A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection
Title | A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Tayel, M., Dawood, G., Shawky, H. |
Conference Name | 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) |
ISBN Number | 978-1-5386-5314-2 |
Keywords | Asymmetric Encryption, asymmetric encryption scheme, asymmetric schemes key distribution, composability, compositionality, Correlation, data encapsulation, data encapsulation scheme, differential attack, Elliptic curve cryptography, Elliptic curves, Encryption, encryption quality, Human Behavior, hybrid cryptosystem, image encryption, Information security, insecure channel, insecure networks, Metrics, multimedia protection, Multimedia systems, pubcrawl, public key cryptography, resilience, Resiliency, SERPENT, Serpent algorithm, serpent-elliptic hybrid cryptosystem, statistical attack, symmetric encryption scheme |
Abstract | Cryptography is a widespread technique that maintains information security over insecure networks. The symmetric encryption scheme provides a good security, but the key exchange is difficult on the other hand, in the asymmetric encryption scheme, key management is easier, but it does not offer the same degree of security compared to symmetric scheme. A hybrid cryptosystem merges the easiness of the asymmetric schemes key distribution and the high security of symmetric schemes. In the proposed hybrid cryptosystem, Serpent algorithm is used as a data encapsulation scheme and Elliptic Curve Cryptography (ECC) is used as a key encapsulation scheme to achieve key generation and distribution within an insecure channel. This modification is done to tackle the issue of key management for Serpent algorithm, so it can be securely used in multimedia protection. |
URL | https://ieeexplore.ieee.org/document/8554950 |
DOI | 10.1109/ICACCI.2018.8554950 |
Citation Key | tayel_proposed_2018 |
- image encryption
- symmetric encryption scheme
- statistical attack
- serpent-elliptic hybrid cryptosystem
- Serpent algorithm
- SERPENT
- Resiliency
- resilience
- public key cryptography
- pubcrawl
- Multimedia systems
- multimedia protection
- Metrics
- insecure networks
- insecure channel
- information security
- Asymmetric Encryption
- hybrid cryptosystem
- Human behavior
- encryption quality
- encryption
- Elliptic curves
- Elliptic curve cryptography
- differential attack
- data encapsulation scheme
- data encapsulation
- Correlation
- Compositionality
- composability
- asymmetric schemes key distribution
- asymmetric encryption scheme