Optik 168 (2018) 370–375 Contents lists available at ScienceDirect Optik journal homepage: www.elsevier.de/ijleo Original research article Cryptanalysis of multimedia encryption using elliptic curve cryptography Khoirom Motilal Singh , Laiphrakpam Dolendro Singh, Themrichon Tuithung Department of Computer Science and Engineering, National Institute of Technology, Nagaland 797103, India a r t i c l e i n f o Article history: Received 9 March 2018 Accepted 11 April 2018 Keywords: Multimedia encryption Elliptic curve cryptography Elliptic curve discrete logarithmic problem Cryptanalysis a b s t r a c t The encryption scheme proposed by Tawalbeh et al. [1] is based on elliptic curve cryptog- raphy (ECC). ECC depends on the difficulty to solve the elliptic curve discrete logarithmic problem. However we found that the order of Tawalbeh et al. elliptic curve is not large enough to protect from attacks like Baby Step, Giant Step attack or Pollard’s Rho attack. Sim- ulation of the encryption scheme using the elliptic curve parameters proposed by Tawalbeh et al. is carried out. Cryptanalysis has been successfully carried out to extract the private key from the public key and the encrypted image is deciphered revealing the plain image. © 2018 Elsevier GmbH. All rights reserved. 1. Introduction With the rapid growth in Internet and modern information communication technology, multimedia data are easily stored and shared between communication parties. Many researchers have come up with several cryptographic schemes in order to avoid unauthorized access to sensitive multimedia data. Classical encryption scheme such as Rivest–Shamir–Adleman (RSA), Data Encryption Standard (DES) are not effective for large and highly correlated data. Chaotic system, being the most commonly used techniques for encrypting data, many researchers have utilized its properties. The properties include sensitivity to initial conditions and ergodicity to define various encryption schemes. Despite of its benefits in applying to an encryption scheme, there are certain issues that need to address such as small key size and weak security. Many chaos-based encryption schemes [2–6] have already been cryptanalysed by various authors [7–11] respectively. ECC is a strong public key encryption scheme which can provide high security for a given key size compared to other encryption schemes whose difficulty depends on integer factorization or discrete logarithmic problem [12,13]. Detail explanation about ECC, mathematical proofs and applications are given in [14,15]. Various authors have used ECC base encryption scheme for securing multimedia data [16–19]. Hong et al. [20] cryptanalyse the encryption scheme proposed by Ahmed et al. [21] based on hybrid chaotic system and cyclic elliptic curve using known-plaintext attack. In this paper, cryptanalysis of the encryption scheme proposed by Tawalbeh et al. [1] is carried out, revealing the private key from the public key. Using the retrieved private key, the cipher image generated using Tawalbeh et al. encryption scheme is deciphered recovering the plain image transmitted by the sender. The rest of the paper is organized as: Tawalbeh et al. encryption scheme is explained in Section 2. Section 3 explains the concept of attacks applied on ECC (Naive attack, Baby Step, Giant Step attack and Pollard’s Rho attack). The simulation of the cryptanalysis performed on Tawalbeh et al. chosen elliptic curve is shown in Section 4. Conclusion is given in Section 5. Corresponding author. E-mail address: khmotilal@gmail.com (M.S. Khoirom). https://doi.org/10.1016/j.ijleo.2018.04.068 0030-4026/© 2018 Elsevier GmbH. All rights reserved.