Abstract of MS Thesis
Abstract of MS Thesis
1.2 Introduction
The aim of this section is to give a short introduction to the techniques related to our research
work, I have done in MS . Security is an important in protecting data against outsider. One of the
most essential methods for make certain data secrecy is cryptography. The study of cryptography is
essential because unsecured network make data transference and the make a move of information
easily affected by data theft and attack via an open channel. This makes it necessary to learn
cryptography, in this era, cryptographic techniques are used to secure our communication when
we in contact with others publicly. Cryptography plays a vital role to make our discussion secure
when we conveying trough any insecure medium like internet etc. Cryptography is the science of
secret writing which is widely used to hide our information which we don’t want to share with
others except the relevant person during liaise.
1
gets deform during transportation (due to an attacker or a in penury radio signal) then only one
bit of the decrypted plaintext will be conspicuous.
• Block ciphers encrypt an unabridged block of plaintext bits at a time with the same key.
In this way we can say that the encryption of any plaintext bit in a given block be conditional
on every single other plaintext bit in the same block. In application, the extensive most of block
ciphers either have a block length of 128 bits (16 bytes) such as the advanced encryption standard
(AES), or a block length of 64 bits (8 bytes) such as the data encryption standard (DES) or triple
DES (3DES) algorithm.
Some of the more twenty-first-century’s public key structure make use of elliptic curves since they
can propose upgrade effectiveness and bandwidth. Elliptic curves were introduced in the mid-
of 1998s. Elliptic curves are also curves those are formed by a polynomial but for cryptographic
algorithms we define a special type of polynomial for elliptic curves not over a real field but on the
prime field where all the arithmetics are performed under modulo p.
Let Zp = {0, 1, 2, ..., p − 1} where p > 3 is a prime be a finite field. Then the elliptic curve over
Zp is the set
E = {(x, y) | x, y ∈ Zp which satisf ied y 2 ≡ x3 + ax + b mod p}
with the imaginary point Θ at infinity where a , b ∈ Zp which satisfied the discriminant condition
4a3 + 27b2 ̸= 0 mod p. Elliptic curves are also used in cryptographic algorithms. Elliptic curves
have gained attention in the field of number theory since last 120 years. The graphical represen-
tation of the elliptic curves do not represent an ellipse rather is used to calculate the perimeter
of the ellipse, that’s why it is called an elliptic curve and the curve is visually symmetric about
the x-axis. The spatial coordinates that define the rational points of the particular curve lie in
the first quadrant, and there is a symmetry connection between the rational points, Graphically
speaking an elliptic curve on a prime field is not a regular curve. In cryptography we do not need
the graphical representation of the elliptic curve, we only deals with the coordinates.
2
1.2.6 Application Of Elliptic Curve
Cryptography also uses in image encryption techniques Several modern techniques for image en-
cryption process have been introduced in the past. In image encryption we convert the plain image
into cipher image using different techniques. Substitution boxes (S-boxes) play an important role
in image encryption strategies. By using S-boxes we can transform the plain image into the cipher
image, the technique which we are using to set the S-boxes should be invertible, otherwise the
decryption of that image is not possible. S-boxes in cryptography are used to increased the level
of confusion and diffusion in data. Using any one of the encryption techniques sender converts
the plain image into cipher image before share it with the relevant person through any unconfined
way. Then the receiver, receives the image in the form of cipher image and decrypt it by the use of
secret technique. In our research, we are interested to convert an original image into an encrypted
image using the algebraic characteristics related with the elliptic curves over Galois field. Actually
complex arithmetic of rational points on the elliptic curve has a high complexity due this reason
it produce a good algorithm that we use in image encryption.
The elliptic curve’s group, defined on a given Galois field is used in this research problem mainly for
its complex algebraic properties. The large number of points on an elliptic curve provide a perfect
platform for the construction of a larger cyclic group. When use inject confusion and diffusion
in the data using that structure it’s crucial to understand this cyclic group’s algebraic structure.
With the help of some more complex methods, possibly including chaos theory we aim to design a
more effective image encryption technique. We further aim to discuss the statistical analysis of the
proposed method and also compare the presented scheme with the most recent image encryption
techniques.
2 Research methodology
The research methodology used to work out the problem has these steps:
1. To achieve a deep and clear understanding of the algebraic properties of the Galois field.
2. To explore and study such elliptic curves defined on the above mentioned Galois filed that
have a large number of points.
3. To develop strong programming skills to perform calculations related with the project
4. To design the image encryption algorithm involving this elliptic curve.
5. To analyze and compare the image encryption technique with the recent models.
6. .To perform the arithmetic of points addition process by choosing a base point (the generator
of the elliptic group).
3 Thesis layout
1. Chapter 1 explains necessary details regarding the main objects of this thesis.
2. Chapter 2 deals with the basic concepts related with cryptography, Galois field and image
encryption etc.
3
3. Chapter 3 deals with a detailed description of the research work. Our methods for construc-
tion of S-box, based on the elliptic curve over a finite field is presented.