Skip to main content
Log in

Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Performing encryption using ElGamal public key encryption over finite field requires imbedding of message which is represented by integers. These integers are to be imbedded to a coordinate location that satisfy the elliptic curve equation using Koblitz imbedding technique. In doing so, data expansion takes place as each integer have to be represented as a coordinate. Recommended elliptic curves have large modulo prime value, so for every small integer representation of a message, the expansion in cipher text is massive. The above factors hinders the usage of ElGamal method for large data size encryption. In the ameliorated version, every coordinates in the elliptic curve equation is applicable for performing encryption operation. The typical Koblitz imbedding technique to specific coordinates satisfying the elliptic curve equation can be avoided. Data expansion trouble is taken care by using base conversion operation with multiple audio data. Simulation results and performance comparison with other public key cryptosystem signify that the proposed method is suitable for audio encryption operation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Lima, J. B., & da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75(14), 8403–8418.

    Article  Google Scholar 

  2. Luma, A., Selimi, B., & Ameti, L. (2015). Using elliptic curve encryption and decryption for securing audio messages. In Transactions on engineering technologies (pp. 599–613). Springer, Dordrecht.

  3. Elshamy, E. M., El-Rabaie, E. S. M., Faragallah, O. S., Elshakankiry, O. A., Abd El-Samie, F. E., El-Sayed, H. S., et al. (2015). Efficient audio cryptosystem based on chaotic maps and double random phase encoding. International Journal of Speech Technology, 18(4), 619–631.

    Article  Google Scholar 

  4. Kumar, P., & Rana, S. B. (2016). Development of modified AES algorithm for data security. Optik, 127(4), 2341–2345.

    Article  Google Scholar 

  5. Liu, H., Kadir, A., & Li, Y. (2016). Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik, 127(19), 7431–7438.

    Article  Google Scholar 

  6. Laiphrakpam, D. S., & Khumanthem, M. S. (2017). Medical image encryption based on improved ElGamal encryption technique. Optik, 147, 88–102.

    Article  Google Scholar 

  7. Sathiyamurthi, P., & Ramakrishnan, S. (2017). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 1–11.

    Article  Google Scholar 

  8. Faragallah, O. S. (2018). Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wireless Personal Communications, 98(2), 2009–2023.

    Article  Google Scholar 

  9. Kalpana, M., Ratnavelu, K., & Balasubramaniam, P. (2019). An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimedia Tools and Applications, 78(5), 5969–5988.

    Article  Google Scholar 

  10. Naskar, P. K., Paul, S., Nandy, D., & Chaudhuri, A. (2019). DNA encoding and channel shuffling for secured encryption of audio data. Multimedia Tools and Applications, 78(17), 25019–25042.

    Article  Google Scholar 

  11. Shah, D., Shah, T., & Jamal, S. S. (2019). Digital audio signals encryption by Mobius transformation and Hénon map. Multimedia Systems, 26, 1–11.

    Google Scholar 

  12. El-Zoghdy, S. F., El-sayed, H. S., & Faragallah, O. S. (2020). Transmission of chaotic-based encrypted audio through OFDM. Wireless Personal Communications, 113, 1–21.

    Article  Google Scholar 

  13. Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209.

    Article  MathSciNet  Google Scholar 

  14. Miller, V. S. (1985, August). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417–426). Springer, Berlin, Heidelberg.

  15. Lu, X., Cao, Y., Lu, P., & Zhai, A. (2012). Digital audio information hiding based on Arnold transformation and double random-phase encoding technique. Optik, 123(8), 697–702.

    Article  Google Scholar 

  16. Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer.

    MATH  Google Scholar 

  17. Vanstone, S. A. (2003). Next generation security for wireless: Elliptic curve cryptography. Computers & Security, 22(5), 412–415.

    Article  Google Scholar 

  18. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.

    Article  MathSciNet  Google Scholar 

  19. ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.

    Article  MathSciNet  Google Scholar 

  20. Schoof, R. (1995). Counting points on elliptic curves over finite fields. Journal de Théorie des Nombres de Bordeaux, 7(1), 219–254.

    Article  MathSciNet  Google Scholar 

  21. Teeriaho, J. (2011). Cyclic group cryptography with Elliptic Curves. Brasov, May.

  22. Troncoso-Pastoriza, J. R., Katzenbeisser, S., Celik, M., & Lemma, A. (2007). A secure multidimensional point inclusion protocol. In Proceedings of the 9th workshop on Multimedia and security (pp. 109–120).

  23. Elliptic curve parameter. Retrieved 19 May 2016 from http://www.ecc-brainpool.org/download/Domain parameters.pdf.

  24. Sample audio. http://www.wavsource.com/. Accessed 2 January 2019.

  25. Washington, L. C. (2008). Elliptic curves: Number theory and cryptography. Boca Raton: CRC Press.

  26. Pollard, J. M. (1978). Monte Carlo methods for index computation (modp). Mathematics of computation, 32(143), 918–924.

  27. Wu, Y., Noonan, J. P., & Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT), 1(2), 31–38.

  28. Xiang Peng, Zhiyong Cui, Lilong Cai, Lingfeng Yu, (2003) Digital audio signal encryption with a virtual optics scheme. Optik, 114(2):69–75

    Article  Google Scholar 

  29. Dzwonkowski, M., Papaj, M., & Rykaczewski, R. (2015). A new quaternion-based encryption method for DICOM images. IEEE Transactions on Image Processing, 24(11), 4614–4622.

  30. Wadi, S. M., & Zainal, N. (2014). Decomposition by binary codes-based speedy image encryption algorithm for multiple applications. IET Image Processing, 9(5), 413–423.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Motilal Singh Khoirom.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khoirom, M.S., Laiphrakpam, D.S. & Tuithung, T. Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field. Wireless Pers Commun 117, 809–823 (2021). https://doi.org/10.1007/s11277-020-07897-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07897-9

Keywords

Navigation