Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
The Security Evaluation of an Efficient Lightweight AES Accelerator
Previous Article in Journal
Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance

1
Mathematics, Computer Science and Applications TEAM, Abdelmalek Essaâdi University, ENSA, Tangier 90000, Morocco
2
Department of Mathematics, Normandie University, UNICAEN, CNRS, LMNO, 14000 Caen, France
*
Author to whom correspondence should be addressed.
Cryptography 2024, 8(2), 23; https://doi.org/10.3390/cryptography8020023
Submission received: 30 March 2024 / Revised: 23 May 2024 / Accepted: 30 May 2024 / Published: 2 June 2024
Figure 1
<p>A comprehensive overview of the proposed scheme.</p> ">
Figure 2
<p>Plaintext message encoding.</p> ">
Figure 3
<p>Message mapping process.</p> ">
Figure 4
<p>Tag generation procedure.</p> ">
Figure 5
<p>Mapping point encryption using ElGamal-v2.</p> ">
Figure 6
<p>Decryption and integrity verification process.</p> ">
Figure 7
<p>Point-reverse mapping.</p> ">
Figure 8
<p>Plaintext message decoding.</p> ">
Figure 9
<p>Algorithm performance analysis for secp192r1.</p> ">
Figure 10
<p>Algorithm performance analysis for secp256r1.</p> ">
Figure 11
<p>Algorithm performance analysis for secp384r1.</p> ">
Figure 12
<p>Algorithm performance analysis for secp521r1.</p> ">
Figure 13
<p>Algorithm performance analysis: running time vs. plaintext size for secp192r1.</p> ">
Figure 14
<p>Algorithm performance analysis: running time vs. plaintext size for secp256r1.</p> ">
Figure 15
<p>Algorithm performance analysis: running time vs. plaintext size for secp384r1.</p> ">
Figure 16
<p>Algorithm performance analysis: running time vs. plaintext size for secp521r1.</p> ">
Figure 17
<p>Mapping change rate from a single-bit key alteration.</p> ">
Figure 18
<p>Ciphertext change rate from a single-bit key alteration.</p> ">
Figure 19
<p>Bit changing rate under plaintext bit alteration.</p> ">
Figure 20
<p>Mapping points scatter.</p> ">
Figure 21
<p>Ciphertext points scatter.</p> ">
Figure 22
<p>Rejected sequences and max rejections in NIST statistical tests.</p> ">
Figure 23
<p>Replay attack against healthcare provider.</p> ">
Versions Notes

Abstract

:
To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The intricacies of this process can greatly affect the overall security and efficiency of the cryptosystem, reflecting security vulnerabilities observed in many existing schemes that utilize ElGamal ECC-based encryption. In this paper, we introduce an innovative hash-based technique for securely embedding messages into EC points before encryption. A random parameter and a shared secret point generated through the EC Diffie–Hellman protocol are used to bolster the scheme’s security. The security of the proposed method is evaluated against various attack models; moreover, the complexity, and sensitivity of the encryption scheme, as well as its inputs, are analyzed. The randomness assessment of the ciphertext was performed using the NIST statistical test suite. Additionally, we propose a mechanism to ensure the integrity of the message by securely appending a tag to the ciphertext. As a consequence, a comprehensive analysis of our scheme demonstrates its effectiveness in maintaining data security and integrity against various attack models. The algorithm also meets more criteria such as the strict avalanche criterion, linear complexity, and operability.

1. Introduction

During the first half of 2023, SonicWall Capture Labs reported a 37% year-to-date increase in IoT malware attacks, reaching 77.9 million, as per the SonicWall 2023 report [1]. IBM’s 2023 report highlighted an average data breach cost of USD 3.78 million across sectors, with critical infrastructure incurring an additional USD 1.26 million [2]. These alarming figures emphasize the urgent need to secure sensitive data. Asymmetric cryptographic approaches, particularly elliptic curve cryptography (ECC), play a pivotal role in balancing heightened security with manageable complexity. They also help address the computational demands associated with their impact on battery-powered IoT devices [3].
Within the realm of cryptography, ECC is highly versatile, excelling in key exchange through the elliptic curve Diffie–Hellman protocol (ECDHP), which enables entities to securely establish a shared secret. ECC is widely used in digital signatures via the elliptic curve digital signature algorithm (ECDSA) protocol, ensuring the integrity of transmitted data. For encryption, numerous recent research papers have introduced innovative ECC encryption schemes, often building on foundational methods such as ElGamal ECC-based encryption [4] and the elliptic curve integrated encryption scheme (ECIES) [5]. The latter operates as a hybrid system, utilizing ECC to generate a shared key through ECDHP and, subsequently, encrypt the message using a symmetric encryption scheme. This makes it efficient in terms of computational complexity while facing certain drawbacks highlighted in [6,7].
In this paper, we use ElGamal ECC-based encryption as the foundation for introducing an enhanced version. However, a significant challenge arises during the process of mapping messages into elliptic curve (EC) points. If not carefully addressed, this challenge can compromise the overall security and the efficiency of the cryptosystem. Existing schemes utilizing ElGamal ECC-based encryption have notably revealed vulnerabilities in this context, as evidenced by a flaw observed when encrypting the same block several times within a single encryption process, as discussed in [8]. Such a flaw could potentially lead to a successful chosen-plaintext attack (CPA) and secret key leakage. This underscores the pressing need for innovative solutions to fortify the resilience of the system against such vulnerabilities.
In this paper, we introduce a novel hash-based technique designed to securely embed messages into EC points before encryption, addressing the aforementioned challenge. To augment the security infrastructure, the incorporation of a random parameter and a shared secret point generated through the ECDHP is proposed, in a manner that prevents unauthorized entities from conducting the message mapping process, distinguishing it from all existing message mapping algorithms. The choice of ECDH and ElGamal encryption, coupled with our proposed mapping method, is motivated by their well-established security features, computational efficiency, and adherence to established cryptographic standards. This combination ensures robust data protection within our proposed cryptosystem, as recommended in [9] and highlighted in [10]. Our approach undergoes rigorous evaluation against various attack models, with a comprehensive analysis covering the complexity and sensitivity of the encryption scheme and its inputs. The randomness assessment of the ciphertext is conducted using the NIST statistical test suite [11], ensuring a robust measure of unpredictability. Additionally, we put forth a mechanism aimed at ensuring the integrity of transmitted messages. This involves combining the message mapping scheme and a hash function to generate a tag, which is then securely appended to the ciphertext, enhancing the overall reliability of the communication process.
The findings of our study demonstrate the effectiveness of the proposed scheme in preserving data security and integrity across various attack models. Notably, it provides security against chosen-ciphertext attacks (CCAs), chosen-plaintext attacks (CPAs), malleability, and replay attacks (RAs), as emphasized in Section 5.2. Moreover, the algorithm successfully meets the strict avalanche criterion, showcasing a remarkable change tolerance of 50% even with minor input variations. We have meticulously verified the linear complexity and the operational robustness of the algorithm, reinforcing its standing as a good solution in the realm of ECC-based encryption.
The rest of this paper is organized as follows. In Section 2, we review existing literature, introduce relevant materials, and discuss related works. In Section 3, we propose the new method. In Section 4, we study the performance of the new method. In Section 5, we analyze its security and sensitivity assessment. We provide a step-by-step example of the implementation in Section 6. We conclude the paper in Section 7.

2. Background and Literature Review

In this section, we delve into definitions and key protocols of elliptic curve cryptography, specifically exploring the elliptic curve cryptography over prime fields, elliptic curve Diffie–Hellman protocol, and ElGamal ECC-based encryption. Additionally, we investigate essential guidelines for secure message mapping. Finally, we highlight related works that contribute to shaping our understanding of advancements in ECC encryption, with a specific focus on schemes utilizing ElGamal encryption. Throughout the remainder of this paper, we denote the sender as (s) and the receiver as (r), which represent two communicating parties.

2.1. Elliptic Curve over Prime Fields

Let p > 3 be a prime number, and F p be the prime field of p elements. An elliptic curve E over F p is the set of points ( x , y ) that satisfy the Weierstrass equation [12]:
y 2 x 3 + a x + b ( mod p ) ,
where a , b F p with 4 a 3 + 27 b 2 0 ( mod p ) . Let E ( F p ) denote the following set:
E ( F p ) = ( x , y ) | y 2 x 3 + a x + b ( mod p ) O ,
where O represents the point at infinity. A group structure can be defined over the set E ( F p ) together with the addition law described below.
Let P 1 = x 1 , y 1 and P 2 = x 2 , y 2 be two points of E F p . The addition is defined by the following:
P 1 + P 2 = O if P 1 = P 2 P 3 if P 1 P 2
Algebraically, the coordinates of P 2 are x 2 , y 2 , and P 3 = x 3 , y 3 is defined by the following:
x 3 λ 2 x 1 x 2 ( mod p ) y 3 ( x 1 x 3 ) λ y 1 ( mod p ) ,
with
λ y 2 y 1 x 2 x 1 1 ( mod p ) if P 1 P 2 3 x 1 2 + a 2 y 1 1 ( mod p ) if P 1 = P 2
A scalar multiplication of an integer k and a point P E ( F p ) yields another point Q E ( F p ) defined by
Q = k P = P + P + + P k t i m e s .
The elliptic curve discrete logarithm problem (ECDLP) involves finding the integer k N , such that Q = k P , given points Q and P on the curve. Additionally, # P denotes the order of the point P, which is the smallest positive integer n, such that n P = O .

2.2. Elliptic Curve Diffie–Hellman Protocol

The elliptic curve Diffie–Hellman (ECDH) protocol is a key exchange scheme that enables two communicating parties to establish a shared secret point over an open and insecure channel. Its security is based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP). The protocol operates as follows.
Let G be a generator point of E ( F p ) . To agree on a secret point, the sender (s) and receiver (r) randomly select their private keys in [ 1 , , # G ] , denoted as u s and u r , and then proceed as described in Algorithm 1.
Algorithm 1 Elliptic curve Diffie–Hellman algorithm
Require: 
Generator point G of E ( F p ) , private key u s of (s), and private key u r of (r).
Ensure: 
The shared key K s h .
  1:
(s) and (r) compute and exchange their public keys P s = u s G and P r = u r G .
  2:
(s) computes the point K s h = u s P r in E ( F p ) .
  3:
(r) computes the point K s h = u r P s in E ( F p ) .
  4:
return the shared key K s h .

2.3. Elliptic Curve Analogue of ElGamal Encryption

In ElGamal ECC-based encryption [4], the receiver first publishes his public key P r = u r G , where G is a generator of E ( F p ) and u r [ 1 , , # G ] . To encrypt and send a message, m, to ( r ) , the sender (s) starts by encoding it into B blocks. Subsequently, these blocks are mapped into corresponding points ( P m i ) 1 i B in the elliptic curve E ( F p ) . The sender then proceeds with the following steps to encrypt each point P m i .
  • Generate a random ephemeral key k i .
  • Compute C i , 1 = k i G and C i , 2 = P m i + k i P r .
  • Transmit the encrypted ciphertext pairs ( C i , 1 , C i , 2 ) to the receiver.
In various research papers, ElGamal ECC encryption is often structured to use identical ephemeral keys, denoted as k 1 = k 2 = = k B , aiming to mitigate the computational overhead associated with point multiplications, specifically k i G and k i P r computations. Throughout the remainder of this paper, we will distinguish between two variants of ElGamal ECC encryption. The first variant, denoted as ElGamal-v1, involves using pairwise distinct values for ( k i ) , 1 i B . The second variant, labeled as ElGamal-v2, employs equal values for ( k i ) , 1 i B across all blocks. The benefits of ElGamal-v2 are obvious in its reduced need for both point multiplications and additions, resulting in lower throughput compared to ElGamal-v1, as illustrated in Table 1. Nevertheless, inadequately implemented message mapping in ElGamal-v2 could expose vulnerabilities to various attacks, including CPA and CCA.

2.4. Ground Rules of a Valid Message Mapping

As previously illustrated, a mapping process can compromise the overall encryption system’s security if not implemented correctly. Here are some ground rules for mapping plaintexts to elliptic curve points. A plaintext message, M, to be mapped to an elliptic curve, E ( F p ) , is first subdivided into blocks and converted to an integer in F p ; finally, each block, m, is mapped to a point, P m E ( F p ) , using a mapping application, as follows:
f : F p E ( F p )
satisfying the following properties [13]
Ensuring the operationality: The sender can map a block, m, of the message to a point P m = f ( m ) E ( F p ) , and the receiver can reverse the message mapping process to retrieve m = f 1 ( P m ) .
Key dependency: Incorporates shared secret keys into the mapping process to make it key-dependent. This enhances security and prevents unauthorized parties from mapping plaintexts to curve points.
Randomization: Introduce an element of randomness into the mapping process to prevent attackers from predicting the mapping for specific plaintexts, namely, systems with small plaintext spaces. This can be achieved by using a random value or salt in the mapping.
Resistance to attacks: The mapping process should be designed to resist cryptographic attacks, such as chosen-plaintext attacks (CPA) and chosen-ciphertext attacks (CCAs), and should not mount a weakness that could be exploited by the statistical attack against ciphertext.
Bandwidth usage: Well-designed message mapping must depress the bandwidth utilization. For example, if each character of a message is mapped separately to a point on the curve, then the encryption will produce a large amount of data when compared with another mapping scheme that embeds a block of the message.
Complexity: Sometimes, there may be trade-offs between complexity and efficiency. More complex mapping processes may provide stronger security but require more computational resources, and, therefore, more power consumption.

2.5. Related Work

The following algorithms elucidate various techniques for embedding an integer, m, into a point, P m , on an elliptic curve, E ( F p ) .
In [4,14], Koblitz proposes a method that starts by choosing a base parameter, k, such that ( m + 1 ) k < p . It defines x = m k + j , where j = 0 , 1 , , until finding an integer, y, so that ( x , y ) fulfills Equation (1). The probability of failure of this method is around ( 1 / 2 k ) .
In [15], Srinath and Chandrasekaran propose a method where the likelihood of finding a mapping point is increased by verifying if x 3 a x + b is a quadratic residue modulo p. To retrieve m from the point P m = ( x , y ) , the receiver calculates m = x / k , the greatest integer less than or equal to x / k . An adapted version of Koblitz’s method for binary finite fields is discussed in [16].
In [17], Boneh and Franklin propose a method to encode elements into an elliptic curve via the Weierstrass equation y 2 x 3 + b ( mod q ) with q = p n , and p 2 ( mod 3 ) . An element u F q is mapped to u 2 b 2 q 1 3 , u .
In [18], Icart presents a method to encode elements into elliptic curves with short equations y 2 x 3 + a x + b ( mod p ) with p 2 ( mod 3 ) . An element u F p is mapped to ( x , y )  with the following:
x = v 2 b 1 27 u 6 2 p 1 3 + 1 3 u 2 , y = u x + v , v = 3 a u 4 6 u .
In [19], Vigila et al. introduce a method to encode each character into a distinct point. In this approach, communicating parties agree on a random point P m E ( F p ) . To communicate using this setting, the sender multiplies the ASCII value corresponding to each character by the point P m and encrypts the resulting points using ElGamal-v1. After decryption, the receiver solves the ECDLP to retrieve the ASCII values and reconstructs the original message by converting ASCII values back to characters. This procedure demands substantial resources in terms of power and computation.
In [20,21], the communicating parties agree on a table where each character is associated with a distinct point on the curve. Utilizing this table, the sender encrypts points that correspond to message characters. Once the receiver decrypts the cipher, they can retrieve the original message using the same table. Although [21] employs ElGamal-v1, and [20] utilizes a modified version of ElGamal-v1, both approaches exhibit high complexity and bandwidth usage.
To map a message with n characters, the approach suggested in [22] starts by selecting a generator point, G. Subsequently, each character is associated with the point α G , where α corresponds to the alphabetic order of the character. These points are then organized into a matrix Q with dimensions of 3 × ( n + q ) 3 , filling the remaining q = n ( mod 3 ) positions with points corresponding to white space. Additionally, the matrix Q is multiplied by a public 3 × 3 non-singular matrix A. The resulting matrix A Q contains the message mapping points, which will be encrypted later using ElGamal-v2. An implementation of this method is provided in [23].
The mapping algorithm proposed in [13] begins by converting each character of a message block into an 8-bit representation of its corresponding ASCII code. These representations are then concatenated to form a binary string m, which is padded with a fixed number, N, of zeros. The resulting binary string is then converted into an integer, x. Subsequently, x is incremented by one until finding an integer y, such that ( x , y ) forms a mapping point of the message block. This method is analogous to Koblitz’s message mapping approach with base parameters k = 2 N and x = m k + j , where m represents the decimal form of m.
The upcoming schemes introduce recent ECC-based encryption techniques designed to enhance data security in IoT-based devices. These schemes incorporate some of the aforementioned message-mapping algorithms.
In [24], Almajed and Almogren introduce an authenticated encryption scheme based on elliptic curve cryptography. In this scheme, the bit string of the first message block is XORed with an initial vector (IV) to yield block B 0 . For i { 1 , , N u m b e r O f B l o c k s } , B i is the result of XORing the bit string of the message block number, i, with B i 1 . Each block, B i , is then padded with 3 bits and mapped to a point on an elliptic curve. An enhanced version of this work is proposed in [8], where each block, B i , is the result of XORing the bit string of the message block number i with the x-coordinate of B i 1 , the corresponding mapping point. The base parameter used in Koblitz’s method during message mapping is k = 16 .
In [25], the authors propose a clustering-based approach that employs fuzzy C-means and enhanced ECC-ElGamal encryption for secure data transmission in wireless sensor networks. The authors employ Koblitz’s method to encode messages onto a curve point. However, the paper addresses certain security threats while leaving others unexplored, such as malleability, CCA, and replay attacks.
In [26,27], Reegan and Kabila propose two approaches to integrate DNA sequences for encoding and decoding messages, employing Koblitz’s method for mapping messages to curve points and ElGamal-v2 for encryption. While the concept of utilizing random DNA sequences for data encryption is intriguing, its current implementation is neither cost-effective nor practical for most applications. Additionally, both methods fall short of explaining the specific process by which communicating parties reach a consensus on the DNA sequences used during encoding.
In [28], Das and Namasudra propose a novel encryption scheme that utilizes ECC, AES, and Serpent to secure healthcare data in IoT-based healthcare systems. ECC is employed to encrypt a timestamp ( T S ) using ElGamal ECC-based encryption, but the authors do not clarify the mapping of T S to a point, which can harm the overall security of the system.
Most of the related work schemes are classified as static message mapping schemes [4,13,14]: This occurs when each message character or message block is consistently mapped to the same point under the same public parameter (base parameter k, ASCII code, alphabetic order, etc.). These methods are insecure against CPA and CCA when used with ElGamal-v2, as we will demonstrate in Section 5.2. Notably, those that map each character to a point are also vulnerable to frequency analysis attacks. However, these security flaws can be addressed if the mapping is coupled with ElGamal-v1 [19,20,21], although there will be trade-offs in terms of security and computational overhead. An alternative mapping approach has emerged in recent schemes that integrate ElGamal-v2 and employ methods such as initial vector (IV) [8,24] or matrix multiplication [22] for mapping. These approaches establish a one-to-many relationship between a message character or block and elliptic curve points, allowing the message to be mapped to different points for each mapping attempt. Nevertheless, an adversary can still map messages of their choice, except in the case of schemes incorporating random DNA sequences [26,27], which face challenges related to DNA sequence agreements and their associated limitations.

3. The Proposed Scheme

In this section, we present an enhanced version of the ECC-based encryption outlined in [29]. First, we consider an elliptic curve E ( F p ) defined by the Weierstrass equation, Equation (1), over the prime field F p , where G represents its base point. In Table 2, we provide a comprehensive overview of various parameters that will be used throughout the remainder of this paper.
In modular arithmetic, lines and curves serve as abstract representations used to describe mathematical relationships or sequences within the modular space, as opposed to the tangible geometric lines in Euclidean geometry. Nevertheless, the intersection of lines with the elliptic curve in modular space, starting from a shared secret point, forms the foundation of our proposed message mapping method. To delineate the entire system, this section is structured into six primary phases. These include key generation, tasked with creating the necessary keys for subsequent phases; message encoding, involving the conversion of messages into integer blocks represented as elements of F p ; message mapping onto elliptic curve points; tag generation and encryption of the mapped points; decryption of the cipher points and tag verification; the reversal of the message mapping; and finally, integer values decoding to restore the original message. A comprehensive overview of the proposed scheme is depicted in Figure 1.

3.1. Key Generation

Key generation is a vital step in establishing secure communication, serving as a cornerstone of modern cryptography. Algorithm 2 illustrates the key generation process using ECC. In this context, the user (s) independently selects a private key and calculates his public key using that private key, while the user (r) does likewise. In the upcoming sections, we will elaborate on how users (s) and (r) use their private and public keys, as well as the parameter C o u n t e r , for secure communication.
Algorithm 2 Key Generation
Require: 
An elliptic curve E ( F p ) , and a generator G.
Ensure: 
Two private keys, a shared key, and a Counter.
  1:
Users (s) and (r) initialize C o u n t e r = 0
  2:
User (s) chooses a random private key u s
  3:
User (s) calculates the public key P s = u s G
  4:
User (r) chooses a random private key u r
  5:
User (r) calculates the public key P r = u r G
  6:
Publish the resulting points P s and P r
  7:
Both users (s) and (r) use their private key and ECDHP to compute a shared key K s h = ( x s , y s ) as described in Algorithm 1
  8:
Each user stores his private key, the point K s h and C o u n t e r = 0

3.2. Message Encoding

In [29], the plaintext M is converted to the integer value i = 1 l M ASCII M [ i ] · 256 i 1 , where ASCII M [ i ] represents the ASCII value of the i-th character of plaintext M. Then, the resulting integer is subdivided into blocks of l p 3 digits, and each block is mapped to a point on the curve. This process increases the conversion time due to the exponentiation calculations, particularly for larger message sizes. To avoid this issue within this paper, we segment the plaintext into blocks of size q = ( l p 2 ) / log ( 256 ) prior to encoding, this yields l M q + ϵ blocks, where ϵ is defined as follows:
ϵ = 0 , if   q   divides   l M , 1 , e l s e .
Furthermore, for each encryption attempt, the sender (s) randomly selects an ephemeral key (k), ensuring that k is less than the order of the base point, G. The sender then computes and publicly discloses the value of k G , and subsequently computes and stores the session key k P r = ( x k , y k ) for further usage.
Afterward, the plaintext message blocks are converted into ( m i ) 1 i B integers in F p , and then encoded into the integer sequences ( m i ) 1 i B using H ( C o u n t e r ) ( x k ) as the outcome of the nested composition of the hash function H applied to the input x k and each integer index. Note that ( m i ) 1 i B are pairwise-distinct, even if i j exists, such that m i = m j . Figure 2 illustrates the different steps to encode a plaintext message.

3.3. Message Mapping

Message mapping is a necessary process during ElGamal ECC-based encryption, as ECC arithmetic operates solely on points along the curve. It associates the arbitrary plaintext to some points called mapping points, accomplished by mapping either an individual character or an entire plaintext block to a single point. The proposed message mapping Algorithm 3 involves padding each encoded block, m i , on both its left and right sides with ‘1’ and ‘0’, respectively. This modified block is subsequently mapped to a point P m i = ( x m i , y m i ) , which satisfies the following system of equations:
y 2 x 3 + a x + b ( mod p ) , y S i x + m i ( mod p ) , and P m i ± K s h
where S i = ( y s m i ) x s 1 ( mod p ) represents the slope of the line passing through the shared secret point K s h = ( x s , y s ) . Furthermore, during the encoding phase, the incorporation of the hash value H ( C o u n t e r ) ( x k ) is integral. Here, x k serves as the random source for the proposed message mapping scheme. However, the apparent randomness observed is only from the adversary’s viewpoint. This arises due to x k being derived as the x-coordinate resulting from the scalar multiplication of the receiver’s public key, P r , and a randomly chosen positive integer, k < # G . The scheme can be executed multiple times, altering both the most significant and least significant digits of m i . In each iteration, the problem is redefined when seeking a solution (Figure 3).
The task of solving System (7) is addressed by substituting its first equation into the second, resulting in Equation (8)
x 3 S i 2 x 2 + ( a 2 S m i ) x + b m i 2 = 0 ( mod p ) .
Since the x-coordinate x s of K s h is a solution to Equation (8), the problem reduces to the following quadratic equation:
x 2 + ( x s S i 2 ) x + ( x s 2 S i 2 x s + a 2 S i m i ) = 0 ( mod p ) .
For the same reason, we have the following:
( x s 2 S i 2 x s + a 2 S i m i ) = x s 1 ( x s 3 S i 2 x s 2 + a x s 2 S i x s m i ) ( mod p ) = x s 1 ( x s 3 + a x s ( S i x s + m i ) 2 + m i 2 ) ( mod p ) = x s 1 ( y s 2 b y s 2 + m i 2 ) ( mod p ) = x s 1 ( b + m i 2 ) ( mod p ) .
Hence, solving System (7) is equivalent to solving the following equation:
x 2 + ( x s S i 2 ) x + x s 1 ( b + m i 2 ) = 0 ( mod p ) .
in F p { x s } . According to [30], such equations can be efficiently solved over the prime field F p using the algorithm proposed by Berlekamp [31], which has a complexity of O ( 4 log ( p ) ) . However, this equation can be deterministically solved by applying the same relations commonly used to solve second-degree polynomial equations in the real numbers field, while preserving the requirement of the prime field F p .
Algorithm 3 Message mapping algorithm
Require: 
An elliptic curve E ( F p ) , the shared key K s h = ( x s , y s ) , and an integer block m i .
Ensure: 
The mapping point P m i = ( x m i , y m i )
  1:
Pad m i on the left with ‘1’ and on the right with ‘0’
  2:
for all  ( l , r ) { 0 , , 9 } 2 and l 0  do
  3:
    m i Integer m i with left digit equals l and right digit equals r
  4:
    S i ( y s m i ) x s 1 ( mod p )
  5:
   if System (7) has a solution P m i = ( x m i , y m i ) , then
  6:
    return  P m i = ( x m i , y m i )
  7:
   end if
  8:
end for

3.4. Encryption

The proposed encryption Algorithm 4 is a variant of ElGamal ECC-based encryption. It plays a crucial role in guaranteeing the confidentiality and integrity of messages during their transmission. In the realm of cryptographic communication, ensuring the security of messages against interception and tampering attacks is of paramount importance. To achieve this, we introduce a tag denoted as C m * , which is appended to the ciphertext. This tag acts as a safeguard, preserving the integrity of the transmitted data. The process of generating the C m * tag involves a series of intricate steps. Starting with the computation of m * , which involves various parameters, including the coordinates of the message’s mapping points, the sender’s I D s , and C o u n t e r ; this value is then encoded into a mapping point represented as P m * . Figure 4 depicts more details about the tag creation. Furthermore, this algorithm addresses the encryption of the mapping point associated with each message block, as shown in Figure 5. In the upcoming security analysis section, we will delve into a comprehensive examination of how these enhancements bolster security and safeguard against vulnerabilities.
Algorithm 4 Proposed encryption scheme
Require: 
k P r = ( x k , y k ) , ( P m i ) 1 i B , I D s , C o u n t e r
  1:
Initialize m *
  2:
C o u n t e r C o u n t e r + 1
  3:
Compute m * H ( x k y k | x m 1 y m 1 | | x m B y m B | I D s | C o u n t e r )
  4:
Encode leftmost bits of m * into a mapping point P m *
  5:
Encrypt P m * as C m * P m * + k P r
  6:
for i in { 1 , 2 , , B }  do
  7:
   Encrypt mapping point P m i as C m i P m i + k P r
  8:
end for
  9:
return Ciphertext C = { k G , ( C m i ) 1 i B , I D s , C m * }

3.5. Decryption

The decryption is described in Algorithm 5. It is a pivotal component of the proposed cryptosystem, as it handles data transmitted through an untrusted communication channel. Its primary objective is to ensure the integrity of the received ciphertext. To achieve this, the algorithm performs ElGamal ECC-based decryption to recover the mapping points ( P m i ) 1 i B . Subsequently, it computes C m ˜ * and compares the result with the received tag C m * while updating the C o u n t e r value to match the sender’s C o u n t e r . If the tag verification is successful, the algorithm accepts the mapping points ( P m i ) 1 i B . Otherwise, it rejects the ciphertext and returns ⊥, as shown in Figure 6. In our security analysis section, we will explore how this process enhances the system’s resilience against various attacks.

3.6. Reverse Mapping and Decoding Process

The reverse mapping Algorithm 6 serves as a critical component within the proposed cryptosystem. Its primary function is to reverse the mapping process applied during encryption, thereby facilitating the recovery of the original message. Through this essential process, the algorithm ensures the integrity of the transmitted data. To achieve its goal, the algorithm operates iteratively for each i = 1 , 2 , , B , where the receiver calculates the slope, S i , of the line passing through the points K s h and P m i . Subsequently, he retrieves m i as the y-intercept of this line, excluding the first and last digits. Figure 7 summarizes the complete procedure. The resultant number sequence ( m i ) 1 i B undergoes a decoding transformation. For each index i = B , B 1 , , 2 ; we define the integer m i as the result of the bitwise exclusive OR (XOR) operation between m i , i, and m i 1 . Additionally, for i = 1 , m 1 is defined as the bitwise XOR between m 1 , 1, and H ( C o u n t e r ) ( x k ) , where x k is the x-coordinate of the session key k P r . The next step involves converting the resulting integers into text format. This is achieved by dividing the binary representation of each integer m i into 8-bit blocks, which are then decoded using the ASCII table to obtain characters corresponding to their respective integer values. Finally, these text components are concatenated to reconstruct the original plaintext message M. Figure 8 illustrates how the integer sequence ( m i ) 1 i B resulting from reverse mapping is decoded to the original plaintext message.
Algorithm 5 Decryption algorithm
Require: 
Ciphertext C = { k G , ( C m i ) 1 i B , I D s , C m * } , Private Key u r , C o u n t e r .
Ensure: 
( P m i ) 1 i B or reject.
  1:
Initialize m ˜ *
  2:
C o u n t e r C o u n t e r + 1
  3:
Compute u r k G = k P r = ( x k , y k )
  4:
for i in { 1 , 2 , , B }  do
  5:
   Calculate P m i = C m i + ( k P r )
  6:
end for
  7:
Compute m ˜ * = H ( x k y k | x m 1 y m 1 | | x m B y m B | I D s | C o u n t e r )
  8:
Encode leftmost bits of m ˜ * into a mapping point P m ˜ *
  9:
Encrypt P m ˜ * as C m ˜ * = P m ˜ * + k P r
10:
if  C m ˜ * = C m *  then
11:
   return  ( P m i ) 1 i B , and proceed to reverse mapping process.
12:
else
13:
    C o u n t e r C o u n t e r 1
14:
   return ⊥ and reject the ciphertext
15:
end if
Algorithm 6 Reverse mapping and decoding
Require: 
Mapping Points ( P m i ) 1 i B , K s h , k P r = ( x k , y k ) , p, C o u n t e r .
Ensure: 
Original Plaintext M.
  1:
Initialize M as an empty string.
  2:
Initialize I n t B l o c k s to an empty set of block integers.
  3:
for i from 1 to B do
  4:
   Compute S i ( y s y m i ) ( x s x m i ) 1 ( mod p ) .
  5:
   Compute m i ( y m i S i x m i ) ( mod p ) (Remove first and last digits).
  6:
   Append the resulting m i to I n t B l o c k s .
  7:
end for
  8:
m 0 H ( C o u n t e r ) ( x k ) .
  9:
for i from 0 to B 1  do
10:
    j B i .
11:
    m j I n t B l o c k s [ j ] .
12:
    m j = m j j m j 1 .
13:
   Convert m j to text.
14:
   Concatenate the resulting text to the left of M.
15:
end for
16:
return M.

4. Performance Evaluation

In this section, we present an assessment study for the proposed scheme and provide a comparison with some of the related methods. The experiments were conducted on a virtual machine hosted in an Intel Core i5-8350U processor running at 1.70 GHz, 1 GB of memory, and 2 processors.

4.1. Overlapping Problem

The proposed message mapping algorithm is a probabilistic method. Utilizing the secret key point K s h and the numerical value m i corresponding to a message block B i , the algorithm iterates in an attempt to identify an intersection point P m i between the line passing through the point K s h = ( x s , y s ) with a slope of S i = ( y s m i ) x s 1 . However, it is important to note that this method may fail to produce such a point. In this paragraph, we investigate the probability of success for the proposed message mapping scheme.
Embedding the integer m i into a point P m i E ( F p ) using Algorithm 3 is equivalent to finding a solution for the quadratic Equation (9)
x 2 + ( x s S i 2 ) x + x s 1 ( b + m i 2 ) 0 ( mod p ) .
This equation admits a solution if and only if its discriminant, Δ , is either zero or a quadratic residue. Consequently, the probability that Equation (8) has a solution is equal to the probability that Δ is either zero or a quadratic residue. Given that F p contains one zero and p 1 2 quadratic residues [32], we can ascertain that
P ( Δ is zero or a quadratic residue ) = p + 1 2 p .
Furthermore, the probability of Algorithm 3 succeeding in finding a mapping point for a message block in exactly k rounds is p k = p 1 2 p k 1 p + 1 2 p . Thus, the algorithm produces a mapping point through n rounds with a probability of
P n = k = 1 n p k = k = 1 n p 1 2 p k 1 p + 1 2 p = 1 p 1 2 p n .
However, due to the largeness of p, this can be effectively approximated as 1. Figure 9, Figure 10, Figure 11 and Figure 12 illustrate the empirical determination of the requisite number of rounds to successfully map 1000 randomly selected message blocks throughout various NIST elliptic curves. The results indicate that our proposed method effectively accomplishes the mapping of 50% of blocks within the initial rounds, achieving complete mapping (100%) in 8 rounds over the majority of cases. These findings align efficiently with theoretical predictions, affirming that Algorithm 3 exhibits a probability ( P 1 ) exceeding 1 2 to map a block within one round and a probability ( P 8 ) exceeding 0.9961 to map a block within 8 rounds. Nevertheless, as illustrated in Figure 11, the algorithm may necessitate additional rounds. Consequently, each encoded block undergoes padding with one digit from ‘1’ to ‘9’ on the left and another digit from ‘0’ to ‘9’ on the right until a mapping point is identified. As a result, the algorithm is designed to allow a maximum of 90 mapping rounds per block, thereby ensuring its correctness with a high degree of confidence ( P 90 1 ).

4.2. Complexity Analysis

The complexity of the overall encryption algorithm is influenced by the number of rounds needed to map message blocks onto a given elliptic curve. To assess this, the probability distribution of our proposed mapping algorithm allows us to determine the average number of rounds required to map a message block. Taking into consideration that p is a large prime number, this calculation is represented as follows:
μ = k = 1 + k p k = k = 1 + k p 1 2 p k 1 p + 1 2 p = 2 p p + 1 2 .
In parallel, a statistical test is conducted by generating a random plaintext with a size of 10 KB. Subsequently, this plaintext is encrypted using various NIST elliptic curves, and the number of rounds required to map the message onto each curve is measured. The testing phase is carried out using the proposed methods and algorithms outlined in [16,24]. The results, as presented in Table 3, illustrate that the moderate number of rounds needed for each block is approximately 2, closely aligning with the theoretical result. Therefore, the computational complexity of the message mapping is O ( 2 B ) , which is equivalent to O ( n ) , where B = n / q + ϵ , for a message of size n characters and blocks of size q characters. Consequently, both the encryption and decryption processes have a complexity of O ( n ) , as they only require B-point addition operations. Hence, the running time growth of message mapping, encryption, decryption, and reverse mapping is linear versus the size of the plaintext.
Figure 13, Figure 14, Figure 15 and Figure 16 illustrate analyses of the running time of the proposed algorithm across various recommended NIST elliptic curves for different sizes of random plaintexts. It is important to note that the total encryption time comprises the time required for both message mapping and the encryption algorithm itself. Similarly, the total decryption time includes both reverse mapping and the decryption algorithm execution. The experimental findings align with the theoretical results, depicting timing graphs for all processes that exhibit a consistent linear increase with a low slope concerning plaintext size.

5. Sensitivity Assessment and Security Analysis

5.1. Sensitivity Assessment

5.1.1. Key Sensitivity Analysis

Key sensitivity describes how a ciphertext responds to small changes in the encryption key and reflects the impact of the key on the encryption procedure. If this influence is substantial, around 50%, it indicates that the encryption scheme is key-sensitive. Low sensitivity can make a system vulnerable to various attacks, such as differential attacks.
Throughout the analysis, we use the NIST elliptic curve spec256k1, and binary key spaces I i = { K i , j { 0 , 1 } 256 / j = 1 101 } are created, where K i , j is obtained by altering randomly one bit of the randomly chosen key K i , 1 , where all keys in I = 1 i 100 I i are pairwise distinct, and a random plaintext, m, is used. Then, we run the key sensitivity analysis on the following model:
C i = Enc ( m , I i ) , i = 1 100 ,
where C i is the set of ciphertexts obtained by encrypting a message, m, using a key in I i each time. Furthermore, we measure the rate of change by XORing the first cipher with all remaining ciphers in C i , then counting the number of bits equal to 1. Similar key sensitivity analyses were carried out for the mapping scheme. The findings are presented in Figure 17, Figure 18, and Table 4, showing that the proposed scheme fits the confusion property and the strict avalanche criterion [33], with an average change rate of 50 % and only slight deviations.

5.1.2. Plaintext Sensitivity Analysis

Plaintext sensitivity measures the rate of change in the ciphertext with respect to a slight bit alteration in the plaintext, while the encryption key stays unchanged. In this test, a random plaintext, m, with 26 characters is selected; we generate a sequence of plaintexts ( m i j ) 1 j 100 retrieved by altering the bit number i j of m each time, where i j is chosen randomly. The resulting data are encrypted with the same key, together with m. Then, we analyze the changes in mapping points and ciphertexts. Figure 19 displays the mapping and ciphertext change rate values, which fall within the interval [ 48 % , 52 % ] . These values accurately align with the principles of plaintext sensitivity. Moreover, the scatter plots of mapping points and cipher points show no correlation, as indicated in Figure 20 and Figure 21.

5.1.3. Statistical Analysis

The NIST Statistical Test Suite consists of statistical tests used to measure the randomness of data generated by a pseudo-random number generator (PRNG) or a cryptographic algorithm. To evaluate the randomness of data generated by the proposed encryption scheme, we encrypt random plaintexts and store the resulting ciphertexts as binary sequences in a file of size 20 MiB, and we set the significance level at α = 0.01 . The algorithm’s ciphertexts pass a test if the number of rejected sequences is less than or equal to n α + 3 α ( 1 α ) n , where n represents the number of tested sequences. The length of sequences being tested is initially set at 2000 bits but may vary based on specific testing requirements. In assessing the data randomness, we conducted NIST statistical tests, which generally yielded positive results. However, the serial test, as documented in Table 5, revealed an anomaly. As depicted in Figure 22, the remarkable consistency between the expected and observed counts of rejected sequences underscores the continued randomness of the ciphertext data from an eavesdropper’s perspective. This finding serves as evidence of the algorithm’s resilience against statistical attacks.

5.2. Security Analysis

5.2.1. Key Spacing Analysis and Brute Force

Due to the high computing abilities of modern computers, it is crucial to ensure that the key size is sufficiently large to be immune from any probable brute force attack. To withstand such an attack, the key spacing should be greater or equal to 2 100 [34]. As mentioned in [35], to process data and implement protection measures, NIST recommends using a minimum of 112-bit security strength until at least 2030, necessitating an elliptic curve with a base point order of 224 bits [36]. Even if we exclusively use keys greater than 2 224 , we still have 2 223 distinct secret keys, a significantly large number compared to the recommended range. This demonstrates that our proposed scheme satisfies key spacing requirements, thereby providing security against exhaustive search as a form of brute force attack.

5.2.2. Known Plaintext Attack (KPA)

In this attack, the adversary’s objective is to extract additional information by leveraging knowledge of some plaintext and ciphertext pairs. The proposed message mapping algorithm attaches n characters (elements of an extended ASCII table) to a single point on the curve and then encrypts the results. Hence, the likelihood of encountering an identical sequence of characters is 1 256 n . Furthermore, the use of a random key, k, and parameter, C o u n t e r , makes the algorithm produce different mapping points and ciphertexts for the same message. In addition, the mapping mechanism uses two secret points, K s h and k P r . Thus, the attacker cannot generate a mapping point for a known message, owing to the assumed hardness of the elliptic curve discrete logarithm problem (ECDLP). For these reasons, the known plaintext attack is infeasible.

5.2.3. Ciphertext-Only Attack (COA)

Selecting an elliptic curve, a base point, and a prime field is crucial to the security of the scheme. In the proposed method, we recommend implementing standardized elliptic curve parameters to ensure the intractability of ECDLP and to prevent brute force attacks due to the large key space. In addition to the high entropy observed in the generated ciphers, frequency attacks are not feasible, as discussed in the previous subsection. Hence, the proposed method is secure against such attack models.

5.2.4. Chosen-Plaintext Attack (CPA)

Ensuring security against a chosen-plaintext attack (CPA) is crucial for concealing information within ciphertexts, thus upholding the confidentiality of an encryption scheme. In this attack, the adversary, equipped with an encryption oracle, requests ciphertexts for chosen plaintexts to extract secret information or identify patterns. Advanced security definitions, such as IND-CPA (indistinguishability under chosen-plaintext attack), extend the CPA model to provide a more comprehensive evaluation of encryption system security against such attacks. In IND-CPA, the adversary not only requests ciphertexts for chosen plaintexts but is also challenged to guess which one among a pair of chosen plaintexts is encrypted by the challenger based on his/her request. More formally, the steps in the adversary and challenger indistinguishability game under CPA are as follows:
  • The challenger generates a key pair P u , S K with a security parameter k, shares the public key P u with the adversary, and keeps the private key S K .
  • The adversary requests ciphertexts for a polynomially bounded number of chosen plaintexts and/or performs other operations.
  • The adversary submits two distinct chosen plaintexts, M 0 and M 1 , with the same size.
  • The challenger selects a bit b { 0 , 1 } randomly, and sends the ciphertext C = E n c ( P u , M b ) back to the adversary.
  • The adversary can conduct any desired number of additional computations or encryptions.
  • In the end, the adversary outputs a conjecture for the value of b.
The advantage of the adversary, A, in winning the IND-CPA game against the encryption system Π = ( G e n , E n c , D e c ) is computed as A d v IND - CPA Π ( A , P u ) = | P ( A win the game ) P ( A lose the game ) | . The cryptosystem Π is considered IND-CPA secure if the adversary’s advantage is negligible, specifically expressed as
A d v IND - CPA Π ( A , P u ) = | ϵ ( k ) | ,
where ϵ ( k ) is a negligible function in the security parameter k.
Claim 1.
Let Π = ( G e n , E n c , D e c ) be an ECC-based encryption system, where the encryption scheme E n c uses ElGamal-v2, and a message mapping algorithm, denoted as M a p p , which operates independently of a secret key. Then Π is insecure under CPA.
Proof. 
In this proof, we start by showing that Π is not IND-CPA. Subsequently, we elucidate how this vulnerability facilitates the recovery of secret information. Finally, we conclude that Π is insecure under CPA.
Consider an adversary, A, who selects and transmits two plaintexts, M 0 and M 1 , of the same size to the challenger. For each i { 0 , 1 } , the encoding of M i results in two message blocks. Consequently, the challenger chooses a bit, b, randomly, and responds with the ciphertext, C b = E n c ( M b ) , containing two cipher points, C b , 0 and C b , 1 . These cipher points are computed as C b , i = P b , i + k P u , where k P u is the point multiplication of the public key, P u , by a random integer, k, and P b , 0 and P b , 1 represent the mapping points of the first and second message blocks, respectively. Since the mapping algorithm is key-independent, the adversary computes the message mapping point M a p p ( M 0 ) = { P 0 , 0 , P 0 , 1 } of plaintext M 0 . Subsequently, he/she computes V 0 = P 0 , 0 P 0 , 1 and V b = C b , 0 C b , 1 = ( P b , 0 + k P u ) ( P b , 1 + k P u ) = P b , 0 P b , 1 . Then, if V 0 = V b , the adversary guesses that b = 0 , else, b = 1 . Thus, A d v IND - CPA Π ( A , P u ) = 1 , proving that Π is not IND-CPA. Furthermore, suppose that the adversary found that b = 0 , they can compute k P u as C b , 0 P b , 0 and use it to decrypt or encrypt any messages of their choice. In conclusion, the Π is insecure under CPA. This attack holds true even when the encryption system processes character by character. □
Claim 2.
The proposed scheme Π p s = ( G e n p s , E n c p s , D e c p s ) is CPA secure, and any probabilistic polynomial-time adversary cannot win the IND-CPA game with a probability better than a random guessing.
Proof. 
The proposed scheme employs ElGamal-v2. The highlighted attack in the preceding proof is inapplicable due to the key-dependent nature of the mapping algorithm. Furthermore, by incorporating the shared secret point, K s h , and the parameters C o u n t e r (incremented after each successful encryption attempt) and a random key k to derive the point k P r = ( x k , y k ) , initiating the encoding process with m 1 = m 1 1 H ( C o u n t e r ) ( x k ) , and encoding the subsequent blocks in a manner that mirrors CBC behavior ( m i = m i i m i 1 for i = 2 , 3 , , B ), this guarantees the generation of distinct mapping points even when faced with identical message blocks. Consequently, different cipher points C m may arise for a message block m within the same encryption cycle or in a new cycle, introducing a non-one-to-one relationship between plaintext and ciphertext. Therefore, for any given plaintext M, it holds that E n c p s ( i ) ( M ) E n c p s ( j ) ( M ) , where E n c p s ( i ) and E n c p s ( j ) denote distinct encryption cycles within the proposed scheme. Furthermore, the encryption scheme E n c p s demonstrates a change rate of 50 % in response to minor alterations in either the plaintext or the key and produces random ciphertexts from the adversary’s perspective, as elaborated in Section 5.1. To be more precise, each bit of the ciphertext bears a 1 2 probability of modification with even slight changes in the key or the plaintext. In the IND-CPA game, an adversary’s strategy is no more effective than random guessing ( A d v IND - CPA Π p s ( A , P u ) = negligible ), and the security of the scheme is directly linked to the adversary’s ability to solve the ECDLP, making private key extraction or secret information from knowledge about pairs of chosen plaintexts infeasible. Therefore, the proposed scheme Π p s is IND-CPA and provides a high level of security against chosen-plaintext attacks. □
Based on Claim 1, it can be asserted that the ECC-based encryption schemes [4,13,14,22] are vulnerable to CPA. This vulnerability arises from the incorporation of ElGamal-v2 and a key-independent message mapping, resulting in the generation of identical ciphertexts for a given message across different encryption cycles. Attempts to mitigate this potential vulnerability, as proposed in [8,24] by using a new initial vector (IV) for each encryption cycle. However, it is suggested that this measure falls short, as adversaries could still leverage the received IVs along with the ciphertext to compute mapping points and execute the described attack outlined in the proof of Claim 1. Furthermore, the proposed scheme succeeds in achieving CPA security with a balanced complexity and bandwidth usage, unlike other related encryption schemes that achieve CPA security through the incorporation of ElGamal-v1, which demands substantial resources in terms of power, computation, and bandwidth.

5.2.5. Malleability

Malleability describes the capacity of an adversary to create a valid ciphertext from a given one, so it can be decrypted to a plaintext related to the original plaintext. In other words, let C m be the ciphertext corresponding to a plaintext, m, an attacker can create a new ciphertext, C, which can be decrypted to f ( m ) for a known function, f; such an encryption scheme is malleable [37].
In our proposed method (see Section 3.4), a ciphertext of a message, m, is of the form
C = { k G , ( C m i ) 1 i B , I D s , C m * } .
To exploit the malleability of such a cipher, an adversary has to add a chosen point, Q, to a cipher point C m i in a manner that the receiver decrypts the new cipher C m i ˜ = Q + P m + k P r , and obtains P m i ˜ = Q + P m instead of P m i . Once all mapping points are recovered by the receiver (r), verification is initiated through the computation of
m * ˜ = H ( x k y k | x m 1 y m 1 | | x m i ˜ y m i ˜ | | x m B y m B | I D s ) .
The receiver then computes and encrypts its corresponding mapping point P m * ˜ to C m * ˜ . The decryption is rejected if C m * ˜ C m * . Moreover, m * ˜ is sensitive to any changes in ciphertext parts, even a small change like the order of cipher points ( C m i ) 1 i B , which preserves the integrity of the message. From the previous reasons, we conclude that the proposed method is a non-malleable scheme.

5.2.6. Replay Attack (RA)

The replay attack is a significant security threat within the realm of cryptographic communication. In this type of attack, an adversary intercepts and then maliciously retransmits previously captured data or messages with the intention of deceiving the recipient system or gaining unauthorized access. In [38], the authors executed a replay attack against an implantable cardioverter-defibrillator (ICD) device, successfully compromising the safety and privacy of the simulated patient. Figure 23 illustrates a scenario involving a replay attack against a healthcare provider. In this scenario, the attack deceives a doctor by causing them to repeat a telemedicine action, even though the adversary is merely retransmitting an old ciphertext from the sender. This example highlights the real-world implications and risks associated with replay attacks in various contexts, including healthcare and beyond.
In the proposed scheme, a shared parameter named C o u n t e r starts at zero and is consistently incremented during both the encryption and the decryption, ensuring synchronization between the sender and receiver during communication. This mechanism prevents the reuse of the same C o u n t e r , which is included in the ciphertext’s tag C * , and as demonstrated in the malleability Section 5.2.5, this tag is not forgeable. Hence, the decryption oracle rejects all received ciphertexts with an outdated C o u n t e r and returns ⊥. Based on the preceding arguments, it can be concluded that the proposed scheme is secure against replay attacks (RAs).

5.2.7. Chosen-Ciphertext Attack (CCA)

In addition to ensuring security against CPA, it is crucial to consider security against chosen-ciphertext attacks (CCAs) to further strengthen the encryption system. In a CCA attack, the adversary gains access to the decryption oracle, allowing them to request the decryption of ciphertexts of their choice. This attack aims to exploit vulnerabilities in the decryption process and potentially reveal sensitive information. To evaluate the security of an encryption system against CCA, advanced security definitions like IND-CCA (indistinguishability under chosen-ciphertext attack) are employed. In IND-CCA, the adversary is not only allowed to request ciphertexts for chosen plaintexts but can also submit ciphertexts for decryption and observe the corresponding plaintexts. The goal is to make it computationally infeasible for the adversary to distinguish between two equal-length ciphertexts, one encrypted under a random key and the other either encrypted under the target key or chosen at random. In addition, the adversary engages in an IND-CCA game with the challenger under the following steps.
  • The challenger generates a key pair P u , S K with a security parameter k, shares the public key P u with the adversary, and keeps the private key S K .
  • The adversary requests ciphertexts for a polynomially bounded number of chosen plaintexts and/or performs other operations.
  • The adversary requests the decryption of a polynomially bounded number of chosen ciphertexts and/or performs other operations.
  • The adversary submits two distinct chosen ciphertexts, C 0 and C 1 .
  • The challenger selects a bit b 0 , 1 randomly, and sends the decryption M = D e c ( S K , C b ) back to the adversary.
  • The adversary can conduct any desired number of additional computations or encryptions.
  • In the end, the adversary outputs a conjecture for the value of b.
The advantage of the adversary, A, in winning the IND-CCA game against the cryptosystem Π = ( G e n , E n c , D e c ) is computed similarly to IND-CPA
A d v IND - CCA Π ( A , P u ) = | P ( A win the game ) P ( A lose the game ) | .
The cryptosystem Π is considered IND-CCA secure if the adversary’s advantage is negligible, expressed as A d v IND - CCA Π ( A , P u ) = | ϵ ( k ) | , where ϵ ( k ) is a negligible function in the security parameter, k. The combination of security against CPA and CCA ensures a robust and secure encryption system.
Claim 3.
Let Π = ( G e n , E n c , D e c ) be an ECC-based encryption system, where the encryption scheme E n c uses ElGamal-v2, and a message mapping algorithm, denoted as M a p p , which operates independently of a secret key. Then Π is insecure under CCA.
Proof. 
Similar to the proof of Claim 1, the adversary chooses and submits two ciphertexts, C 0 and C 1 , of the same size, ensuring that each ciphertext, C i , contains at least two cipher points, C i , 0 and C i , 1 , where i { 0 , 1 } .
Subsequently, the challenger randomly chooses a bit b { 0 , 1 } , decrypts M b = Dec ( C b , S K ) , and sends back the result to the adversary. To distinguish whether the challenger decrypted the ciphertext C 0 or C 1 , the adversary computes M a p p ( M b ) = { P b , 0 , P b , 1 } as the mapping points of M b and the following values:
V b = P b , 0 P b , 1 , V 0 = C 0 , 0 C 0 , 1 = ( P 0 , 0 + k P u ) ( P 0 , 1 + k P u ) = P 0 , 0 P 0 , 1 .
Then, if V b = V 0 , the adversary deduces that b = 0 , otherwise, they state that b = 1 . In this strategy, the adversary’s probability of winning the IND-CCA game is 1, hence, A d v IND - CCA Π ( A , P u ) = 1 , and Π is insecure under IND-CCA. Once b is computed, they recover k P u as a result of C b , 0 P b , 0 and use it for further encryptions or decryptions. In conclusion, Π is insecure under CCA. □
Claim 4.
The proposed scheme Π p s = ( G e n p s , E n c p s , D e c p s ) is CCA secure, and any probabilistic polynomial-time adversary cannot win the IND-CCA game with a probability better than a random guessing.
Proof. 
The proposed scheme Π p s effectively guards against replay attacks. Consequently, the decryption oracle within this scheme is designed to reject any replayed ciphertext during the tag C * verification process. The adversary’s ability to generate valid ciphertexts is then contingent upon successfully forging a tag or encrypting chosen plaintexts. Achieving such feats is only possible by solving the ECDLP. This is due to the fact that the message mapping, M a p p p s , encryption, E n c p s , and tag, C * , creation in Π p s require secret keys such as K s h , k P r , and additional parameters like C o u n t e r . As a result, the proposed scheme, Π p s , demonstrates indistinguishability under chosen-ciphertext attack, providing robust protection against CCA. □
According to Claim 3, the ECC encryption schemes [4,13,14,22] exhibit vulnerabilities against chosen-ciphertext attacks, allowing adversaries to successfully win the IND-CCA game with a probability of 1. Moreover, diverse methods advocate the use of random initial vectors (IVs) for each encryption attempt, aiming to ensure distinct ciphertexts for identical plaintexts when employing a block cipher, as proposed in [8,24]. Nevertheless, adversaries can leverage weaknesses in these schemes to achieve success in the IND-CCA game. The process involves computing { P b , 0 , P b , 1 } = M a p p ( M b , I V 0 ) and { P b , 0 , P b , 1 } = M a p p ( M b , I V 1 ) , representing the mapping points of the recovered message M b using initial vectors I V 0 and I V 1 for ciphertexts C 0 and C 1 , respectively. We define the following values as follows:
V b = P b , 0 P b , 1 and V b = P b , 0 P b , 1 , V 0 = C 0 , 0 C 0 , 1 = ( P 0 , 0 + k P u ) ( P 0 , 1 + k P u ) = P 0 , 0 P 0 , 1 .
If V b = V 0 or V b = V 0 , the adversary outputs b = 0 , otherwise, they output b = 1 . This assertion remains valid even in the presence of integrity mechanisms, assuming that C 0 and C 1 are captured in communication traffic and replayed without alterations. Therefore, these cryptosystems are lacking in terms of indistinguishability under the chosen-ciphertext attack (IND-CCA).

5.2.8. Side-Channel Attacks

Side-channel attacks [39] are a significant threat to cryptographic systems, including ECC-based implementations. These attacks exploit unintended information leakage from the physical implementation of a cryptographic algorithm, such as timing information, power consumption, electromagnetic leaks, or even sound, to infer secret data.
Recent studies emphasize the importance of mitigating these attacks through various countermeasures. In [40], Socha et al. provided a comprehensive overview of the impact of side-channel attacks on both hardware and software cryptographic implementations. Additionally, Vanhoef et al. [41] presented a timing attack against an encoding method to elliptic curve points, exploiting timing leaks generated by arithmetic operations behind ECC. Effective countermeasures such as constant-time operations, point blinding, and masking have been highlighted as essential strategies to protect against these attacks [42]. Implementing these strategies in our ECC-based cryptosystem is crucial and will be a key area for future work to ensure the robustness of our cryptosystem against such attacks.

5.2.9. Man-in-the-Middle Attack (MitM)

Based on the hardness assumption of the ECDLP, our scheme provides security against several attacks, effectively mitigating many weaknesses as discussed in Section 5 and preventing the extraction of secret keys involved during its process (e.g., K s h , k P r , users’ private keys, etc.). However, a significant concern arises regarding the possibility of adversaries impersonating legitimate users through man-in-the-middle (MitM) attacks. This form of attack involves intercepting and substituting public keys with malicious ones, thus compromising the confidentiality and integrity of data exchanged between users. To mitigate this threat in our proposed scheme, robust verification mechanisms are essential. Implementing protocols for public key authentication enables users to verify the legitimacy of received keys [43] while leveraging certificate authorities (CAs) provides digital certificates to validate the identities of communication parties [44]. Additionally, adopting trust-on-first-use (TOFU) mechanisms allows users to verify public keys during initial interactions [45]. Continuous monitoring and verification of public key authenticity in real-time, using automated systems equipped with anomaly detection algorithms, helps detect and mitigate impersonation attempts [46]. These measures collectively strengthen the resilience of our encryption method against MitM attacks, ensuring secure data exchange between users.
Table 6 presents a security comparison between the proposed methods and schemes in some related works, where the symbols ✓ (representing ‘Secure’) and × (representing ‘Not Secure’) are used to denote the resilience or vulnerability against specific several attacks.

6. Implementation

To implement the proposed scheme, we leverage the parameters and computations specified in Table 7. First, we utilize the elliptic curve parameters defined in [47], including the coefficients a and b, the prime number p, the generator point G, and its order # G . Next, we proceed with the key exchange process between a sender (s) and a receiver (r). The sender generates their private key u s and computes their public key P s using scalar multiplication with the generator point G. Similarly, the receiver generates their private key u r and computes their public key P r . During the key exchange, the sender derives points k P r and k G using a random parameter k and the receiver’s public key, while the receiver derives the same point k P r using their private key u r and point k G . This point k P r acts as a session key, providing forward secrecy by ensuring that each session uses a new and unique key. Therefore, it is essential to update k P r for each new session by choosing a new random number k. Finally, both parties compute the shared secret point using their respective private keys and the derived points. This shared secret point serves as the basis for establishing a secure communication channel between the sender and the receiver.
To encrypt the message M = “Cryptography”, we have to compute the block size q = ( l p 2 ) / log ( 256 ) = 3 , where l p = 10 represents the number of digits of the prime p. Then we segment the message into four blocks: B 1 = Cry , B 2 = pto , B 3 = gra , and B 4 = phy . Each block B i is then converted to a decimal value m i , which is encoded to m i using the proposed encoding process in Figure 2. This encoding process incorporates a hash value H ( C o u n t e r ) ( x k ) , computed for two encryption attempts, numbered C o u n t e r = 1 and 2 , where the hash function used is SHA256 is adjusted to define H ( C o u n t e r ) ( . ) . Subsequently, each m i is mapped to a point P m i using Algorithm 3. Furthermore, for message integrity verification, the integer m * is computed as described in Algorithm 4, then mapped to P m * prior to tag creation. Finally, ElGamal-v2 is used to compute cipher points as C m i = P m i + k P r , and the tag as C m * = P m * + k P r . Mapping details for encryption attempts numbered C o u n t e r = 1 , 2 are provided in Table 8 and Table 9, respectively.
A step-by-step example illustrating the different rounds required to map a message m 1 = 6419119 corresponding to the block B 1 = Cry is presented in Table 10. Initially, m 1 is transformed to m 1 = 164191190 . Then, iterating over various combinations of the first and last digits of it, in each iteration, the slope S 1 is computed to define and solve Equation (9) until a solution x m 1 = is found. Subsequently, y m 1 = S 1 x m 1 + m 1 ( mod p ) is computed. Upon receiving the cipher point C m 1 = ( 1665341891 , 2413987307 ) , the receiver (r) can decrypt it to obtain the original mapping point P m 1 = ( 2024477685 , 3189489356 ) by performing the operation C m 1 k P r . Subsequently, the receiver calculates the slope S 1 using the formula S 1 = ( y s y m 1 ) ( x s x m 1 ) 1 , yielding the value 1029763873. This slope enables the receiver to reconstruct the original block B 1 = Cry by decoding the message m 1 = y s S 1 x s while disregarding its first and last digits.

7. Conclusions

We introduce a set of innovative contributions to the processes of message encoding, mapping, reversal, and decoding within the ElGamal ECC-based scheme. Our emphasis is on maintaining a delicate balance between the security and computational efficiency of the resulting cryptosystem. To address various attack models, the plaintext encoding incorporates a parameter, C o u n t e r , and a nested composition hash function of a secret key before the message mapping process. This introduces a non-one-to-one relationship between the plaintext and mapping points, enhancing security. Furthermore, the mapping process is fortified by utilizing a shared secret point negotiated through the ECDHP.
Our new cryptosystem underwent a comprehensive analysis to assess its performance and security aspects, including complexity, overlap, resistance against chosen-plaintext attacks (CPA), resilience against chosen-ciphertext attacks (CCA), and replay attacks. Furthermore, we investigated the sensitivity of the ciphertext to minor changes in the cryptosystem inputs, and we examined the randomness of the ciphertext from the eavesdropper’s perspective. Notably, the design considerations were aimed at enhancing security while maintaining operational efficiency.
Furthermore, it is crucial to consider the arithmetic operations involved in the scalar multiplication of a point in the curve and solving Problem (7) during mapping to mitigate potential security risks, particularly those related to side-channel attacks. Therefore, we will intentionally postpone the detailed implementation of these aspects for future investigation. While our proposed method remains robust, addressing these areas in future research will help prevent vulnerabilities that may arise from improper implementations.

Author Contributions

Conceptualization, Y.L.; methodology, Y.L., S.L. and Y.A.; software, Y.L.; validation, S.L., Y.A. and A.N.; formal analysis, Y.L., S.L. and Y.A.; investigation, Y.L.; writing—original draft preparation, Y.L.; writing—review and editing, Y.L., S.L., Y.A. and A.N.; visualization, Y.L.; supervision, S.L., Y.A. and A.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ECCelliptic curve cryptography
ECelliptic curve
NISTNational Institute of Standards and Technology
ECDHPelliptic curve Diffie–Hellman protocol
ECDSAelliptic curve digital signature algorithm
ECIESelliptic curve integrated encryption scheme
CPAchosen-plaintext attack
CCAchosen-ciphertext attack
RAreplay attack
ECDLPelliptic discrete logarithm problem
AESadvanced encryption standard
IND-CPAindistinguishability under chosen-plaintext attack
IND-CCAindistinguishability under chosen-ciphertext attack
MitMman-in-the-middle
STSstation to station
KPAknown-plaintext attack
COAciphertext-only attack

References

  1. Mid-Year Update to the 2023 SonicWall Cyber Threat Report | Threat Intelligence. Available online: https://www.sonicwall.com/2023-mid-year-cyber-threat-report/ (accessed on 1 May 2024).
  2. IBM. Cost of a Data Breach 2023. Available online: https://www.ibm.com/reports/data-breach (accessed on 1 May 2024).
  3. Gura, N.; Patel, A.; Wander, A.; Eberle, H.; Shantz, S.C. Comparing elliptic curve cryptography and RSA on 8-Bit CPUs. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2004; Volume 3156, pp. 119–132. [Google Scholar] [CrossRef]
  4. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  5. 1363-2000; IEEE Standard Specifications for Public-Key Cryptography. IEEE: Piscataway, NJ, USA, 2000.
  6. King, B. Mapping an Arbitrary Message to an Elliptic Curve when Defined over GF (2n). Int. J. Netw. Secur. 2009, 8, 169–176. [Google Scholar]
  7. Gayoso, V.; Hernandez, L.; Sanchez, C. A survey of the elliptic curve integrated encryption scheme. J. Comput. Sci. Eng. 2010, 2, 7–13. [Google Scholar]
  8. Almajed, H.; Almogren, A. A secure and efficient ECC-based scheme for edge computing and internet of things. Sensors 2020, 20, 6158. [Google Scholar] [CrossRef]
  9. Barker, E.; Chen, L.; Keller, S.; Roginsky, A.; Vassilev, A.; Davis, R. Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017.
  10. Ullah, S.; Zheng, J.; Din, N.; Hussain, M.T.; Ullah, F.; Yousaf, M. Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Comput. Sci. Rev. 2023, 47, 100530. [Google Scholar] [CrossRef]
  11. Rukhin, A.; Soto, J.; Nechvatal, J.; Miles, S.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. SP800-22: A statistical test suite for random and pseudorandom number generators for cryptographic applications. In National Institute of Standards and Technology; National Institute of Standards and Technology: Gaithersburg, MA, USA, 2010; Volume 800, Issue April. [Google Scholar] [CrossRef]
  12. Hankerson, D.; Menezes, A.; Vanstone, S. Guide to Elliptic Curve Cryptography; Springer Professional Computing; Springer: New York, NY, USA, 2006. [Google Scholar]
  13. Sengupta, A.; Ray, U.K. Message mapping and reverse mapping in elliptic curve cryptosystem. Secur. Commun. Netw. 2016, 9, 5363–5375. [Google Scholar] [CrossRef]
  14. Padma, B.; Chandravathi, D.; Roja, P.P. Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method. (IJCSE) Int. J. Comput. Sci. Eng. 2010, 2, 1904–1907. [Google Scholar]
  15. Srinath, M.S.; Chandrasekaran, V. Elliptic Curve Cryptography using Mirrored Elliptic Curves over Prime Fields. In Proceedings of the International Conference on Information and Knowledge Engineering, Las Vegas, NV, USA, 12–15 July 2010; pp. 271–277. [Google Scholar]
  16. Koblitz, N. A Course in Number Theory and Cryptography; Springer Science & Business Media: Berlin/Heidelberg, Germany, 1994; Volume 114. [Google Scholar]
  17. Boneh, D.; Franklin, M. Identity-based encryption from the weil pairing. SIAM J. Comput. 2003, 32, 2003. [Google Scholar] [CrossRef]
  18. Icart, T. How to Hash into Elliptic Curves. In Advances in Cryptology, Proceedings of the CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2009; Proceedings; Halevi, S., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5677, pp. 303–316. [Google Scholar] [CrossRef]
  19. Vigila, S.M.C.; Muneeswaran, K. Implementation of text based cryptosystem using elliptic curve cryptography. In Proceedings of the 2009 First International Conference on Advanced Computing, Chennai, India, 13–15 December 2009. [Google Scholar] [CrossRef]
  20. Kumar, D.S. Encryption of Data Using Elliptic Curve over Finite Fields. Int. J. Distrib. Parallel Syst. 2012, 3, 301–308. [Google Scholar] [CrossRef]
  21. Reyad, O. Text Message Encoding Based on Elliptic Curve Cryptography and a Mapping Methodology. Inf. Sci. Lett. 2018, 7, 7–11. [Google Scholar] [CrossRef]
  22. Amounas, F.; El Kinani, E. Fast mapping method based on matrix approach for elliptic curve cryptography. Int. J. Inf. Netw. Secur. (IJINS) 2012, 1, 54–59. [Google Scholar]
  23. Kamalakannan, V.; Tamilselvan, S. Security Enhancement of Text Message Based on Matrix Approach Using Elliptical Curve Cryptosystem. Procedia Mater. Sci. 2015, 10, 489–496. [Google Scholar] [CrossRef]
  24. Almajed, H.N.; Almogren, A.S. SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography. IEEE Access 2019, 7, 175865–175878. [Google Scholar] [CrossRef]
  25. Reegan, A.S.; Kabila, V. Highly Secured Cluster Based WSN Using Novel FCM and Enhanced ECC-ElGamal Encryption in IoT. Wirel. Pers. Commun. 2021, 118, 1313–1329. [Google Scholar] [CrossRef]
  26. Moosavi, S.R.; Izadifar, A. End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC. In Silicon Valley Cybersecurity Conference; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar] [CrossRef]
  27. Tiwari, H.D.; Kim, J.H. Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices. ETRI J. 2018, 40, 396–409. [Google Scholar] [CrossRef]
  28. Das, S.; Namasudra, S. A Novel Hybrid Encryption Method to Secure Healthcare Data in IoT-enabled Healthcare Infrastructure. Comput. Electr. Eng. 2022, 101, 107991. [Google Scholar] [CrossRef]
  29. Lahraoui, Y.; Amal, Y.; Lazaar, S. Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security, San Jose, CA, USA, 9–12 March 2020. [Google Scholar] [CrossRef]
  30. Brier, E.; Coron, J.S.; Icart, T.; Madore, D.; Randriam, H.; Tibouchi, M. Efficient indifferentiable hashing into ordinary elliptic curves. In Advances in Cryptology—CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 237–254. [Google Scholar]
  31. Berlekamp, E.R. Algebraic Coding Theory. In Negacyclic Codes; World Scientific: Singapore, 1968; pp. 207–217. [Google Scholar]
  32. Burgess, D.A. The distribution of quadratic residues and non-residues. Mathematika 1957, 4, 106–112. [Google Scholar] [CrossRef]
  33. Webster, A.F.; Tavares, S.E. On the Design of S-Boxes. In Advances in Cryptology—CRYPTO’85 Proceedings; Springer: Berlin/Heidelberg, Germany, 1986; Volume 218. [Google Scholar] [CrossRef]
  34. Seyedzadeh, S.M.; Norouzi, B.; Mosavi, M.R.; Mirzakuchaki, S. A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 2015, 81, 511–529. [Google Scholar] [CrossRef]
  35. Barker, E.; Barker, W.C. Recommendation for Key Management: Part 2—Best Practices for Key Management Organizations; National Institute of Standards and Technology NIST: Gaithersburg, MA, USA, 2019. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt2r1.pdf (accessed on 1 May 2024).
  36. Chen, L.; Moody, D.; Regenscheid, A.; Robinson, A.; Randall, K. Recommendations for Discrete Logarithm-Based Cryptography. 2023. Available online: https://csrc.nist.gov/pubs/sp/800/186/final (accessed on 1 May 2024).
  37. Dolev, D.; Dwork, C.; Naor, M. Non-malleable cryptography. In Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing, New Orleans, LA, USA, 6–8 May 1991; pp. 542–552. [Google Scholar]
  38. Halperin, D.; Clark, S.S.; Fu, K.; Heydt-Benjamin, T.S.; Defend, B.; Kohno, T.; Ransford, B.; Morgan, W.; Maisel, W.H. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 18–22 May 2008. [Google Scholar] [CrossRef]
  39. Zhou, Y.; Feng, D. Side-Channel Attacks: Ten Years after Its Publication and the Impacts on Cryptographic Module Security Testing; IACR Eprint Archive: Lyon, France, 2005; Available online: http://eprint.iacr.org/2005/388 (accessed on 1 May 2024).
  40. Socha, P.; Miškovský, V.; Novotný, M. A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis. Sensors 2022, 22, 8096. [Google Scholar] [CrossRef]
  41. Vanhoef, M.; Ronen, E. Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. Cryptology ePrint Archive, Paper 2019/383; IACR Eprint Archive: Lyon, France, 2019; Available online: https://eprint.iacr.org/2019/383 (accessed on 1 May 2024).
  42. Gabsi, S.; Kortli, Y.; Beroulle, V.; Kieffer, Y.; Hamdi, B. Proposal of a lightweight differential power analysis countermeasure method on elliptic curves for low-cost devices. Multimed. Tools Appl. 2024. [Google Scholar] [CrossRef]
  43. Pavithran, D.; Shaalan, K. Towards Creating Public Key Authentication for IoT Blockchain. In Proceedings of the ITT 2019—Information Technology Trends: Emerging Technologies Blockchain and IoT, Ras Al Khaimah, United Arab Emirates, 20–21 November 2019. [Google Scholar] [CrossRef]
  44. Kumagai, K.; Kakei, S.; Shiraishi, Y.; Saito, S. Distributed Public Key Certificate-Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology. Secur. Commun. Netw. 2023. [Google Scholar] [CrossRef]
  45. Wendlandt, D.; Andersen, D.G.; Perrig, A. Perspectives: Improving SSH-Style Host Authentication with Multi-Path Probing. In Proceedings of the 2008 USENIX Annual Technical Conference, USENIX 2008, San Diego, CA, USA, 14–19 June 2009; USENIX: Boston, MA, USA, 2008. Available online: https://www.usenix.org/legacy/event/usenix08/tech/full_papers/wendlandt/wendlandt_html/ (accessed on 1 May 2024).
  46. Gultekin, E.; Aktas, M.S. Real-Time Anomaly Detection Business Process for Industrial Equipment Using Internet of Things and Unsupervised Machine Learning Algorithms. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 14108 LNCS; Springer: Berlin/Heidelberg, Germany, 2023. [Google Scholar] [CrossRef]
  47. Khudri, W. Sutanto, Implementation of Elgamal Elliptic Curve Cryptography Using Matlab. In Proceedings of the Conference on Instrumentation, Communication and Information Technology (ICICI), Bandung, Indonesia, 3–5 August 2005; Available online: https://wan.khudri.com/my_files/icici2005/paper_ICICI_2005.pdf (accessed on 1 May 2024).
Figure 1. A comprehensive overview of the proposed scheme.
Figure 1. A comprehensive overview of the proposed scheme.
Cryptography 08 00023 g001
Figure 2. Plaintext message encoding.
Figure 2. Plaintext message encoding.
Cryptography 08 00023 g002
Figure 3. Message mapping process.
Figure 3. Message mapping process.
Cryptography 08 00023 g003
Figure 4. Tag generation procedure.
Figure 4. Tag generation procedure.
Cryptography 08 00023 g004
Figure 5. Mapping point encryption using ElGamal-v2.
Figure 5. Mapping point encryption using ElGamal-v2.
Cryptography 08 00023 g005
Figure 6. Decryption and integrity verification process.
Figure 6. Decryption and integrity verification process.
Cryptography 08 00023 g006
Figure 7. Point-reverse mapping.
Figure 7. Point-reverse mapping.
Cryptography 08 00023 g007
Figure 8. Plaintext message decoding.
Figure 8. Plaintext message decoding.
Cryptography 08 00023 g008
Figure 9. Algorithm performance analysis for secp192r1.
Figure 9. Algorithm performance analysis for secp192r1.
Cryptography 08 00023 g009
Figure 10. Algorithm performance analysis for secp256r1.
Figure 10. Algorithm performance analysis for secp256r1.
Cryptography 08 00023 g010
Figure 11. Algorithm performance analysis for secp384r1.
Figure 11. Algorithm performance analysis for secp384r1.
Cryptography 08 00023 g011
Figure 12. Algorithm performance analysis for secp521r1.
Figure 12. Algorithm performance analysis for secp521r1.
Cryptography 08 00023 g012
Figure 13. Algorithm performance analysis: running time vs. plaintext size for secp192r1.
Figure 13. Algorithm performance analysis: running time vs. plaintext size for secp192r1.
Cryptography 08 00023 g013
Figure 14. Algorithm performance analysis: running time vs. plaintext size for secp256r1.
Figure 14. Algorithm performance analysis: running time vs. plaintext size for secp256r1.
Cryptography 08 00023 g014
Figure 15. Algorithm performance analysis: running time vs. plaintext size for secp384r1.
Figure 15. Algorithm performance analysis: running time vs. plaintext size for secp384r1.
Cryptography 08 00023 g015
Figure 16. Algorithm performance analysis: running time vs. plaintext size for secp521r1.
Figure 16. Algorithm performance analysis: running time vs. plaintext size for secp521r1.
Cryptography 08 00023 g016
Figure 17. Mapping change rate from a single-bit key alteration.
Figure 17. Mapping change rate from a single-bit key alteration.
Cryptography 08 00023 g017
Figure 18. Ciphertext change rate from a single-bit key alteration.
Figure 18. Ciphertext change rate from a single-bit key alteration.
Cryptography 08 00023 g018
Figure 19. Bit changing rate under plaintext bit alteration.
Figure 19. Bit changing rate under plaintext bit alteration.
Cryptography 08 00023 g019
Figure 20. Mapping points scatter.
Figure 20. Mapping points scatter.
Cryptography 08 00023 g020
Figure 21. Ciphertext points scatter.
Figure 21. Ciphertext points scatter.
Cryptography 08 00023 g021
Figure 22. Rejected sequences and max rejections in NIST statistical tests.
Figure 22. Rejected sequences and max rejections in NIST statistical tests.
Cryptography 08 00023 g022
Figure 23. Replay attack against healthcare provider.
Figure 23. Replay attack against healthcare provider.
Cryptography 08 00023 g023
Table 1. Comparison between ElGamal-v1 and ElGamal-v2.
Table 1. Comparison between ElGamal-v1 and ElGamal-v2.
ElGamal-v1ElGamal-v2
Number of Point AdditionsBB
Number of Point Multiplications 2 B 2
ThroughputHigh (considering B)Lower (compared to B)
Table 2. Key notations relevant to the proposed scheme.
Table 2. Key notations relevant to the proposed scheme.
SymbolDescription
pBig prime number.
F p Prime field Z / Z p .
E ( F p ) Elliptic curve defined over F p .
GBase point on the elliptic curve.
u k Private key of user k.
P u Public key of user u.
K s h Secret key shared between sender (s) and receiver (r).
MThe plaintext message.
l o Length of the object o (number of digits or number of characters).
H ( x ) Hash value of x converted to an integer with l p 2 digits.
H ( n ) ( x ) the n-th nested composition of the hash function H applied to the input x.
BNumber of message blocks.
m i The message block number i as an integer.
l s d n ( x ) x, after discarding its n least significant digits.
+Employed to represent the addition of points and the addition of numbers.
x y Aligning binary values of x and y by left-padding with ‘0’s to ensure equal size,
then applying bitwise XOR.
Table 3. Average rounds across 3 algorithms: Refs. [16,24], This paper.
Table 3. Average rounds across 3 algorithms: Refs. [16,24], This paper.
Elliptic CurveAlgorithmRandom Plaintext
Num. of BlocksNum. of Mapping RoundsAverage of Mapping Rounds
secp192r1Ref. [16]4358581.972
Ref. [24]4358912.048
This paper4358782.018
secp256r1Ref. [16]3236522.018
Ref. [24]3236582.037
This paper3236431.990
secp384r1Ref. [16]2134302.018
Ref. [24]2134211.976
This paper2134282.009
secp521r1Ref. [16]1573142
Ref. [24]1573172.019
This paper1573152.006
Table 4. Change rate analysis for message mapping and encryption: average rate and deviation.
Table 4. Change rate analysis for message mapping and encryption: average rate and deviation.
Change Rate ofNumber of Tests μ σ
Mapping scheme1000050.10%2.57%
Encryption scheme1000050.02%2.81%
Table 5. NIST statistical tests assessment.
Table 5. NIST statistical tests assessment.
IDTestNumber of SequencesLength of Sequences (bits)Assessment
01Monobit Test81982000Pass
02Frequency Within Block Test81982000Pass
03Runs Test81982000Pass
04Longest Run of Ones in a Block Test81982000Pass
05Binary Matrix Rank Test27977841Pass
06DFT Test81982000Pass
07Non-Overlapping Template Matching Test81982000Pass
08Overlapping Template Matching Test102056039Pass
09Maurer’s Universal Test28775698Pass
10Linear Complexity Test211000033Pass
11Serial Test57392384Fail
12Approximate Entropy Test81982000Pass
13Cumulative Sums Test81982000Pass
14Random Excursion Test102000072Pass
15Random Excursion Variant Test102000072Pass
Table 6. Comparison of schemes based on security against various attacks.
Table 6. Comparison of schemes based on security against various attacks.
SchemeSecurity
KPACOACPAMalleabilityReplay AttackCCA
Refs. [20,21]×××
Refs. [13,22]××××
Ref. [24]×××
This paper
Table 7. Elliptic curve key parameters and setup computations.
Table 7. Elliptic curve key parameters and setup computations.
SectionParameterValue
EC ParametersEquation’s Coefficient a537680305
Equation’s Coefficient b1059676324
Prime Number p3946183951
Generator Point G(1152222263, 3133703258)
Generator Point Order # G 3946206427
Elliptic Curve Equation: y 2 = x 3 + 537680305 x + 1059676324
Sender (s) ParametersPrivate Key u s 2441052953
Random Parameter k655846922069
Public Key P s = u s G (2365961577, 2642871165)
Point k G (2634041647, 2827619405)
Point k P r = ( x k , y k ) (1135983708, 381375075)
Shared Secret Point K s h = u s P r (3400454298, 1533875807)
ExchangeSend P r Send P s , k G
Receiver (r) ParametersPrivate Key u r 1429753181
Public Key P r = u r G (2830164285, 942020493)
Shared Secret Point K s h = u r P s (3400454298, 1533875807)
Point k P r = u r k G = ( x k , y k ) (1135983708, 381375075)
Table 8. Mapping details for encryption attempt number 1 ( C o u n t e r = 1 ).
Table 8. Mapping details for encryption attempt number 1 ( C o u n t e r = 1 ).
Block B i Decimal Value m i Encoded Value m i Mapping Point P m i
B 1 44202176419119(1851134498, 2848058768)
B 2 73698391148610(3450323358, 1700398742)
B 3 67794897795872(1240965444, 3560781816)
B 4 7366777433373(2171276352, 3891369897)
Mapping points P m i , point k P r , C o u n t e r , and sender’s I D s = Sender ( s ) hashed to m * = 2186729 , then mapped to P m * = ( 3378637932 , 274720553 ) prior to tag creation.
Table 9. Mapping details for encryption attempt number 2 ( C o u n t e r = 2 ).
Table 9. Mapping details for encryption attempt number 2 ( C o u n t e r = 2 ).
Block B i Decimal Value m i Encoded Value m i Mapping Point P m i
B 1 44202174346998(2024477685, 3189489356)
B 2 73698393285019(2313133495, 3782223150)
B 3 67794895591673(1363974206, 480205177)
B 4 73667772439684(3918942662, 300263470)
Mapping points P m i , point k P r , C o u n t e r and sender’s I D s = Sender ( s ) hashed to m * = 2355984 , then mapped to P m * = ( 1535397971 , 3904424142 ) prior to tag creation.
Table 10. Message mapping rounds of the block B 1 = Cry ( C o u n t e r = 2 ).
Table 10. Message mapping rounds of the block B 1 = Cry ( C o u n t e r = 2 ).
Round m 1 S 1 Equation (9) Has a Solution
11434699802389772309No, x m 1 = N o n e
21434699811029763873Yes, x m 1 = 2024477685
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lahraoui, Y.; Lazaar, S.; Amal, Y.; Nitaj, A. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance. Cryptography 2024, 8, 23. https://doi.org/10.3390/cryptography8020023

AMA Style

Lahraoui Y, Lazaar S, Amal Y, Nitaj A. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance. Cryptography. 2024; 8(2):23. https://doi.org/10.3390/cryptography8020023

Chicago/Turabian Style

Lahraoui, Younes, Saiida Lazaar, Youssef Amal, and Abderrahmane Nitaj. 2024. "Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance" Cryptography 8, no. 2: 23. https://doi.org/10.3390/cryptography8020023

APA Style

Lahraoui, Y., Lazaar, S., Amal, Y., & Nitaj, A. (2024). Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance. Cryptography, 8(2), 23. https://doi.org/10.3390/cryptography8020023

Article Metrics

Back to TopTop