Mohammad Mazyad Hazzazi1, Hafeez Ur Rehman2,*, Tariq Shah2, Hajra Younas2
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2033-2060, 2023, DOI:10.32604/cmc.2023.040629
- 30 August 2023
Abstract Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem. In this paper, we introduce an asymmetric key algorithm for specifically processing images with larger bit values. To overcome the separate flaws of elliptic curve cryptography (ECC) and the Hill cipher (HC), we present an approach to picture encryption by combining these two encryption approaches. In addition, to strengthen our scheme, the group laws are defined over the rational points of a given elliptic curve (EC) over a Galois field (GF). The exclusive-or (XOR) function is used instead of More >