K. Rahouma, "A Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem,"www.semanticscholar.org, Riyadh, Kingdom of Saudi Arabia, 2006 .[Online].Available: https://pdfs.semanticscholar.org/d13c/05f9256790d9af7637009168b3018fdaf06b.pdf.
D.S.Kumar,CH.Suneetha,A.ChandrasekhAR, "Encryption of Data Using Elliptic Curve Over Finite Fields," International Journal of Distributed and Parallel Systems, vol. 3, no. 1, pp. 103-108, January 2012.
R. Singh, R. Chauhan , V. K. Gunjan, P. Singh, "Implementation of Elliptic Curve Cryptography for Audio Based Application," International Journal of Engineering Research & Technology (IJERT), vol. 3, no. 1, pp. 2210-2214, January - 2014.
M. Naik, A. Sindkar, P. Benali, C. Moralwar, "Secure and Reliable Data Transfer on Android Mobiles Using AES and ECC Algorithm," International Journal of Innovative Technology & Adaptive Management (IJITAM), vol. 1, no. 11, 2014.
D. M. Dumbere , N. J. Janwe, "Video Encryption Using AES Algorithm," in 2nd International Conference on Current Trends in Engineering and Technology, ICCTET’14 , IEEE, Coimbatore, India, July 8, 2014.
A. T. Sadiq, F. H. Faisal, "Modification AES Algorithm Based on Extended Key and Plain Text," Journal of Advanced Computer Science and Technology Research, vol. 5, no. 4, pp. 104-112, 2015.
A. Kareem, "An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Video Applications," MSc thesis in Computer Sciences , Al-Mustansiriyah University, Iraq, 2015.
S.Y.Yan, Number Theory for Computing, Springer, 2000.
A. B. ÖZCAN, "Performance Analysis Of Elliptic Curve Multiplication Algorithms For Elliptic Curve Cryptography," M.Sc., Department of Electrical and Electronics Engineering ,Middle East Technical University, 2006.
W.Stallings, “Cryptography and Network Security Principles and Practice ”, 2011, 5th Edition.
A.K.Naji ,S.N.Alsaad, "Data (Video) Encryption in Mobile Devices," Kurdistan Journal for Applied Research, vol. 2, no. 3, 2017.
How to Cite
Articles accepted for publication in Al-Mustansiriyah Journal of Science (MJS) are protected under the Creative Commons Attribution 4.0 International License (CC BY-NC). Authors of accepted articles are requested to sign a copyright release form prior to their article being published. All authors must agree to the submission, sign copyright release forms, and agree to be included in any correspondence between MJS and the authors before submitting a work to MJS. For personal or educational use, permission is given without charge to print or create digital copies of all or portions of a MJS article. However, copies must not be produced or distributed for monetary gain. It is necessary to respect the copyright of any parts of this work that are not owned by MJS.