Webpage: Volume 5, Issue VII, July 2017 ISSN
|
|
- Kerrie Tyler
- 5 years ago
- Views:
Transcription
1 Image Security using Non-Linear Data Structure Dr. S. Kiran 1, R. Pradeep Kumar Reddy 2, V. Siva Kumar 3, P. Veereshkumar Goud 4 1,2 Assistant Professor, 3,4 Student 1,2,3,,4 Dept. of CSE, YSR Engineering College of YVU Proddatur, AP, India, Pin no rkirans125@gmail.com, 2 pradeepmadhavi@gmail.com, 3 sanagsiva@gmail.com, 4 patil.veereshkkd@gmail.com Abstract: Cryptography is a challenging area in present era, communication is playing an essential role to maintain security. Security is one of the services in cryptography. Attackers are hacking the information with rapid growth of hacking techniques. The proposed work concentrates on binary tree traversal to make an effective security of images with tree data structures, complementary functions and logical operations. Trees are the part of non-linear data structures. There are several types, that are initiated in forming of trees. Among those one of the tree representation is a binary tree. In this work complete binary tree is used for encryption and decryption with only one traversal technique i.e. pre-order is utilized for cryptographic application. Keywords: Attacks, Communication, Complementary function, Data structures, Traversal techniques. 1. INTRODUCTION Now a day s, information is sharing in the form of images from one person to another person. Maintaining the security for data from unauthorized access is a major challenge. The security for image is provided with encryption [1][6] and decryption algorithms. The word image is derived from the Latin word imago. Image means the representation of threedimensional or two-dimensional objects in the two dimensional plane to view the object. Images are divided into different types of images they are: 1. Binary images 2. Gray-scale images 3. Color images 4. Multispectral images Image is stored in different ways such as photos, icons, buttons, etc. The image is represented in two ways which are sample and quantize (digitize) the image function. Sampling means to take the finite number of points from the considered image [11], and quantization refers to the representation of the gray level value at the sampling point using finite number of bits. Each image sample is called a pixel. Cryptography is used for the security purpose to enhance security from the intruders. The concept of cryptography uses different types of encryption algorithms that makes the original to scribble data. The encryption techniques may use different keys that cannot recognized by the intruders. The keys are the main part in secure data transmission. Cryptography can have two parts: 1. Symmetric cryptography A single key can be used for encryption and decryption in the case of symmetric [7] cryptography. 2. Asymmetric cryptography The pair of keys used in asymmetric [8] cryptography, one for public used for encryption and another for private used to decryption. Services of cryptography: 1. Access control 2. Authentication 3. Security 4. Privacy 5. Integrity 6. Key management 7. Non-Refutation 8. Accessibility 2. LITERATURE REVIEW 1. A block cipher generation using an innovative permutation algorithm [4]. This paper uses different combinations of ASCII values. The concept of permutation used in different rounds to make the cipher text [6] as more strong from the brute force attacks. 2. A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm [9]. This paper gives the detailed note on MSA algorithm its problem and also given the solution for the MSA by extending its range to improve the efficiency and security. They used a large matrix to generate a key which can t easily decrypt by any number of attacks. 3. On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability [5]. The authors mainly concentrated on KSAC different types of encryptions in the incidence of eavesdropper, and they provided a formula which makes strong key that can t brakes to any attacks. 4. Boolean Algebra based Effective and Efficient Asymmetric Key Cryptography Algorithm: BAC Algorithm [3]. This paper given the information about, the security for the data which is transmitted via internet by using the simple Boolean techniques such as complementary functions and XOR operations. 5. Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions [10]. This paper shows how the symmetric encryption algorithms are enhanced in maintaining the security. This paper also reduces the size and execution time of program. 3. PROPOSED METHOD In this proposed algorithm, the data is divided into 3*5 block size. It can ignore data if the data is less than the block size. Reverse the block to create the complete binary tree and Page 1
2 change the tree into its mirror image. Apply the pre-order traversal technique for encryption process. After applying traversal apply the two s complement for each block. 3.1 Encryption Algorithm Steps for the encryption algorithm 1. Read the image 2. Divide the image into 3*5 block 3. Exchange the values of 3*5 block 4. Mirror image of binary tree 5. Apply Preorder traversal for each block of above step 6. Apply 2 s complement 7. Apply the Nibble changing [2] with in a byte 8. Generate cipher image 3.2 Decryption Algorithm Steps for the decryption algorithm 1. Read the cipher image 2. Divide the image into 3*5 block 3. Apply the Nibble changing with in a byte 4. Apply 2 s complement after the nibble changing 5. Apply Preorder traversal for each block of above step 6. Mirror image of binary tree 7. Exchange the values of 3*5 block 8. Generate original image 3.3 Flowcharts of Encryption and Decryption Algorithm Flowchart for the encryption algorithm Fig. 2: Algorithm for Decryption 3.4 Example The above procedure is explained with detail example as follows Step1: Read the file NETWORKSECURITY Step 2: Divide information into 3*5 blocks and find their ASCII values Step 3: Exchange the values within the block Original values: 78, 69, 84, 87, 79, 82, 75, 83, 69, 67, 85, 82, 73,84, 89 Changed values:89, 84, 73, 82, 85, 67, 69, 83, 75, 82, 79, 87, 84, 69, 78 Step 4: Binary tree and Mirror image of binary tree Fig. 1: Algorithm for Encryption Flowchart for the decryption algorithm Fig. 3: Binary tree Page 2
3 Fig. 4: Mirror image of binary tree Step 5: Apply Preorder traversal for each block of above step 89,73,87,79,69,84,67,82,78,69,82,84,85,75,83 Fig. 7: Preorder traversal 89,73,69,78,69,67,84,87,84,85,79,82,82,75,83 Fig. 5: Preorder traversal 89,73,79,82,78,69,69,82,87,84,84,85,67,75,83 Fig. 8: Preorder traversal 89,73,78,87,84,69,85,79,69,67,82,82,84,75,83 Fig. 6: Preorder traversal 89,73,82,82,87,78,84,84,79,69,85,67,69,75,83 Fig. 9: Preorder traversal Page 3
4 Webpage: Volume 5, Issue VII, July 2017 Step 6: Apply 2 s complement Value of preorder form tree 2 s Complement Table 1: 2 s complement Step 8: Generate cipher image from the decimal values z{êêš+êê[esc]»øû»[ú Here the encryption process is completed. Then the decryption is the reverse process of the encryption process. 3.5 Results Step 7: Nibble swapping and changing decimal values Binary values Changed binary values Table 2: Nibble changing of binary values Changed Binary Decimal Value Table 3: Changing binary to decimal values (a) Original image (b) Encryption image (c) Decryption image Page 4
5 4. CONCLUSIONS AND FUTURE WORK The investigation of providing security for the image is a prominent role in the present era. The proposed system that gives strong security for the image than the other security mechanisms. This paper focuses on tree traversals technique, complementary functions and swapping techniques. These techniques enhance the image security. The future enhancement is that by applying combination of other traversal techniques may give more effective security. References [1] Dr. S. Kiran, G.Madhavi, D. Lakshmi sharanya, Syed Farzana, Classical Hybrid Technique Substitution and Transposition Techniques, International Journal of Computer Applications ( ) Volume 153 No4, November 2016 [2] Dr. S.Kiran, Dr. B.Reddaiah, D.NagaSravanthi, J.VenkataSivajayaSree, A Novel Encryption Using Nibble Swapping, International Journal of Advanced Information Science and Technology (IJAIST) ISSN: 2319:2682 Vol.4, No.9, September 2015 DOI: /IJAIST/2015.v4i [3] Niraj Kumar, Pankaj Gupta, Monika Sahu, Dr. M A Rizvi, Boolean Algebra based Effective and Efficient Asymmetric Key Cryptography Algorithm: BAC Algorithm, /13/$ , IEEE. [4] Kallam Ravindra Babu, Dr. S. Udaya Kumar and Dr. A. Vinaya Babu, A Block Cipher Generation Using An Innovative Permutation Algorithm, International Journal of Mathematical Archive-3(4), 2012, pp ISSN: , (Received: ; Accepted on: ). [5] Rajendra S. Katti, and Aida Vosoughi, On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability, IEEE Transactions on Information Forensics and Security, vol. 7, No.3, June 2012, pp [6] Ravindra Babu, Udaya Kumar and Vinaya babu, An Enhanced Ployalphabetic Cipher using Extended Vigenere Table, IJARCS, ( ), Volume2, No.2, Mar-April [7] Neeraj Khanna, Joel James, Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath, New Symmetric key Cryptographic algorithm using combined bit manipulation ans MSA encryption algorithm:njjsaa symmetric key algorithm, accepted for publication CSNT- 2011, IEEE International conference to be held at SMVDU, Jammu from 03/06/2011 to 05/06/2011. [8] Debanjan Das, Megholoya Mukharjee, Neha Choudhary, An Integrated Symmetric Key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm, /2011 IEEE. [9] Dripto Chatterjee, joyshree Nath, Suvadeep Dasgupta, Asoke Nath, A new Symmetric Key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm, International Conference on Communication Systems and Network Technologies, /11 $ IEEE, DOI /CSNT [10] Sean O Melia, and Adam J. Elbirt, Enhancing the performance of Symmetric-Key Cryptography via Instruction Set Extensions, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 18, no. 11, pp , November [11] G. Jakimosi and K. P. Subbalaksmi, Cryptanalysis of some multimedia encryption schemes, IEEE Trans. Multimedia, vol. 10, No.3, pp , Apr Page 5
A.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.
An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions Ravindra Babu Kallam Research Scholar, J.N.T.U,
More informationA Novel Design For Generating Dynamic Length Message Digest To Ensure Integrity Using Block Cipher Approach
A Novel Design For Generating Dynamic Length Message Digest To Ensure Integrity Using Block Cipher Approach Umesh Gandhi 1, Dr.(Mrs.) Poonam Sinha 2, Ms. Rachna Kulhare 3 1(Department of I.I., UIT, Barkatullah
More informationAashijit Mukhopadhyay 2 Department of Computer Science St. Xavier s College(Autonomous) Kolkata, West Bengal India
ISSN: 2321-7782 (Online) Impact Factor: 6.047 Volume 4, Issue 10, October 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case
More informationSD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit-Manipulation to Exclude Repetition from a Message to be Encrypted
SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with -Manipulation to Exclude Repetition from a Message to be Encrypted Somdip Dey (Author) B.Sc. (Hons) Department of Computer Science
More informationNew Generation of Digital Academic-Transcripts using encrypted QR Code TM
313 New Generation of Digital Academic-Transcripts using encrypted QR Code TM Use of encrypted QR Code TM in Mark-sheets (Academic Transcripts) Somdip Dey Department of Computer Science, St. Xavier s College
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationDr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India
Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),
More informationHill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key
International Journal of Computer Networks and Security, ISSN:25-6878, Vol.23, Issue.2 7 Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and
More informationA Combined Encryption Compression Scheme Using Chaotic Maps
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression
More informationA Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix
IAENG International Journal of Computer Science, 32:4, IJCS_32_4_ A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix S. Udaya Kumar V. U. K.
More informationENHANCED AES ALGORITHM FOR STRONG ENCRYPTION
ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION V. Sumathy & C. Navaneethan Assistant Professor, Department of CSE, Kingston Engineering College, Vellore, Tamil Nadu, India ABSTRACT In this paper we present
More informationANALYSIS OF AES ENCRYPTION WITH ECC
ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer
More informationFPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed
FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed Vijaya Kumar. B.1 #1, T. Thammi Reddy.2 #2 #1. Dept of Electronics and Communication, G.P.R.Engineering College,
More informationISSN: Page 320
A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar
More informationAn Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES
An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES Somdip Dey St. Xavier s College [Autonomous] Kolkata, India E-mail: somdipdey@ieee.org somdipdey@acm.org ABSTRACT The security
More informationAn Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion
Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using
More informationMulti-Level Encryption using SDES Key Generation Technique with Genetic Algorithm
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with
More informationSurvey: Recent Modifications in Vigenere Cipher
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 49-53 Survey: Recent Modifications in Vigenere Cipher Ranju S Kartha
More informationA SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS
Volume 116 No. 6 2017, 149-153 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET
More informationA Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix
Research Inventy: International Journal Of Engineering And Science Vol., Issue 9 (April 3), Pp - Issn(e): 7-47, Issn(p):-643, Www.Researchinventy.Com A Block Cipher Involving a Key Matrix a Key bunch Matrix,
More informationDelineation of Trivial PGP Security
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr.
More informationSecure Encryption Using Armstrong Number,Color Code ASCII and Prime Number
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color
More informationAnalysis of Cryptography and Pseudorandom Numbers
ISSN: 2454-2377 Volume 2, Issue 2, June 2016 Analysis of Cryptography and Pseudorandom Numbers Richa Agarwal Student, M. Tech., Computer Science, Invertis University, Bareilly, India Abstract: With the
More informationK Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39
A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition 1 V.U.K. Sastry, 2 K. Anup
More informationKeywords Block cipher, Blowfish, AES, IDEA, RC5.
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.72 e-issn (O): 2348-4470 p-issn (P): 2348-66 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May-17 Comparaitive Analysis
More informationA Proposed Cipher Technique with a Study of Existing Cryptography Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More informationLight Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2015, PP 84-91 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Light Weight Cellular Automata Computations
More informationA Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security Manas Paul 1 and Jyotsna Kumar Mandal 2 1 Dept. of Comp. Application, JIS College of Engineering,
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationReversible Data Hiding in Encrypted Images with Private Key Cryptography
Reversible Data Hiding in Encrypted Images with Private Key Cryptography Wajahath Hussain Razvi, Dr.Ch.Samson Abstract This project proposes a reversible scheme for cipher images which are encrypted using
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationVLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT K.Sandyarani 1 and P. Nirmal Kumar 2 1 Research Scholar, Department of ECE, Sathyabama
More informationInternational Journal of Computer Engineering and Applications,
International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
More informationA Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)
More informationJournal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION
Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Manikandan. G *1, Krishnan.G
More informationFPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM
FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM P. Aatheeswaran 1, Dr.R.Suresh Babu 2 PG Scholar, Department of ECE, Jaya Engineering College, Chennai, Tamilnadu, India 1 Associate
More informationMODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3
ISSN 2277-2685 IJESR/Feb 2015/ Vol-5/Issue-2/76-81 Rajdeep Chakraborty et. al./ International Journal of Engineering & Science Research MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT)
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationA Block Cipher Involving A Key Matrix And A Key Bunch Matrix, Supplemented With Permutation
The International Journal of Engineering And Science (IJES) Volume 1 Issue Pages 4-4 1 ISSN: 3 13 ISBN: 3 A Block Cipher Involving A Key Matrix And A Key Bunch Matrix, Supplemented With Permutation 1,
More informationISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationAn Automatic Generated Symmetric key Based Technique for Encryption and Decryption of Text Data
An Automatic Generated Symmetric key Based Technique for Encryption and Decryption of Text Data 1 ME StudentP P, Asst. ProfessorP 1 2 Roshan M. PandavP P, Vijay Kumar VermaP 2 P, Lord Krishna College of
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationComputer Security 3/23/18
s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks
More informationBlock Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition
Journal of Computer Science 6 (2): 133-140, 2010 ISSN 1549-3636 2010 Science Publications Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition K. Anup Kumar and V.U.K.
More informationImplementation of Modified Playfair CBC Algorithm
Implementation of Modified Playfair CBC Algorithm Priyanka Goyal Dept. of Computer Science & Engineering ITM Group of Institutions Gwalior, India Gaurav Sharma Dept. of Computer Science & Engineering ITM
More informationI. INTRODUCTION. Manisha N. Kella * 1 and Sohil Gadhiya2.
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology A Survey on AES (Advanced Encryption Standard) and RSA Encryption-Decryption in CUDA
More informationResearch Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)
International Journals of Advanced Research in Computer Science and Software Engineering ISS: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Image Encryption Based on 2D Baker Map and 1D Logistic
More informationEnhanced 3-D PLAYFAIR Cipher
Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering
More informationComputer and Data Security. Lecture 3 Block cipher and DES
Computer and Data Security Lecture 3 Block cipher and DES Stream Ciphers l Encrypts a digital data stream one bit or one byte at a time l One time pad is example; but practical limitations l Typical approach
More informationFPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E
FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption
More informationA SECURED LSB IMAGE STEGANOGRAPHY SYSTEM USING EDGE DETECTION, LZW COMPRESSION AND HYBRID ENCRYPTION METHODS
A SECURED LSB IMAGE STEGANOGRAPHY SYSTEM USING EDGE DETECTION, LZW COMPRESSION AND HYBRID ENCRYPTION METHODS S. N. Rekha 1, Y. Manjula 2, M.Z. Kurian 3 1 PG Student (DE), 2 Assistant Professor, 3 HOD,
More informationFPGA Based Design of AES with Masked S-Box for Enhanced Security
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 3 Issue 5ǁ May 2014 ǁ PP.01-07 FPGA Based Design of AES with Masked S-Box for Enhanced Security
More informationA Proposed Method for Cryptography using Random Key and Rotation of Text
Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf
More informationInternational Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES
Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The
More informationSECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY
Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh
More informationA New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 8, August 2015, PP 130-136 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A New Encryption and Decryption Algorithm
More informationAn Efficient FPGA Implementation of the Advanced Encryption Standard (AES) Algorithm Using S-Box
Volume 5 Issue 2 June 2017 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org An Efficient FPGA Implementation of the Advanced Encryption
More informationHybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm
ISSN : 0974 5572 International Science Press Volume 9 Number 40 2016 Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm D. Anitha a S. Aruna a Mathew a K. Mathew a and Devilal
More informationAn Application of Graph Theory in Cryptography
Volume 119 No. 13 2018, 375-383 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Application of Graph Theory in Cryptography P. Amudha 1 A.C. Charles Sagayaraj 2 A.C.Shantha Sheela
More informationAN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT
AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT 1 MANIKANDAN.G, 2 MANIKANDAN.R, 3 RAJENDIRAN.P, 4 KRISHNAN.G, 5 SUNDARGANESH.G 1 Assistant Professor, School of Computing, SASTRA University,
More informationInternational Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY
Scientific Journal of Impact Factor (SJIF): 3134 ISSN (Print): 2348-6406 ISSN (Online): 2348-4470 International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationArm Microcontroller Implementation of Des Using Concept with Time-Variable Key
Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,
More informationVol. 1, Issue VIII, Sep ISSN
Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,
More informationCombining TCP and UDP for Secure Data Transfer
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 8(S9), 285 291, May 2015 DOI: 10.17485/ijst/2015/v8iS9/65569 Combining TCP and UDP for Secure Data Transfer
More informationEncoding N-party Man-In-Middle Attack for Diffie Hellman Algorithm in a Client-Server Paradigm
Encoding N-party Man-In-Middle Attack for Diffie Hellman Algorithm in a Client-Server Paradigm Sulochana Devi # 1 Ritu Makani *2 #1Student of Masters of Technology, Department of Computer Science and Engineering
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationCombination of RGB Substitution for Text to Image Encryption Technique using AES
Combination of RGB Substitution for Text to Image Encryption Technique using AES Sourabh Singh 1 Department of Computer Science and Engineering Radharaman Institute of Technology and Science Bhopal (M.P),
More informationAN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS
Volume 2, Issue 7, PP:, SEPTEMBER 2014. AN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS P. Sagar Babu 1*, Prof.Ch.Srinivasa Kumar 2* 1. II. M.Tech (VLSI), Dept of ECE, AM Reddy Memorial
More informationA Block Cipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix
Journal of omputer Science 4 (): 7-4, 8 ISSN 549-3636 8 Science Publications A Block ipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix
More informationINTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Design of a Cryptosystem Using Two-Level Hill Cipher
Design of a Cryptosystem Using Two-Level Hill Sarla Dewangan 1, Mrs. Shikha Pandey 2, Mohammad Imroze Khan 3 1 M-Tech scholar, 2 Assistant Professor, 3 Assistant Professor 1,2 Rungta College of Engineering
More informationImage Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.194
More informationA Survey On SecureImage Encryption Technique Using Blowfish And Chaos
A Survey On SecureImage Encryption Technique Using Blowfish And Chaos Romani Patel 1,Krunal Panchal 2 1 Research Scholar, Information Technology, L.J Institute Of Engineering And Technology, Ahmedabad,
More informationAdvanced Cryptographic Technique Using Double Point Crossover
Advanced Cryptographic Technique Using Double Point Crossover P. Lakshmi Devi 1, G. Sai veena 2 Associate professor 1, Annamacharya Institute of Technology & Sciences, Rajampet, A.P, India M.Tech scholar
More informationImage Watermarking by SCHUR Decomposition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1155-1159 International Research Publications House http://www. irphouse.com Image Watermarking
More informationGenerating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security
Indian Journal of Science and Technology, Vol 7(S6), 1 5, October 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication
More informationCiphertext Cryptanalysis Using DES Functionality In Spartan3Upto 4 Round.
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 1, Issue 2 (October 2012), PP.44-50 Ciphertext Cryptanalysis Using DES Functionality
More informationBLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION
132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS
More informationKeywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box
Efficient Implementation of Aes By Modifying S-Box Vijay L Hallappanavar 1, Basavaraj P Halagali 2, Veena V Desai 3 1 KLES s College of Engineering & Technology, Chikodi, Karnataka 2 V S M Institute of
More informationProposal for Scrambled Method based on NTRU
Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,
More informationImplementation of Stronger S-Box for Advanced Encryption Standard
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 12 December - 2014 Pages 39-47 ISSN (e): 2319 1813 ISSN (p): 2319 1805 Implementation of Stronger S-Box for Advanced Encryption
More informationCryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái
Cryptography and Network Security Block Ciphers + DES Lectured by Nguyễn Đức Thái Outline Block Cipher Principles Feistel Ciphers The Data Encryption Standard (DES) (Contents can be found in Chapter 3,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A Biometric Authentication Based Secured ATM Banking System Shouvik
More informationPrinciples of Information Security, Fourth Edition. Chapter 8 Cryptography
Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries
More informationOptical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES
Journal of the Optical Society of Korea Vol. 19, No. 6, December 2015, pp. 592-603 ISSN: 1226-4776(Print) / ISSN: 2093-6885(Online) DOI: http://dx.doi.org/10.3807/josk.2015.19.6.592 Optical Implementation
More informationRashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,
SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification
More informationEnhance Security of Playfair Matrix Using Two 12X8 Playfair Matrix
Enhance Security of Playfair Matrix Using Two 12X8 Playfair Matrix Pavan Kumar*, Vedant Rastogi** Department of Computer Science & Engineering IET, Alwar Email:- pavan8661@gmail.com*,vedantnoki@gmail.com**
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org)
Online Smart card Verification using Three Level Authentication Latha.R 1 and Dr.T.R.Rangaswamy 2 1 Master of Computer Application, Agni College of Technology, Chennai, India 2 Information and Technology,
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES
More informationInternational Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD
International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, www.ijcea.com ISSN 2321-3469 ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD Namrata
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationUsing Error Detection Codes to detect fault attacks on Symmetric Key Ciphers
Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers Israel Koren Department of Electrical and Computer Engineering Univ. of Massachusetts, Amherst, MA collaborating with Luca Breveglieri,
More informationCryptography and Network Security
Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY
More informationA New variant of Hill Cipher Algorithm for Data Security
Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi
More informationInternational Journal of Mathematical Archive-7(2), 2016, Available online through ISSN
International Journal of Mathematical Archive(), 6, Available online through www.ijma.info ISSN 9 6 MULTIPLE ENCRYPTIONS OF INDEPENDENT CIPHERS A. CHANDRASEKHAR, D. CHAYA KUMARI*, CH.PRAGATHI AND ASHOK
More informationA NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS
IJRET: International Journal of Research in Engineering and Technology eissn: 2319-1163 pissn: 2321-738 A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS Kalavathi Alla 1, Sai Jyothi B 1,2
More information