[go: up one dir, main page]

0% found this document useful (0 votes)
27 views11 pages

Hybrid Image Encryption Using AES GCM and RSA

The document outlines a hybrid image encryption system using AES-GCM for data encryption and RSA for secure key exchange, aimed at enhancing security and efficiency in multimedia data protection. It details the encryption and decryption processes, evaluation metrics, and performance comparisons with traditional algorithms, demonstrating superior speed and strong security metrics. The hybrid model is particularly suited for applications requiring high confidentiality and integrity, such as medical imaging and secure document sharing.

Uploaded by

Mehar M Moeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views11 pages

Hybrid Image Encryption Using AES GCM and RSA

The document outlines a hybrid image encryption system using AES-GCM for data encryption and RSA for secure key exchange, aimed at enhancing security and efficiency in multimedia data protection. It details the encryption and decryption processes, evaluation metrics, and performance comparisons with traditional algorithms, demonstrating superior speed and strong security metrics. The hybrid model is particularly suited for applications requiring high confidentiality and integrity, such as medical imaging and secure document sharing.

Uploaded by

Mehar M Moeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Hybrid Image Encryption

Using AES-GCM and RSA


Instructor: Miss Sherish Aqeel

Group Member:

Abdul Moeed B-26546

Ahmad Usman B-26763

Hader Ali B-26714


Introduction to Hybrid
Image Encryption
Need for Security Hybrid Approach
With increasing digital The project combines
communication, securing AES-GCM's speed and
multimedia data, data handling with RSA's
especially images, is secure key management
critical due to growing to enhance
cyber threats. confidentiality and
integrity.

Performance Focus
This hybrid model aims to outperform traditional algorithms
like AES, DES, 3DES, and RSA in efficiency and security.
Project Objectives
Hybrid Encryption System
Develop a system using AES-GCM for data encryption and RSA for secure key
exchange.

Security Goals
Ensure confidentiality, integrity, and resistance to differential attacks in image
encryption.

Performance Evaluation
Assess algorithm using entropy, correlation, NPCR, UACI, encryption/decryption
time, and throughput.

Benchmarking
Compare hybrid model performance against conventional cryptographic algorithms.
Hybrid Encryption Algorithm Overview

Encryption Process Decryption Process

1. Convert image to byte array. 1. Decrypt AES key using RSA private key.
Detailed Algorithm Steps
Encryption Steps
1. Load and convert image to bytes.
2. Generate secure 128-bit AES key.
3. Encrypt image using AES-GCM with authentication
tags.
4. Encrypt AES key with RSA public key.
5. Save encrypted image, key, nonce, and tag.

Decryption Steps
1. Load encrypted data and keys.
2. Decrypt AES key with RSA private key.
3. Decrypt image using AES-GCM key and parameters.
4. Convert bytes back to image format.
Evaluation Metrics for Encryption
Encryption/Decryption Time Entropy Correlation Coefficient

Measures speed of encrypting and Indicates randomness in encrypted Measures pixel correlation; values
decrypting images; faster is better. image; higher entropy means near zero or negative indicate
better unpredictability. strong decorrelation.

NPCR UACI Throughput

Percentage of pixels changed due Average intensity difference in Encryption speed measured in
to slight input change; higher encrypted images; higher values megabytes per second; higher
values show resistance to attacks. indicate strong security. throughput means better
performance.
Performance Comparison of
Algorithms
Algorith Entropy Correlation NPCR UACI Time (s) Throughpu
m (%) (%) t (MBps)

Hybrid 0.4993 -0.11877 99.986 33.3894 0.00399 275.34


AES+RS 7 5
A

DES 0.4994 -0.11880 99.9861 33.3885 0.03293 33.38


0

3DES 0.4994 -0.11877 99.986 33.3911 0.10086 10.90


0 5

RSA 0.6521 -0.13744 99.9814 33.8052 6.96835 0.16


6
Results and Interpretation
Entropy & Correlation Encryption Time &
Throughput
Block-based algorithms
show similar entropy The hybrid model is
(~0.499) and low fastest (0.00399 s) and
correlation (~-0.11877), achieves highest
indicating strong pixel throughput (275.34
decorrelation. RSA has MBps), outperforming
higher entropy but less AES and RSA significantly.
efficient for images.

Security Metrics
High NPCR (99.9865%) and UACI (33.3894%) demonstrate
strong resistance to differential attacks, ensuring robust
security.
Why the Hybrid Algorithm
Excels
Fastest Encryption
Encryption time of 0.00399 seconds, much faster than AES and RSA.

Highest Throughput
275.34 MBps throughput, over three times AES and 1700 times
RSA.

Strong Security
Excellent NPCR and UACI values show strong resistance to
attacks and effective pixel scrambling.

Low Overhead & Scalability


Low computational cost makes it ideal for mobile and
real-time systems, scalable for large image datasets.
Applications and Final
Takeaways
The hybrid AES-GCM + RSA encryption model is ideal for sensitive,
performance-critical applications such as medical image storage,
secure document sharing, satellite imaging, biometric protection,
and real-time video encryption.

Its balanced strengths in speed, security, and efficiency make it a


practical solution for secure image storage and transmission in
real-world scenarios requiring high confidentiality and integrity.
Conclusion: Strength and Efficiency Combined
The AES-GCM + RSA hybrid algorithm ensures robust image confidentiality and integrity. It blends fast
authenticated encryption with secure key management.

Security 1
The AES-GCM + RSA hybrid algorithm ensures
robust image confidentiality and integrity. It
blends fast authenticated encryption with
Performance
secure key management.
Compared to traditional methods, it delivers
superior speed, high throughput, and strong
Applications security metrics like entropy, NPCR, and UACI.

Ideal for critical uses in medical imaging,


defense, satellite communications, and digital
surveillance, it balances scalability with real-
world application demands.

You might also like