Score:0

How do I know the most efficient image encryption algorithm?

cn flag

I am familiar with any algorithm that is based on the number of bits in a key (n-bit) and how to restore a key, such as the Discrete Logarithm Problem or Factorization.  When I use any algorithm for encrypting and decrypting images, such as RSA, how can I estimate this algorithm's security and work efficiently with image encryption.

kelalaka avatar
in flag
The encryption algorithms operate on binary data, they don't care about the type( well there is format-preserving encryption that has a special formulation for numbers, etc..) What is your aim? Who will access these files? Why don't you just a Veracrpt volume to store them? RSA or any public key cryptosystem is not preferred to encrypt data, it is preferred for signature and key encapsulation...
Score:1
in flag

I am familiar with any algorithm that is based on the number of bits in a key (n-bit) and how to restore a key, such as the Discrete Logarithm Problem or Factorization.

There are hundreds if not thousands of encryption algorithms. What you are naming are hard problems that we use to build algorithms such as Diffie-Hellman which uses the DLP, or RSA which relies on the fact that it is hard to factor the modulus (the RSA problem).

When I use any algorithm for encrypting and decrypting images, such as RSA

Nobody uses RSA directly to encrypt images. And modern encryption algorithms operate on bits / bytes, which can represent any kind of "message". Although RSA itself operates on numbers, the PKCS#1 specifications - that define two secure ways of padding for encryption - will require the message to consist of bytes.

how can I estimate this algorithm's security and work efficiently with image encryption.

You can look at keylength.com for recommendations of for the key size and the relative security or strength (also usually shown in bits) that a particular key size can offer.

As for efficiency, usually key encapsulation is used to encrypt a random symmetric data key which can then encrypt the image. This way of combining asymmetric and symmetric algorithms is called a hybrid cryptosystem.

Generally symmetric algorithms are much faster and use less overhead to encrypt data.

SAI Peregrinus avatar
si flag
It might be worth mentioning Naor-Shamir "[Visual Cryptography](https://en.wikipedia.org/wiki/Visual_cryptography)", which is image-specific and about as interesting as any other One-Time Pad system (not terribly useful in practice, but not completely uninteresting either).
Mhsz avatar
cn flag
What tools are used to evaluate algorithm efficacy? Is correlation coefficient used for this purpose? Or what????
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.