基于椭圆椭圆曲线的隐密码的设计与实现

Litasari, Budi Rahadjo
{"title":"基于椭圆椭圆曲线的隐密码的设计与实现","authors":"Litasari, Budi Rahadjo","doi":"10.1109/ICITISEE.2017.8285567","DOIUrl":null,"url":null,"abstract":"Well-known techniques for securing data are cryptography and steganography. Cryptography is an information security technique that turns information into another random and incomprehensible form, while steganography secures data by hiding information in storage media such as text, images, sound and video. In this research will be merged both security techniques, namely Stegocrypto. This stegocrypto uses ElGamal's elliptic curve for the coding process and utilizes noise as a steganographic medium. The elliptic curve used in this study has 2026 pairs of points. While the input of this system is an ASCII character, so input should be represented first before being processed. The process of inserting cipher with noise is done without using a marker. In this study, the stegocrypto system was successfully implemented. The system successfully encrypts and decrypts the input message. Decryption is done by reading all received stego-noise and will be read as cipher text when it is an elliptic group element. Then from the test is also obtained the influence of message length and k variables to the time required for the process of encryption and decryption.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Design and implementation stegocrypto based on elgamal elliptic curve\",\"authors\":\"Litasari, Budi Rahadjo\",\"doi\":\"10.1109/ICITISEE.2017.8285567\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Well-known techniques for securing data are cryptography and steganography. Cryptography is an information security technique that turns information into another random and incomprehensible form, while steganography secures data by hiding information in storage media such as text, images, sound and video. In this research will be merged both security techniques, namely Stegocrypto. This stegocrypto uses ElGamal's elliptic curve for the coding process and utilizes noise as a steganographic medium. The elliptic curve used in this study has 2026 pairs of points. While the input of this system is an ASCII character, so input should be represented first before being processed. The process of inserting cipher with noise is done without using a marker. In this study, the stegocrypto system was successfully implemented. The system successfully encrypts and decrypts the input message. Decryption is done by reading all received stego-noise and will be read as cipher text when it is an elliptic group element. Then from the test is also obtained the influence of message length and k variables to the time required for the process of encryption and decryption.\",\"PeriodicalId\":130873,\"journal\":{\"name\":\"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITISEE.2017.8285567\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITISEE.2017.8285567","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

众所周知的数据保护技术是密码学和隐写术。密码学是一种信息安全技术,它将信息变成另一种随机和不可理解的形式,而隐写术通过将信息隐藏在文本、图像、声音和视频等存储介质中来保护数据。在本研究中将合并这两种安全技术,即隐式加密。这种隐写密码使用ElGamal的椭圆曲线进行编码过程,并利用噪声作为隐写介质。本研究使用的椭圆曲线有2026对点。而这个系统的输入是一个ASCII字符,所以在处理输入之前应该先表示输入。插入带噪声密码的过程无需使用标记。本研究成功实现了隐密码系统。系统成功对输入消息进行加密和解密。解密是通过读取所有接收到的隐写噪声来完成的,当它是一个椭圆群元素时,将作为密文读取。然后从测试中也得到了消息长度和k变量对加解密过程所需时间的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Design and implementation stegocrypto based on elgamal elliptic curve
Well-known techniques for securing data are cryptography and steganography. Cryptography is an information security technique that turns information into another random and incomprehensible form, while steganography secures data by hiding information in storage media such as text, images, sound and video. In this research will be merged both security techniques, namely Stegocrypto. This stegocrypto uses ElGamal's elliptic curve for the coding process and utilizes noise as a steganographic medium. The elliptic curve used in this study has 2026 pairs of points. While the input of this system is an ASCII character, so input should be represented first before being processed. The process of inserting cipher with noise is done without using a marker. In this study, the stegocrypto system was successfully implemented. The system successfully encrypts and decrypts the input message. Decryption is done by reading all received stego-noise and will be read as cipher text when it is an elliptic group element. Then from the test is also obtained the influence of message length and k variables to the time required for the process of encryption and decryption.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信