Combination of RGB Substitution for Text to Image Encryption Technique using AES

Size: px
Start display at page:

Download "Combination of RGB Substitution for Text to Image Encryption Technique using AES"

Transcription

1 Combination of RGB Substitution for Text to Image Encryption Technique using AES Sourabh Singh 1 Department of Computer Science and Engineering Radharaman Institute of Technology and Science Bhopal (M.P), India sourabhsingh_tct@yahoo.com Anurag Jain 2 Department of Computer Science and Engineering Radharaman Institute of Technology and Science Bhopal (M.P), India anurag.akjain@gmail.com Abstract Network security works on the principle of Encryption and Decryption. Every algorithm make use of a secret key which is responsible to Encrypt data in some unreadable type of message or changes original data into a different data. In this paper we have given a novel approach which transforms a text file into an image using RGB substitution hence an intruder will be confused weather actual data to be transmitted is a text or an image. Further it also undergoes an AES encryption stage which encrypts the generated image, at last the encryption key is also attached into the encrypted image file. Hence this approach also solves the key exchange problem. The encryption and decryption phenomenon makes use of a combination database for transformation of text into image. Index Terms - Encryption, Decryption, AES. I. INTRODUCTION This paper is divided into following five sections; in section- I, we presented basic introduction of Network Security, in section-ii, a survey on related algorithms has been presented, section-iii discusses the proposed model, section IV presents the Result Analysis and finally section V concludes the paper and provides Future work. With the rapid growth of network applications, security has become an important factor while communicating and transferring data on a public network. Some of the popular network security techniques are described as under: Substitution: In cryptography the substitution techniques are oldest but still a powerful method to hide the original text, this method replaces letters with some other letters or set of letters. In this methodology the letters can also be easily replaced by numbers. The most praised method developed by Julius Caeser[12] in Caesar Cipher each letter in a message is replaced by an letter three places down the line. Monoalphabetic Cipher is another technique which makes use of the random substitution. Another technique Homophonic Substitution involves substitution of a single plain text character by a cipher text character which can be any one of the chosen set. The Polygram substitution cipher technique is also a substitution technique which substitutes one block of plain text with a block of cipher text hence it does not work on a character by character basis. Transposition: Transposition techniques are different from substitution techniques as it does not simply replace one letter with another [12]; these techniques also perform some permutation over the plain text letters. The most popular technique used here is a rail fence technique which constitutes of two steps, in first step plain text is written as sequence of diagonals while in second step the plain text is read row by row which generates cipher text. Another technique is Simpler Columnar Transposition Technique in which plain text is arranged in a sequence of rows & columns randomly. Vernam cipher is another method which uses a one-time pad hence it is only suitable for short messages. Encryption: In the science of cryptography [10], encryption is a method of converting readable information into unreadable data. Message Authentication Code (MAC), Hash Functions or digital signatures are the dominating techniques used for encryption. Message Authentication Code is useful in providing message integrity while digital signatures proves authenticity of a message, digital signatures confirms the identity of the sender Clear Text or Plain Text: A message that we can read and understand without the aid of any means especially complex Cipher text or Cryptogram: The cryptogram is the result of the transformation of a clear message through the use of a mathematical function. Encryption: The transformation of a message that modifies it in substance and makes it illegible Decryption: The inverse process of encryption that allows obtaining the message in clear form a cryptogram Fig-1: Cryptography Process Page 1 of 7

2 Private Key Encryption: In symmetric encryption or private Key encryption a single key is used for encryption and decryption of a message which is to be sent in an unsecured channel. Here both the sender and the receiver shares the same secret code, called the key. Sender encrypts the message using the key. On receiving the message Receiver decrypts it using the same key. Systematic key management or the transfer of key is a major concern while using private key encryption [11]. Public Key Encryption: In Public key cryptography or asymmetric key cryptography pair of keys is used for encryption and decryption. To privately communicate with the other users the public key is distributed to everyone. Hence this approach overcomes the key exchange problem between users which was the primary concern in private key encryption. In this method each user has a private key, public key pair. Here private key is never shared between the users while public key is widely available. Asymmetric key encryption is slower as compared to private key encryption due to multiple key distribution management between users [11]. AES Algorithm: AES Algorithm is based over a cryptographic technique Rijndael which is a block cipher technique developed by Joan Daemen and Vincent Rijmen[13]. This algorithm is very flexible as it supports 128, 192, and 256 bits combination of data and key size. On the other hand AES mandates that the plain text must be 128 bit long which can be divided into four operation blocks. These blocks functions on an array which is made up of bytes organized in a 4 4 matrix. This arrangement is termed as state. For achieving complete encryption, the data is passed through Nr number of rounds (Nr = 10, 12, 14).These rounds performs the following transformations: Subbyte Transformation: This transformation includes a non linear byte Substitution with the help of substitution table (sbox), Affine Transformation and multiplicative inverse are the basic building blocks used for the construction of substitution table. Shift rows transformation: It is a simple byte transposition method. In this transformation bytes in the last three rows of the state are cyclically shifted and offset of the left shift varies from one to three bytes. Mix columns transformation: It is based on the method of multiplication of columns of the matrix in which each column vector is multiplied by a fixed matrix. Treating the bytes as polynomials rather than numbers. Add round key transformation: It is a simple XOR operation between the working state and the round key. This transformation is its own inverse. Inverse Substitute Bytes: It is the reverse procedure of the Substitute Bytes transformation; here the inverse S-box is applied on each byte of the State. This is obtained by taking the inverse of the affine transformation followed by taking the multiplicative inverse Inverse Shift rows: It is the inverse process of the shift rows here the first row of the state array remains unchanged. The bytes present in the second, third and forth rows are cyclically shifted by one, two and three bytes to the right respectively. Inverse Mix columns: In the Inverse Mix Columns transformation, every column of the state array is considered as a polynomial. Modulo x4+1 is multiplied with a fixed polynomial and the result generated is the corresponding column of the output state. Fig-2: Diagram of AES Encryption Algorithm The key value cannot be determined by any known means, even if any eavesdropper knows many pairs of plaintext and the cipher text security of AES algorithm remains unchanged. AES algorithm is so well designed that it supports the use one of any of the three key sizes (Nr). AES-128, AES-196 and AES-256 use 128 bit (16 bytes, 4 words), 196 bit (24 bytes, 6 words) and 256 bit (32 bytes, 8 words) key sizes respectively. AES have no known weaknesses and hence is a better approach as compared to DES. AES is extremely fast as compared to other block ciphers (Though there are some mismatches between size and speed). In dedicated hardware where round transformation is parallel by design AES allows even faster execution. II. Literature Survey Page 2 of 7

3 This Research is based on the work done by Ahmad Abusukhon and Mohammad Talib [1]. In their work, there are mainly two stages.. First stage deals with the transformation here Plain Text to be transmitted over the network is transformed to image. This transformation has been designed by the respective authors. The second level contains Image-Shuffle Encryption which is based on Efficient digital encryption algorithm based on matrix scrambling technique [2] where the Image generated by the transformation is stored in the matrix form at the bit level and this matrix has been shuffled by the technique described in [2]. The two operations involved here are performed on the client side and to obtain the original text same operations are performed in reverse direction on the receiver side. In the first level i.e. Text-To-Image Encryption each letter of text file is transformed into three random integers say RGB R for Red, G for Green and B for Blue. Range of Random numbers are from 0 to 255. Each of the three random numbers represents single pixel in the image. In their algorithm, they have generated an individual pixel (R, G, and B values calling them RGB value) for each letter in the plain text. During this process key1 is generated which contains the random numbers RGB for all the letters. This key1 is stored in one string and used to transform the plaintext into an image. At the bit level the result of this process is stored in a two dimensional array or Matrix of Pixels MP. In this Matrix each 3 contiguous columns in a row represent one letter. In order to make it more secure they used the second level of encryption, here they determine the number of times the image matrix is shuffled [2]; say N. Here N is equal to the number of column of MP. On shuffling the matrix MP every time two random numbers are generated say R1, and R2, where R1 represents row/column number and R2 represents another row/column number. R1 is replaced by R2 and R2 is replaced by R1. The Shuffled matrix generated say SP, is finally sent to the Receiver. When Receiver receives SP it uses key 2 to retrieve the original matrix MP and then each pixel in original matrix MP is decomposed into R, G, and B values. Then using key 1 these 3 contiguous values (R, G, and B) are transformed to a specific letter. In our proposed algorithm there is an AES encryption stage where image generated after the transformation of text is encrypted using a key, the AES has been very popular to encrypt data and now a days frequently used for encrypting images as well. Praveen.H.L, H.S. Jayaramu, M.Z.Kurian [9] states that AES provides an error-free encryption system and error is much more reduced even in radiation in satellites. They have developed a model which can easily encrypt the images obtained from satellites. In their research the satellite not have to wait for long time to receive next block of data even If a faulty or noisy data occurs. Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari and Hamida Almangush[8] has also used AES encryption algorithm for image encryption, with the help of magic cube method they have rotated the plain image to generate another image. The original image taken is divided into six sub-images which are subdivided between a number of blocks and finally attached to the faces of a Magic Cube further to confuse the relation between the plain image and the encrypted image, an AES algorithm which is applied to the rotated image which again encrypts the image. Jawad Ahmad and Fawad Ahmed [6] have given an analysis on comparing two encryption algorithms namely Advanced Encryption Standard (AES) and Compression Friendly Encryption Scheme (CFES). They have also explored the security estimations of both AES and CFES for digital images against brute-force, statistical, and differential attacks, the results obtained by testing algorithms for digital images shows some weaknesses in CFES. These weaknesses were due to low entropy and horizontal correlation in encrypted images, the authors also states that the images which were encrypted by CFES has correlation in horizontal direction while same images when encrypted by AES results in very less correlation in all directions. Correlation is inversely propotional to security. Manoj. B, Manjula N Harihar[5] also proved that Image Encrypted and Decrypted using AES can be designed and implemented to protect the confidential image data from an unauthorized access. The authors found that Successful implementation of AES algorithm is one of the best encryption and decryption standard available in market. Page 3 of 7

4 P. Radhadevi, P. Kalpana[7] has also presented the encryption and decryption of an image using AES algorithm, they have concluded that the AES can be used very efficiently for secure image transmission. P.Karthigaikumar,Soumiya Rasheed[4] has also implemented AES algorithm for simulation of image encryption. They have successfully implemented the AES algorithm in MATLAB on Xilinx platform, They have converted an image into a binary form and then encrypted with the help of an AES algorithm.timing simulation is also performed which verifies the functionality of the designed circuit. III. PROPOSED MODEL This section, describes the proposed algorithm. This algorithm is designed to improve the algorithm proposed by the Ahmad Abusukhon and Mohammad Talib [1]. The main drawback of their algorithm is that it does not solve the key exchange problem. Another disadvantage is that they are transferring the whole key value. This is very big in size (key1) as each character in plain text is replaced by three random numbers. Therefore it requires transferring at least three times more data as compared to actual data for decrypting the packet. Fig.3 shows the Data flow diagram of proposed algorithm [3]. As we know encryption is more secure method as compared to shuffle operations so the proposed technique executes an encryption stage rather shuffling the positions of bits by matrix scrambling technique. The sender & receiver side has a combination database which contains number of combinations of text to digits mapping. It has various combinations of transforming characters into equivalent RGB values also each combination have assigned a unique number which ranges from 1 to N. N denotes the total number of combinations in the database. The steps involved in the Algorithm are as follows: 1. Generate a Random number between 1 to N. 2. Generate Combination corresponding to N. 3. Transform Text into RGB values. 4. Attach N in RGB values and Generate Image1. 5. Generate a Random number between 1 to K. 6. Generate key corresponding to K. 7. Encrypt Image1 by AES and key to Generate Image2. 8. Attach K in Image2 9. Generate Image Send Image3 to Receiver. Page 4 of 7

5 11. Read K to Generate Key. 12. Remove K to Generate Image Decrypt Image2 by AES using Generated Key to get Image Read N to Generate Combination Number. 15. Remove N and Transform Image1 to Plain Text. The process starts from the sender side. In this paper we have taken N as 10. The sender generates a random number between 1 to 10. This represents the combination number to be applied for transformation Text to Image. Using the corresponding combination (key1) transformation method proposed in [1] is applied which results in the generation of an image. The number N is attached in the image by adding one more pixel in the image at last. Now sender generates a random number between 1 to K. Here we have taken K as 10. Sender Matches the corresponding key (Key2) in combination database. This key2 is used for AES Encryption. Now the image generated by Text to image transformation is encrypted by key using an AES algorithm [13]. The number K is finally attached in the image by adding one more pixel in the image at last. Finally this single file is transferred to the Receiver. When Receiver receives the final image the first task is to read the last pixel to get the combination number. When this number is obtained the number is matched in the combination database which retrieves the corresponding key (key2). Now the last pixel is discarded from the image and the resultant image is decrypted using key2 and AES algorithm. Now Receiver reads the last pixel to get the combination number. When this number is obtained the number is matched in the combination database which retrieves the corresponding key (key1). Now the last pixel is discarded from the image. Finally key1 is applied on the generated image which transforms image into original plain text. Fig-4 shows the transformation step. Here a plain text Hello Guys has been transformed into image using an RGB substitution. First N is calculated for applying a combination number here it is 4. Every character has a different RGB value for the conversion of character to pixel. For e.g.: value for H is 10 for R, 63 for G and 109 for B similarly for e is 52 for R, 54 for G and 124 and so on. By this combination following image has been formed which is made up matrix of pixels of order 6X2 (((N/2)+1)X2). This image looks like image Fig: 5. Fig-5: Transformed image from text The combination number N is smartly attached as a last pixel and finally after encrypting the image with an AES algorithm and adding Combination number of the key2 K the image or cipher obtained looks like a corrupted file rather than any useful information. It looks like fig-6: We have taken Abstract of this research paper for experimental analysis. The Abstract is of the size 1137 bytes, we have taken first 200,400,600,800 IV. RESULT ANALYSIS We have used java as software to carry out our experiments. We have built the sender s and Receiver s programs on different machines and use the following text message for our experiments: "encryption is the process of converting data to a form called a cipher text which cannot be easily understood by unauthorized people decryption is the reverse process for converting encrypted data back to its original form so that it can be understood. Fig-6: Final Image to be transferred and 1000 bytes of Abstract for analysis. Text Size (Bytes) Encryption Time (Sec) Decryption Time (Sec) Fig-4: Image formation from text Page 5 of 7

6 Experimental Results obtained In this Research work we have proposed an Encryption Decryption technique which developed a highly secure transmission of text. If any intruder somehow decrypts the image the technique transfers him to another image which is also in an unreadable format, this further confuses the intruder that the actual information is in text or in image format, the blending of transformation of a text into an image and further encrypting the result with an AES encryption makes information (plain text) highly secure for transmitting it on an extremely vulnerable and insecure network environment. The proposed algorithm also solves key exchange problem since it attaches key with the cipher itself in a very secure manner. We have implemented this method by converting text into a PNG image as it is a lossless compression format. In future the Researchers can further work on other image formats and can analyze the results. Further AES can also be implemented in 256 bit key block while other encryption algorithms can also be implemented in place of AES and changes in the results can be investigated. Fig-7: Graphical Analysis for Experimental Results The best outcome is that only a single file is being transferred which in itself contains key, The Encryption time includes time taken in attachment of key and similarly Decryption time also includes the fetching of key from the cipher. Fig-8 shows that the Encryption and Decryption time is nearly same and is very efficient and fast. The approach used in [1] only undergoes transformation of 26 characters. We have used 84 character set including special characters of the keyboard. With the simple calculation, the number of possible Permutations to encrypt 84 letters is ((256) 3 ) 84. Since each pixel is made by the combination of three values (RGB) and each one of these values ranges from 0 to 255, choosing three values has (256) 3 permutations. We have 84 letters and thus the permutations for 84 letters is ((256) 3 ) 84 which is equal to exp+606. Our approach also uses AES encryption stage hence one need different numbers of combination to break the cipher. Hence we can say that our approach is highly secure. V. CONCLUSION AND FUTURE WORK REFERENCES [1] Ahmad Abusukhon Mohammad Talib A Novel Network Security Algorithm Based on Private Key Encryption IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), [2] Kiran Kumar, M., Mukthyar Azam, S., and Rasool, S.(2010) Efficient digital encryption algorithm based onmatrix scrambling technique. International Journal ofnetwork Security and its Applications (IJNSA), 2(4). [3] Sourabh Singh, Anurag Jain An Enhanced Text to Image EncryptionTechnique using RGB Substitution and AES.International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May [4] P.Karthigaikumar Soumiya Rasheed Simulation of Image Encryption using AES Algorithm IJCA Special Issue on Computational Science - New Dimensions & Perspectives NCCSE, [5] Manoj.B, Manula N Harihar Image Encryption and Decryption using AES International Journal of Engineering and Advanced Technology (IJEAT) ISSN: , Volume-1, Issue-5, June [6] Jawad Ahmad and Fawad Ahmed Efficiency Analysis and Security Evaluation of Image Encryption Schemes International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol:12 No:04. Page 6 of 7

7 [7] P. Radhadevi, P. Kalpana Secure Image Encryption Using AES International Journal of Research in Engineering and Technology Volume: 1 Issue: 2. [8] Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari and Hamida Almangush A Novel Image Encryption using an Integration Technique of Blocks Rotation based on the Magic cube and the AES Algorithm International Journal of Computer Science Issues (IJCSI); Vol. 9 Issue 4, p41 Jul2012. [9] Praveen.H.L, H.S Jayaramu, M.Z.Kurian Satellite Image Encryption Using AES International Journal of Computer Science and Electrical Engineering (IJCSEE), Vol-1, Iss-2, [10] Stalling, W. (2005) Cryptography and network security principles and practices, 4th edition Prentice Hall. Available at: security-4thedition.html. [11] Dr. Mahesh Motwani Cryptography & Network Security Balaji Learning Book. [12] Atul Kahate, Cryptography and Network Security, Second Edition, Tata McGraw-Hill Edition [13] AES.pdf Page 7 of 7

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

Cryptography Functions

Cryptography Functions Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

A Modified Playfair Encryption Using Fibonacci Numbers

A Modified Playfair Encryption Using Fibonacci Numbers A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY Scientific Journal of Impact Factor (SJIF): 3134 ISSN (Print): 2348-6406 ISSN (Online): 2348-4470 International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS

More information

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with

More information

Data Encryption Standard (DES)

Data Encryption Standard (DES) Data Encryption Standard (DES) Best-known symmetric cryptography method: DES 1973: Call for a public cryptographic algorithm standard for commercial purposes by the National Bureau of Standards Goals:

More information

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50 Advanced Encryption Standard and Modes of Operation Foundations of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) is a symmetric cryptographic algorithm AES has been originally requested

More information

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using

More information

FPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY

FPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,

More information

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed Vijaya Kumar. B.1 #1, T. Thammi Reddy.2 #2 #1. Dept of Electronics and Communication, G.P.R.Engineering College,

More information

International Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD

International Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, www.ijcea.com ISSN 2321-3469 ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD Namrata

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

FPGA Based Design of AES with Masked S-Box for Enhanced Security

FPGA Based Design of AES with Masked S-Box for Enhanced Security International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 3 Issue 5ǁ May 2014 ǁ PP.01-07 FPGA Based Design of AES with Masked S-Box for Enhanced Security

More information

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack

Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack Vivek Kumar 1 and Sandeep Sharma 2 1,2 Department of Electronics and Communication Engineering, Dehradun Institute of Technology,

More information

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis

More information

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color

More information

Design and Analysis of New Symmetric Block Cipher Algorithm

Design and Analysis of New Symmetric Block Cipher Algorithm Design and Analysis of New Symmetric Block Cipher Algorithm KALAICHELVI V && MANIMOZHI K Asst. Professor, SRC- SASTRA University, Kumbakonam, India E-mail: kalaichelvi2k@yahoo.com Abstract Cryptography

More information

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition

More information

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel

More information

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College

More information

A Proposed Method for Cryptography using Random Key and Rotation of Text

A Proposed Method for Cryptography using Random Key and Rotation of Text Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There

More information

A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm

A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm Abusukhon Ahmad Department of Computer Networks, Al-Zaytoonah University of Jordan, Amman, Jordan Abstract Nowadays,

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to

More information

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box Efficient Implementation of Aes By Modifying S-Box Vijay L Hallappanavar 1, Basavaraj P Halagali 2, Veena V Desai 3 1 KLES s College of Engineering & Technology, Chikodi, Karnataka 2 V S M Institute of

More information

A New variant of Hill Cipher Algorithm for Data Security

A New variant of Hill Cipher Algorithm for Data Security Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi

More information

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a

More information

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Computer Security 3/23/18

Computer Security 3/23/18 s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks

More information

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION V. Sumathy & C. Navaneethan Assistant Professor, Department of CSE, Kingston Engineering College, Vellore, Tamil Nadu, India ABSTRACT In this paper we present

More information

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm FPGA Can be Implemented Using Advanced Encryption Standard Algorithm Shahin Shafei Young Researchers and Elite Club, Mahabad Branch, Islamic Azad University, Mahabad, Iran Email:Shahin_shafei@yahoo.com

More information

Delineation of Trivial PGP Security

Delineation of Trivial PGP Security IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr.

More information

Encryption Details COMP620

Encryption Details COMP620 Encryption Details COMP620 Encryption is a powerful defensive weapon for free people. It offers a technical guarantee of privacy, regardless of who is running the government It s hard to think of a more

More information

A New hybrid method in watermarking using DCT and AES

A New hybrid method in watermarking using DCT and AES International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.64-69 A New hybrid method in watermarking using

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication

128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication

More information

AES algorithm using advance key implementation in MATLAB

AES algorithm using advance key implementation in MATLAB AES algorithm using advance key implementation in MATLAB Chaudhary Saifurrab 1, Saqlain Mirza 2 1 M.Tech. Scholar department of ECE, Al-Falah University, Faridabad, Haryana (India) 2Asst. professor 1 department

More information

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM P. Aatheeswaran 1, Dr.R.Suresh Babu 2 PG Scholar, Department of ECE, Jaya Engineering College, Chennai, Tamilnadu, India 1 Associate

More information

Introduction to information Security

Introduction to information Security First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:

More information

ANALYSIS OF AES ENCRYPTION WITH ECC

ANALYSIS OF AES ENCRYPTION WITH ECC ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer

More information

P2_L6 Symmetric Encryption Page 1

P2_L6 Symmetric Encryption Page 1 P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,

More information

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time

More information

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos A Survey On SecureImage Encryption Technique Using Blowfish And Chaos Romani Patel 1,Krunal Panchal 2 1 Research Scholar, Information Technology, L.J Institute Of Engineering And Technology, Ahmedabad,

More information

FPGA IMPLEMENTATION OF HIGHLY AREA EFFICIENT ADVANCED ENCRYPTION STANDARD ALGORITHM

FPGA IMPLEMENTATION OF HIGHLY AREA EFFICIENT ADVANCED ENCRYPTION STANDARD ALGORITHM FPGA IMPLEMENTATION OF HIGHLY AREA EFFICIENT ADVANCED ENCRYPTION STANDARD ALGORITHM D. Arivazhaki, V. Vijayakumar and T. Ravi Department of Electronics and Communication Engineering, Sathyabama University,

More information

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos ECE596C: Handout #7 Analysis of DES and the AES Standard Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract. In this lecture we analyze the security properties of DES and

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List 1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the

More information

Secret Key Cryptography

Secret Key Cryptography Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 6: Advanced Encryption Standard (AES) Ion Petre Department of IT, Åbo Akademi University 1 Origin of AES 1999: NIST

More information

Enhanced 3-D PLAYFAIR Cipher

Enhanced 3-D PLAYFAIR Cipher Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering

More information

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key 1/56 CSc 466/566 Computer Security 6 : Cryptography Symmetric Key Version: 2012/02/22 16:14:16 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Modified Advanced Encryption Standard For Text And Images

Modified Advanced Encryption Standard For Text And Images Computer Science Journal Volume 1, Issue 3, December 211 Modified Advanced Encryption Standard For Text And Images Sumira Hameed 1, Faisal Riaz 2,Riaz Moghal 3, Gulraiz Akhtar 4, Anil Ahmed 5, Abdul Ghafoor

More information

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4 EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

Tuesday, January 17, 17. Crypto - mini lecture 1

Tuesday, January 17, 17. Crypto - mini lecture 1 Crypto - mini lecture 1 Cryptography Symmetric key cryptography (secret key crypto): sender and receiver keys identical Asymmetric key cryptography (public key crypto): encryption key public, decryption

More information

Classical Cryptography. Thierry Sans

Classical Cryptography. Thierry Sans Classical Cryptography Thierry Sans Example and definitions of a cryptosystem Caesar Cipher - the oldest cryptosystem A shift cipher attributed to Julius Caesar (100-44 BC) MEET ME AFTER THE TOGA PARTY

More information

Symmetric-Key Cryptography

Symmetric-Key Cryptography Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016 Announcements Project due Sept 20 Special guests Alice Bob The attacker (Eve - eavesdropper, Malice) Sometimes Chris

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science

More information

AES ALGORITHM FOR ENCRYPTION

AES ALGORITHM FOR ENCRYPTION Volume 02 - Issue 05 May 2016 PP. 63-68 AES ALGORITHM FOR ENCRYPTION Radhika D.Bajaj M.Tech VLSI G.H. Raisoni Institute of Engineering And Technology For Women, Nagpur. Dr. U.M. Gokhale Electronics and

More information

18-642: Cryptography 11/15/ Philip Koopman

18-642: Cryptography 11/15/ Philip Koopman 18-642: Cryptography 11/15/2017 Cryptography Overview Anti-Patterns for Cryptography Using a home-made cryptographic algorithm Using private key when public key is required Not considering key distribution

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

Overview of Conventional Encryption Techniques

Overview of Conventional Encryption Techniques Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption

More information

Diversified Caesar Cipher for Impeccable Security

Diversified Caesar Cipher for Impeccable Security Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics

More information

Webpage: Volume 5, Issue VII, July 2017 ISSN

Webpage:   Volume 5, Issue VII, July 2017 ISSN Image Security using Non-Linear Data Structure Dr. S. Kiran 1, R. Pradeep Kumar Reddy 2, V. Siva Kumar 3, P. Veereshkumar Goud 4 1,2 Assistant Professor, 3,4 Student 1,2,3,,4 Dept. of CSE, YSR Engineering

More information

Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm

Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm G. Alisha Evangeline, S. Krithiga, J. Jesu Mejula Abstract Advanced Encryption Standard (AES) is the symmetric key standard

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Applications and Standards Third Edition William Stallings Chapter 2 Symmetric Encryption and Message Confidentiality Dr. BHARGAVI H. GOSWAMI Department of Computer Science

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect

Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect 1 Aumreesh Saxena, 2 Sourabh Singh 1 Sagar Institute of Research Technology and Science, Bhopal, Madhya Pradesh

More information

Cryptographic Algorithms - AES

Cryptographic Algorithms - AES Areas for Discussion Cryptographic Algorithms - AES CNPA - Network Security Joseph Spring Department of Computer Science Advanced Encryption Standard 1 Motivation Contenders Finalists AES Design Feistel

More information

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption

More information

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data

More information

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers

More information

Area Optimization in Masked Advanced Encryption Standard

Area Optimization in Masked Advanced Encryption Standard IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V1 PP 25-29 www.iosrjen.org Area Optimization in Masked Advanced Encryption Standard R.Vijayabhasker,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 e-issn (O): 2348-4470 p-issn (P): 2348-66 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May-17 Comparaitive Analysis

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

HOST Cryptography III ECE 525 ECE UNM 1 (1/18/18)

HOST Cryptography III ECE 525 ECE UNM 1 (1/18/18) AES Block Cipher Blockciphers are central tool in the design of protocols for shared-key cryptography What is a blockcipher? It is a function E of parameters k and n that maps { 0, 1} k { 0, 1} n { 0,

More information

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used for both encryption and decryption.

More information

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

Vol. 1, Issue VIII, Sep ISSN

Vol. 1, Issue VIII, Sep ISSN Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,

More information

PROTECTING CONVERSATIONS

PROTECTING CONVERSATIONS PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication

More information

Scanned by CamScanner

Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Symmetric-Key Cryptography CS 161: Computer Security

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 5 Advanced Encryption Standard Advance Encryption Standard Topics Origin of AES Basic AES Inside Algorithm Final Notes Origins

More information

Goals of Modern Cryptography

Goals of Modern Cryptography Goals of Modern Cryptography Providing information security: Data Privacy Data Integrity and Authenticity in various computational settings. Data Privacy M Alice Bob The goal is to ensure that the adversary

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Advance Encryption Standard (AES) Rijndael algorithm is symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256

More information

Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data

Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data Ako Muhamad Abdullah MSc Computer Science UK PhD Student in Computer Science Department of Applied Mathematics & Computer Science

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 23 Wenbing Zhao wenbingz@gmail.com http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB

More information

Design and Implementation of Encryption Unit Based on Customized AES Algorithm

Design and Implementation of Encryption Unit Based on Customized AES Algorithm International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 33 Design and Implementation of Encryption Unit Based on Customized AES Algorithm Nabil Hamdy #1, Khaled

More information

Science & Technology (DCRUST), Sonepat

Science & Technology (DCRUST), Sonepat A Hybrid Approach for Data Encryption and Hema Arora 1, Anil Arora 2 1 Department of Computer ScienceGateway Institute of Engineering & Technology (GIET), Deenbandhu Chhotu Ram University of Science &

More information