Abstract
Performing encryption using ElGamal public key encryption over finite field requires imbedding of message which is represented by integers. These integers are to be imbedded to a coordinate location that satisfy the elliptic curve equation using Koblitz imbedding technique. In doing so, data expansion takes place as each integer have to be represented as a coordinate. Recommended elliptic curves have large modulo prime value, so for every small integer representation of a message, the expansion in cipher text is massive. The above factors hinders the usage of ElGamal method for large data size encryption. In the ameliorated version, every coordinates in the elliptic curve equation is applicable for performing encryption operation. The typical Koblitz imbedding technique to specific coordinates satisfying the elliptic curve equation can be avoided. Data expansion trouble is taken care by using base conversion operation with multiple audio data. Simulation results and performance comparison with other public key cryptosystem signify that the proposed method is suitable for audio encryption operation.






Similar content being viewed by others
References
Lima, J. B., & da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75(14), 8403–8418.
Luma, A., Selimi, B., & Ameti, L. (2015). Using elliptic curve encryption and decryption for securing audio messages. In Transactions on engineering technologies (pp. 599–613). Springer, Dordrecht.
Elshamy, E. M., El-Rabaie, E. S. M., Faragallah, O. S., Elshakankiry, O. A., Abd El-Samie, F. E., El-Sayed, H. S., et al. (2015). Efficient audio cryptosystem based on chaotic maps and double random phase encoding. International Journal of Speech Technology, 18(4), 619–631.
Kumar, P., & Rana, S. B. (2016). Development of modified AES algorithm for data security. Optik, 127(4), 2341–2345.
Liu, H., Kadir, A., & Li, Y. (2016). Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik, 127(19), 7431–7438.
Laiphrakpam, D. S., & Khumanthem, M. S. (2017). Medical image encryption based on improved ElGamal encryption technique. Optik, 147, 88–102.
Sathiyamurthi, P., & Ramakrishnan, S. (2017). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 1–11.
Faragallah, O. S. (2018). Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wireless Personal Communications, 98(2), 2009–2023.
Kalpana, M., Ratnavelu, K., & Balasubramaniam, P. (2019). An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimedia Tools and Applications, 78(5), 5969–5988.
Naskar, P. K., Paul, S., Nandy, D., & Chaudhuri, A. (2019). DNA encoding and channel shuffling for secured encryption of audio data. Multimedia Tools and Applications, 78(17), 25019–25042.
Shah, D., Shah, T., & Jamal, S. S. (2019). Digital audio signals encryption by Mobius transformation and Hénon map. Multimedia Systems, 26, 1–11.
El-Zoghdy, S. F., El-sayed, H. S., & Faragallah, O. S. (2020). Transmission of chaotic-based encrypted audio through OFDM. Wireless Personal Communications, 113, 1–21.
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209.
Miller, V. S. (1985, August). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417–426). Springer, Berlin, Heidelberg.
Lu, X., Cao, Y., Lu, P., & Zhai, A. (2012). Digital audio information hiding based on Arnold transformation and double random-phase encoding technique. Optik, 123(8), 697–702.
Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer.
Vanstone, S. A. (2003). Next generation security for wireless: Elliptic curve cryptography. Computers & Security, 22(5), 412–415.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.
Schoof, R. (1995). Counting points on elliptic curves over finite fields. Journal de Théorie des Nombres de Bordeaux, 7(1), 219–254.
Teeriaho, J. (2011). Cyclic group cryptography with Elliptic Curves. Brasov, May.
Troncoso-Pastoriza, J. R., Katzenbeisser, S., Celik, M., & Lemma, A. (2007). A secure multidimensional point inclusion protocol. In Proceedings of the 9th workshop on Multimedia and security (pp. 109–120).
Elliptic curve parameter. Retrieved 19 May 2016 from http://www.ecc-brainpool.org/download/Domain parameters.pdf.
Sample audio. http://www.wavsource.com/. Accessed 2 January 2019.
Washington, L. C. (2008). Elliptic curves: Number theory and cryptography. Boca Raton: CRC Press.
Pollard, J. M. (1978). Monte Carlo methods for index computation (modp). Mathematics of computation, 32(143), 918–924.
Wu, Y., Noonan, J. P., & Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT), 1(2), 31–38.
Xiang Peng, Zhiyong Cui, Lilong Cai, Lingfeng Yu, (2003) Digital audio signal encryption with a virtual optics scheme. Optik, 114(2):69–75
Dzwonkowski, M., Papaj, M., & Rykaczewski, R. (2015). A new quaternion-based encryption method for DICOM images. IEEE Transactions on Image Processing, 24(11), 4614–4622.
Wadi, S. M., & Zainal, N. (2014). Decomposition by binary codes-based speedy image encryption algorithm for multiple applications. IET Image Processing, 9(5), 413–423.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khoirom, M.S., Laiphrakpam, D.S. & Tuithung, T. Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field. Wireless Pers Commun 117, 809–823 (2021). https://doi.org/10.1007/s11277-020-07897-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07897-9