International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1134
FPGA Implementation of Image Encryption and Decryption using Fully
Homomorphic Technique
S. K. Alone
M.TECH, (Electronics System and Communication Engineering), GCOEA, Amravati, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Security of data is the difficult issue of today that
have many areas including computers and communication.
Modern cyber security attacks have surely affects of the users.
Cryptography is technique used to create authentication,
integrity, availability, secrecy andidentificationofinformation
data can be continued also securityandprivacyof information
data can be given to the user. The cryptography methods and
different methods are used to make available a high security
to many applications. The greater use of multimedia
applications in the industrial and IT process requires us to
protect secret information data from unauthorized access.
Cryptography is essential solution to protect our information
against attacks. The increasinguseof multimediaapplications
in the industrial and IT process requires us to protect
confidential image data from unauthorized access.
Cryptography is the most relevant solution to protect our
information against attacks. There are many image
encryption techniques like DES, AES and RSA. Homomorphic
encryption is the encryption scheme which means the
operations on the encrypted data. Homomorphic encryption
can be applied in any system by using various public key
algorithms.
Key Words: —Cryptography, public key algorithm, private
key algorithm, Fully homomorphic encryption.
1. INTRODUCTION
To meet the safety requirements, cryptography is a
common technique to uphold image security. Cryptography
is widely used today because of its security advantages. The
major objectives of cryptography are control access,
confidentiality, integrity, non-repudiation and
authentication. There exist two main types of cryptographic
algorithms, the symmetric-key family (the
encryption/decryption key is shared between the two
parties and remains secret) and the asymmetric-key family
(the encryption key is public while the decryption key is
private).The benefit of symmetric algorithms is that they do
not consume too much of power and are characterized with
high speed while encrypting the data. Symmetric key
cryptosystems have higher speed than the asymmetric key
cryptosystems. Due to various advantages, symmetric
algorithms are practised for encryption and decryption of
image.
Security is the prime requirement because of the
increasing usage of the internet or public cloud for storing
the data. Security is needed for preserving the integrity,
confidentiality, availability of the information system
resources. There can be collection of the data in the
encrypted format in any databasebutiftheoperationsorthe
computations on the encrypted data are needed to be
performed then it is the compulsory to decrypt that data but
the decrypted data are not assured any more thus, a new
idea of the cryptosystem was proposedthatallowsthedirect
operations on the encrypted data. This concept is called
privacy homomorphism. However, decryption is notcarried
out; the result obtained is identical as operations on
plaintext. While exclusively controlling encrypted data,
implicit additions andmultiplicationsonplaintextvaluescan
be executed by the workers by using homomorphic
encryption.
Security can be a major issue for such data centerswhen
the information they have are touchy. A data center may be
attacked, compromised and an addition the capability of
insider attacks .The safety problems with the outward
databases can be solved if the critical data are encrypted.
Naturally it gives rise to the problem of how the data center
can perform computation on encrypted data. Homomorphic
encryption schemes, gives a solutionforthisstatement: Such
schemes enable for functions to evaluateencrypteddata,the
result of which is still encrypted data, but can be decrypted
back into the result of the (logically)samefunctionappliedto
the plain data.
2. LITERATURE REVIEW
Amal Hafsa, Anissa Sghaier, worked on AES image
encryption techniques. The AES is a symmetric-
cryptosystem, in which both who send and receives uses a
single key for encoding and decoding of the message128 is
the length of plaintext, while one hundred twenty two, one
hundred ninety two and two hundred fifty six are either
keylength. Advanced encryption standard method is an
iteration based algorithm. One iteration is called as one
round, for keylength one hundredtwenty eight,onehundred
ninety two, two hundred fifty six the no. of rounds required
are ten, twelve and fourteen. The one hundred twenty
eightbit algorithm is separatedinto16bytes. These bytes are
shown as state array of 4*4 called state matrix, and all the
various methods such as subbytes operation, shiftrows
operation,mixcolumnoperationandaddroundoperation are
executed on state matrix.
In the blowfish encryption scheme has been studied, Bruce
Schneier, world's first cryptologist proposed the Blowfish
algorithm [2] and made it accesable in the public sector.
Blowfish is a varying key length, block cipher of 64 bit. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1135
method was first proposed in 1993, andhasnotbeen broken
yet. It can be modified applications of hardware because of
its concentration.
The algorithm is as shown having two parts: first is
expansion of key part and data- encryption part is the
second part. In key expansion a key size of maximum448bit
is change to some subkey array of 4168 bytes. Information
encryption requires through a 16-round (commonly)
network.
RSA algorithm is called as the most excellent encryption
public key algorithm. It has been widely applied to
encryption and decryption and digital signature.[3] Basic
steps are as follows:
(1)Consider two large random numbers and we call them p
and q. p is unequal to q. Then compute N, which is equal to
the value p*q;
(2)Choose an integer e less than ϕ (n) and ϕ (n)=(p-1)*(q-1).
Here ϕ (n) and e should be comparatively prime numbers.
(3)Use Expanded-Euclidean algorithm to calculate d. The
formula is given below:
d * e≡ 1 mod ((p-1)*(q-1))After the above operation, (N, e)
is public key and (N, d) is private key.
The determination of the Diffie-Hellman algorithm is to
allowed two users to interchange a secret key confidentially
that can be used for subsequent encryption of information.
The Diffie-Hellman encryption depends on its difficulty of
calculating discret logarithms. q is a prime number and α is
an integer and are two publicly familiar numbers. α is a
primitive root of q.Consider the consumer A and B wants to
interchange a key.Consumer A choses a random number
<qand calculates the public key mod q.Similarly,user
B separately selects a random number <q and calculates
public key mod q. Each side theXvalueiskeptsecret
and makes the value of Y accesable publicly to the opposite
side. Consumer A calculates the key as mod q.
and consumer B calculates the key as mod q.
Thus, both the sides have interchange a secrete key.
3. METHODOLOGY
Fig.1. Block diagram of proposed methodology
System is initialized first. Image is loaded in the
MATLAB. Image is converted into file.text. Data to be
processed in text I/O is read. Application of Homomorphic
encryption is developed in VHDL. Data obtainedasO/Pfrom
text I/O in file.text is stored. File.text is converted intoimage
in MATLAB. Finally at the output original recoveredimage is
acquire. The proposedmethodologyissplittedintofollowing
blocks:
A. Encryption
B. Decryption
A. Encryption Process
Fig.2. Encryption Process
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1136
The original image is read using Matlab and it is
converted into text file by using preprocessing. It is given as
input to homomorphic encryption algorithm developed in
VHDL language. Homomorphic encryption algorithm
simulated on Modelsim and synthesized on Quartus II and
the result of implementation on the FPGA cyclone IV.E is
presented in the console of the card DE2-115 in the form of
the 256 * 256 pixels. Then the output of homomorphic
algorithm is given to the postprocessing togettheencrypted
image.
B. Decryption Process
Fig.3. Decryption Process
In decryption process the encryptedimageisgivenasinput
to the preprocessing. It is given as input to homomorphic
decryption algorithm developed in VHDL language.
Homomorphic decryption algorithmsimulatedonModelsim
and synthesized on Quartus II and the result of
implementation on the FPGA cyclone IV.E ispresentedinthe
console of the card DE2-115 in the form of the 256 * 256
pixels. Then the output of homomorphic decryption
algorithm is given to the postprocessing togetthedecrypted
image i.e. original image.
Fig.4. Proposed Method Hybrid Homomorphic Encryption
scheme
In this part, the possibility to fabricate another encryption
scheme which supports all homomorphic tasks from the
partial encryption schemes that supports a limited number
of homomorphic operations(additionormultiplication). The
partial homomorphic encryption schemes can support just
only homomorphic property. While, the fully homomorphic
encryption schemes can support all properties of
homomorphic.Tobuilda newfullyhomomorphic encryption
scheme which supports all homomorphic operations from
two partial homomorphic encryption schemes onesupports
only addition and other supports only multiplication
operations. The hybrid homomorphic encryption scheme
must preserve the algebraic structure.
Algorithm steps for Encryption and Decryption:
RSA Multiplicative PHE Rivest, Shamir and Adleman
published their public key cryptosystemin1978.Althoughit
is a very basic algorithm, it is one of the mostcrucial building
blocks of homomorphic encryption, which iswhyithasbeen
included as an example of multiplicative partial
homomorphic encryption technique. RSA algorithm is
regarded as the most excellent public key encryption
algorithm by far. It has been widely applied to encryption
and decryption and digital signature. RSA key length
increases along with the increase of con_dentiality level.
Therefore, we need to continuous optimize the process of
key generating in order to adapt the market demand.RSA
algorithm as shown below:
(1)Generate two large random numbers and we call them p
and q. p is unequal to q. Then compute N, which is equal to
the value p multiplied by q.
(2)Choose an integer e less than and (n) = (p - 1)*(q-
1). Here (n) and e should becomparativelyprimenumbers.
(3)Use Expanded-Euclidean algorithm to calculate d. The
formula is given below: d * e 1mod((p - 1) *(q - 1)) After
the above operation, (N, e) is public key and (N,d) is private
key.
For Encryption cyphertext C =
For Decryption plaintext M =
By using Modulo Addition
C =
4. RESULTS
MATLAB RESULTS:
Fig.5.Original Image
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1137
Fig.6.Encrypted image
Fig.7.Recovered original image
SYNTHESIS RESULTS
Quartus Version 9.1 SP2
Family Cyclone II
Device EP2C35F672C6N
Total logic elements 734/33.216 (2%)
Total combinational function 734/33.216 (2%)
Dedicated logic registers 309/33.216 (2%)
Total Pins 9/475 (2%)
Total thermal Power
dissipation
31.05 mW
5. CONCLUSION
A fully homomorphic encryption scheme would appear to
solve the security problem. Homomorphic encryption
schemes permit anyone to evaluate functions on encrypted
data, but the evaluators never see any information about the
result. It is possible to constructanencryptionschemewhere
a user can compute f(m) from an encryption of a message m,
but she should not be able to learn any other information
about m.
REFERENCES
[1]ZainabHikmatMahmood,MahmoodKhalelIbrahem"New
Fully Homomorphic EncryptionSchemeBasedOnMultistage
Partial Homomorphic Encryption Applied In Cloud
Computing" 2018 1st Annual International conference on
Information and Sciences (AICIS).
[2] Kirandeep Kaur , Jyotsna Sengupta,”Optimizing Fully
Homomorphic Encryption AlgorithmusingGreedyApproach
in Cloud Computing”, International Journal of Computer
Science Trends and Technology (IJCST) – Volume 5 Issue 4,
Jul – Aug 2017).
[3]Payal V. Parmar, Shraddha B. Padhar, Shafika N. Patel,
Niyatee I. Bhatt, Rutvij H. Jhaveri,” Survey of Various
Homomorphic Encryption algorithms and Schemes”,
International Journal of Computer Applications (0975 –
8887) Volume 91 – No.8, April 2014.
[4]Li Dongjiang, Wang Yandan” The research on key
generation in RSA public- key cryptosystem”, 2012 Fourth
International Conference on Computational andInformation
Sciences.
[5] Amal Hafsa, Anissa Sghaier, Wajih Elhadj Yousef,” Image
Encryption /Decryption Design Using NIOSII Soft Core
Processor”, ICEMIS2017.
[6] Trivedi, M. A. Hasamnis," Development of PlatformUsing
NIOS II Soft Core Processor for Image Encryption and
Decryption Using AES Algorithm",IEEE ICCSP conference,
2015.
[7] M. P. Leongl, S. Z. M. Naziril, S. Y. Pemgl, "Image
Encryption Design usingFPGA",International Conferenceon
Electrical, Electronics and System Engineering ,2013.
[8] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R.
Tourki, "A Modified AES Based Algorithm for Image
Encryption",International Journal of Computer,Electrical,
Automation, Control and Information Engineering Vol:1,
No:3, 2007.
[9] Melchor, Carlos Aguilar, et al. "Improving Additive and
Multiplicative Homomorphic Encryption Schemes Based on
Worst-Case Hardness Assumptions}." IACR Cryptology
ePrint Archive 2011 (2011): 607.
[10]Vaidehi, E. "Computing Aggregation Function
Minimum/Maximum using Homomorphic Encryption
Schemes in Wireless Sensor Networks (WSNs)." California
State University, East Bay Hayward, CA, USA. (2007).
[11]Xidan Song, Yulin Wang, "Homomorphic Cloud
Computing Scheme Based on Hybrid Homomorphic
Encryption," in IEEE International Conference on Computer
and Communication (ICCC ), Chengdu , China, 2017.
[12]Abdellah EZZATI, Khalid EL MAKKAOUI , Abderrahim
BENI HSSANE, "Homomorphic Encryption as a Solution of
Trust Issues in Cloud," in International Conference on Big
Data, Cloud and Applications, Tetuan, Morocco, 2015.

More Related Content

PPTX
Image encryption using aes key expansion
PDF
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
PDF
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
PDF
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
PDF
Fpga based encryption design using vhdl
PDF
Image encryption and decryption using aes algorithm
PDF
Color Image Encryption and Decryption Using Multiple Chaotic Maps
PDF
Secure image encryption using aes
Image encryption using aes key expansion
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
Fpga based encryption design using vhdl
Image encryption and decryption using aes algorithm
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Secure image encryption using aes

What's hot (17)

PDF
An Image Encryption using Chaotic Based Cryptosystem
PPTX
Performance evluvation of chaotic encryption technique
PPTX
Image Encryption and Compression
PPTX
Thesis Background
PDF
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
PDF
Template Protection with Homomorphic Encryption
PDF
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
PDF
Ew4301904907
PDF
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
PDF
A novel efficient multiple encryption algorithm for real time images
PDF
Ijcnc050208
PDF
An efficient and highly secure technique to encrypt
PDF
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
PPTX
Image encryption using elliptical curve cryptosytem with hill cipher
PDF
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
PDF
Implementation of Cryptography Architecture with High Secure Core
PPTX
Image Encryption in java ppt.
An Image Encryption using Chaotic Based Cryptosystem
Performance evluvation of chaotic encryption technique
Image Encryption and Compression
Thesis Background
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Template Protection with Homomorphic Encryption
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
Ew4301904907
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
A novel efficient multiple encryption algorithm for real time images
Ijcnc050208
An efficient and highly secure technique to encrypt
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Image encryption using elliptical curve cryptosytem with hill cipher
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
Implementation of Cryptography Architecture with High Secure Core
Image Encryption in java ppt.
Ad

Similar to IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Homomorphic Technique (20)

PDF
Implementation of aes and blowfish algorithm
PDF
IRJET - A Review on Crypto-Algorithm using Different Hardware
PDF
Development and performance comparison of modified RSA algorithm with other c...
PPTX
Image Security System using Image Processing
PDF
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
PDF
IRJET- Homomorphic Image Encryption
PDF
Implementation of-hybrid-cryptography-algorithm
PPTX
Image Security
PDF
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
PPTX
Homomorphic encryption and Private Machine Learning Classification
PPTX
Homomorphic Encryption: Unveiling secrets without exposing them
PDF
Image encryption approach for security issues
PDF
Overview on Symmetric Key Encryption Algorithms
PDF
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
PDF
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
PDF
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
PDF
D010321824
PDF
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PDF
H42063743
Implementation of aes and blowfish algorithm
IRJET - A Review on Crypto-Algorithm using Different Hardware
Development and performance comparison of modified RSA algorithm with other c...
Image Security System using Image Processing
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Homomorphic Image Encryption
Implementation of-hybrid-cryptography-algorithm
Image Security
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
Homomorphic encryption and Private Machine Learning Classification
Homomorphic Encryption: Unveiling secrets without exposing them
Image encryption approach for security issues
Overview on Symmetric Key Encryption Algorithms
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
D010321824
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
H42063743
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
PPTX
MODULE 3 SUSTAINABLE DEVELOPMENT GOALSPPT.pptx
PDF
Introduction to Machine Learning -Basic concepts,Models and Description
PPTX
L1111-Important Microbial Mechanisms.pptx
PDF
Recent Trends in Network Security - 2025
PDF
Application of smart robotics in the supply chain
PPTX
quantum theory on the next future in.pptx
PDF
ITEC 1010 - Networks and Cloud Computing
PPTX
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
PPT
Module_1_Lecture_1_Introduction_To_Automation_In_Production_Systems2023.ppt
PPTX
module 2 renewable energy power plant.pptx
PDF
COMPARATIVE ANALYSIS REPORT BY NDIDIAMAKA .G. ISRAEL
PDF
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
PDF
PhD defense presentation in field of Computer Science
PPTX
highway-150803160405-lva1-app6891 (1).pptx
PDF
August 2025 Top Read Articles in - Bioscience & Engineering Recent Research T...
PPTX
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
PDF
Project_Mgmt_Institute_- Marc Marc Marc.pdf
PPTX
Electric vehicle very important for detailed information.pptx
PPTX
Cloud Security and Privacy-Module-2a.pptx
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
MODULE 3 SUSTAINABLE DEVELOPMENT GOALSPPT.pptx
Introduction to Machine Learning -Basic concepts,Models and Description
L1111-Important Microbial Mechanisms.pptx
Recent Trends in Network Security - 2025
Application of smart robotics in the supply chain
quantum theory on the next future in.pptx
ITEC 1010 - Networks and Cloud Computing
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
Module_1_Lecture_1_Introduction_To_Automation_In_Production_Systems2023.ppt
module 2 renewable energy power plant.pptx
COMPARATIVE ANALYSIS REPORT BY NDIDIAMAKA .G. ISRAEL
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
PhD defense presentation in field of Computer Science
highway-150803160405-lva1-app6891 (1).pptx
August 2025 Top Read Articles in - Bioscience & Engineering Recent Research T...
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
Project_Mgmt_Institute_- Marc Marc Marc.pdf
Electric vehicle very important for detailed information.pptx
Cloud Security and Privacy-Module-2a.pptx

IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Homomorphic Technique

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1134 FPGA Implementation of Image Encryption and Decryption using Fully Homomorphic Technique S. K. Alone M.TECH, (Electronics System and Communication Engineering), GCOEA, Amravati, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Security of data is the difficult issue of today that have many areas including computers and communication. Modern cyber security attacks have surely affects of the users. Cryptography is technique used to create authentication, integrity, availability, secrecy andidentificationofinformation data can be continued also securityandprivacyof information data can be given to the user. The cryptography methods and different methods are used to make available a high security to many applications. The greater use of multimedia applications in the industrial and IT process requires us to protect secret information data from unauthorized access. Cryptography is essential solution to protect our information against attacks. The increasinguseof multimediaapplications in the industrial and IT process requires us to protect confidential image data from unauthorized access. Cryptography is the most relevant solution to protect our information against attacks. There are many image encryption techniques like DES, AES and RSA. Homomorphic encryption is the encryption scheme which means the operations on the encrypted data. Homomorphic encryption can be applied in any system by using various public key algorithms. Key Words: —Cryptography, public key algorithm, private key algorithm, Fully homomorphic encryption. 1. INTRODUCTION To meet the safety requirements, cryptography is a common technique to uphold image security. Cryptography is widely used today because of its security advantages. The major objectives of cryptography are control access, confidentiality, integrity, non-repudiation and authentication. There exist two main types of cryptographic algorithms, the symmetric-key family (the encryption/decryption key is shared between the two parties and remains secret) and the asymmetric-key family (the encryption key is public while the decryption key is private).The benefit of symmetric algorithms is that they do not consume too much of power and are characterized with high speed while encrypting the data. Symmetric key cryptosystems have higher speed than the asymmetric key cryptosystems. Due to various advantages, symmetric algorithms are practised for encryption and decryption of image. Security is the prime requirement because of the increasing usage of the internet or public cloud for storing the data. Security is needed for preserving the integrity, confidentiality, availability of the information system resources. There can be collection of the data in the encrypted format in any databasebutiftheoperationsorthe computations on the encrypted data are needed to be performed then it is the compulsory to decrypt that data but the decrypted data are not assured any more thus, a new idea of the cryptosystem was proposedthatallowsthedirect operations on the encrypted data. This concept is called privacy homomorphism. However, decryption is notcarried out; the result obtained is identical as operations on plaintext. While exclusively controlling encrypted data, implicit additions andmultiplicationsonplaintextvaluescan be executed by the workers by using homomorphic encryption. Security can be a major issue for such data centerswhen the information they have are touchy. A data center may be attacked, compromised and an addition the capability of insider attacks .The safety problems with the outward databases can be solved if the critical data are encrypted. Naturally it gives rise to the problem of how the data center can perform computation on encrypted data. Homomorphic encryption schemes, gives a solutionforthisstatement: Such schemes enable for functions to evaluateencrypteddata,the result of which is still encrypted data, but can be decrypted back into the result of the (logically)samefunctionappliedto the plain data. 2. LITERATURE REVIEW Amal Hafsa, Anissa Sghaier, worked on AES image encryption techniques. The AES is a symmetric- cryptosystem, in which both who send and receives uses a single key for encoding and decoding of the message128 is the length of plaintext, while one hundred twenty two, one hundred ninety two and two hundred fifty six are either keylength. Advanced encryption standard method is an iteration based algorithm. One iteration is called as one round, for keylength one hundredtwenty eight,onehundred ninety two, two hundred fifty six the no. of rounds required are ten, twelve and fourteen. The one hundred twenty eightbit algorithm is separatedinto16bytes. These bytes are shown as state array of 4*4 called state matrix, and all the various methods such as subbytes operation, shiftrows operation,mixcolumnoperationandaddroundoperation are executed on state matrix. In the blowfish encryption scheme has been studied, Bruce Schneier, world's first cryptologist proposed the Blowfish algorithm [2] and made it accesable in the public sector. Blowfish is a varying key length, block cipher of 64 bit. The
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1135 method was first proposed in 1993, andhasnotbeen broken yet. It can be modified applications of hardware because of its concentration. The algorithm is as shown having two parts: first is expansion of key part and data- encryption part is the second part. In key expansion a key size of maximum448bit is change to some subkey array of 4168 bytes. Information encryption requires through a 16-round (commonly) network. RSA algorithm is called as the most excellent encryption public key algorithm. It has been widely applied to encryption and decryption and digital signature.[3] Basic steps are as follows: (1)Consider two large random numbers and we call them p and q. p is unequal to q. Then compute N, which is equal to the value p*q; (2)Choose an integer e less than ϕ (n) and ϕ (n)=(p-1)*(q-1). Here ϕ (n) and e should be comparatively prime numbers. (3)Use Expanded-Euclidean algorithm to calculate d. The formula is given below: d * e≡ 1 mod ((p-1)*(q-1))After the above operation, (N, e) is public key and (N, d) is private key. The determination of the Diffie-Hellman algorithm is to allowed two users to interchange a secret key confidentially that can be used for subsequent encryption of information. The Diffie-Hellman encryption depends on its difficulty of calculating discret logarithms. q is a prime number and α is an integer and are two publicly familiar numbers. α is a primitive root of q.Consider the consumer A and B wants to interchange a key.Consumer A choses a random number <qand calculates the public key mod q.Similarly,user B separately selects a random number <q and calculates public key mod q. Each side theXvalueiskeptsecret and makes the value of Y accesable publicly to the opposite side. Consumer A calculates the key as mod q. and consumer B calculates the key as mod q. Thus, both the sides have interchange a secrete key. 3. METHODOLOGY Fig.1. Block diagram of proposed methodology System is initialized first. Image is loaded in the MATLAB. Image is converted into file.text. Data to be processed in text I/O is read. Application of Homomorphic encryption is developed in VHDL. Data obtainedasO/Pfrom text I/O in file.text is stored. File.text is converted intoimage in MATLAB. Finally at the output original recoveredimage is acquire. The proposedmethodologyissplittedintofollowing blocks: A. Encryption B. Decryption A. Encryption Process Fig.2. Encryption Process
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1136 The original image is read using Matlab and it is converted into text file by using preprocessing. It is given as input to homomorphic encryption algorithm developed in VHDL language. Homomorphic encryption algorithm simulated on Modelsim and synthesized on Quartus II and the result of implementation on the FPGA cyclone IV.E is presented in the console of the card DE2-115 in the form of the 256 * 256 pixels. Then the output of homomorphic algorithm is given to the postprocessing togettheencrypted image. B. Decryption Process Fig.3. Decryption Process In decryption process the encryptedimageisgivenasinput to the preprocessing. It is given as input to homomorphic decryption algorithm developed in VHDL language. Homomorphic decryption algorithmsimulatedonModelsim and synthesized on Quartus II and the result of implementation on the FPGA cyclone IV.E ispresentedinthe console of the card DE2-115 in the form of the 256 * 256 pixels. Then the output of homomorphic decryption algorithm is given to the postprocessing togetthedecrypted image i.e. original image. Fig.4. Proposed Method Hybrid Homomorphic Encryption scheme In this part, the possibility to fabricate another encryption scheme which supports all homomorphic tasks from the partial encryption schemes that supports a limited number of homomorphic operations(additionormultiplication). The partial homomorphic encryption schemes can support just only homomorphic property. While, the fully homomorphic encryption schemes can support all properties of homomorphic.Tobuilda newfullyhomomorphic encryption scheme which supports all homomorphic operations from two partial homomorphic encryption schemes onesupports only addition and other supports only multiplication operations. The hybrid homomorphic encryption scheme must preserve the algebraic structure. Algorithm steps for Encryption and Decryption: RSA Multiplicative PHE Rivest, Shamir and Adleman published their public key cryptosystemin1978.Althoughit is a very basic algorithm, it is one of the mostcrucial building blocks of homomorphic encryption, which iswhyithasbeen included as an example of multiplicative partial homomorphic encryption technique. RSA algorithm is regarded as the most excellent public key encryption algorithm by far. It has been widely applied to encryption and decryption and digital signature. RSA key length increases along with the increase of con_dentiality level. Therefore, we need to continuous optimize the process of key generating in order to adapt the market demand.RSA algorithm as shown below: (1)Generate two large random numbers and we call them p and q. p is unequal to q. Then compute N, which is equal to the value p multiplied by q. (2)Choose an integer e less than and (n) = (p - 1)*(q- 1). Here (n) and e should becomparativelyprimenumbers. (3)Use Expanded-Euclidean algorithm to calculate d. The formula is given below: d * e 1mod((p - 1) *(q - 1)) After the above operation, (N, e) is public key and (N,d) is private key. For Encryption cyphertext C = For Decryption plaintext M = By using Modulo Addition C = 4. RESULTS MATLAB RESULTS: Fig.5.Original Image
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1137 Fig.6.Encrypted image Fig.7.Recovered original image SYNTHESIS RESULTS Quartus Version 9.1 SP2 Family Cyclone II Device EP2C35F672C6N Total logic elements 734/33.216 (2%) Total combinational function 734/33.216 (2%) Dedicated logic registers 309/33.216 (2%) Total Pins 9/475 (2%) Total thermal Power dissipation 31.05 mW 5. CONCLUSION A fully homomorphic encryption scheme would appear to solve the security problem. Homomorphic encryption schemes permit anyone to evaluate functions on encrypted data, but the evaluators never see any information about the result. It is possible to constructanencryptionschemewhere a user can compute f(m) from an encryption of a message m, but she should not be able to learn any other information about m. REFERENCES [1]ZainabHikmatMahmood,MahmoodKhalelIbrahem"New Fully Homomorphic EncryptionSchemeBasedOnMultistage Partial Homomorphic Encryption Applied In Cloud Computing" 2018 1st Annual International conference on Information and Sciences (AICIS). [2] Kirandeep Kaur , Jyotsna Sengupta,”Optimizing Fully Homomorphic Encryption AlgorithmusingGreedyApproach in Cloud Computing”, International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 4, Jul – Aug 2017). [3]Payal V. Parmar, Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, Rutvij H. Jhaveri,” Survey of Various Homomorphic Encryption algorithms and Schemes”, International Journal of Computer Applications (0975 – 8887) Volume 91 – No.8, April 2014. [4]Li Dongjiang, Wang Yandan” The research on key generation in RSA public- key cryptosystem”, 2012 Fourth International Conference on Computational andInformation Sciences. [5] Amal Hafsa, Anissa Sghaier, Wajih Elhadj Yousef,” Image Encryption /Decryption Design Using NIOSII Soft Core Processor”, ICEMIS2017. [6] Trivedi, M. A. Hasamnis," Development of PlatformUsing NIOS II Soft Core Processor for Image Encryption and Decryption Using AES Algorithm",IEEE ICCSP conference, 2015. [7] M. P. Leongl, S. Z. M. Naziril, S. Y. Pemgl, "Image Encryption Design usingFPGA",International Conferenceon Electrical, Electronics and System Engineering ,2013. [8] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, "A Modified AES Based Algorithm for Image Encryption",International Journal of Computer,Electrical, Automation, Control and Information Engineering Vol:1, No:3, 2007. [9] Melchor, Carlos Aguilar, et al. "Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}." IACR Cryptology ePrint Archive 2011 (2011): 607. [10]Vaidehi, E. "Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs)." California State University, East Bay Hayward, CA, USA. (2007). [11]Xidan Song, Yulin Wang, "Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption," in IEEE International Conference on Computer and Communication (ICCC ), Chengdu , China, 2017. [12]Abdellah EZZATI, Khalid EL MAKKAOUI , Abderrahim BENI HSSANE, "Homomorphic Encryption as a Solution of Trust Issues in Cloud," in International Conference on Big Data, Cloud and Applications, Tetuan, Morocco, 2015.