WELCOME By P. Harini M.R. Rahul Raj P. Suresh
STEGANOGRAPHY Seeing the Invisible
Aim of The Project To familiarize the audience what
STEGANOGRAPHY is all about. To provide security for our confidential
Messages. To explain it’s advantage over other
technology.
STEGANOGRAPHY What is STEGANOGRAPHY? How it is related to Cyber Security? Advanced Encryption Standard (AES)
Technologies Java 2 Standard edition (J2SE) Abstract Window Tool Kit (AWT) Java Swings Java Script
Scope of The Project
Designed to make an entire body of information unreadable.
Converts plain text into a secret code for transmission over a public network, such as the Internet.
It provides privacy and confidentiality, access control, proof of document transmission, and document archiving and retrieval support.
The AES Cipher Block length is limited to 128 bit The key size can be independently
specified to 128, 192 or 256 bits Key size (words/bytes/bits) Number of rounds Expanded key size (words/byte)
4/16/12 8 10
6/24/192 8/32/256 12
14
44/176
52/208
60/240
The AES Cipher AddRoundKey() – round key is added to
the State using XOR operation
Substitute Bytes() – uses S-box to perform
a byte-by-byte substitution of State
ShiftRows() – processes the State by
cyclically shifting the last three rows of the State by different offsets
MixColumns() – takes all the
columns of the State and mixes their data, independently of one another, making use of arithmetic over GF(2^8)
The AES Cipher Only Add round key makes use of the key Other three functions are used for
diffusion and confusion Final round consists of only three stages
The AES Cipher plaintext Add round key
Shift rows
Shift rows
Shift rows
Mix columns
Add round key
Add round key
Cipher text
Mix columns Add Round key W[4,7]
key
Round 9
Substitute bytes Round 1
Substitute bytes
W[36,39]
Substitute bytes
W[40,43]
The AES Inverse Cipher Decryption algorithm
uses the expanded
key in reverse order All functions are easily reversible and their inverse form is used in decryption Decryption algorithm is not identical to the encryption algorithm Again, final round consists of only three stages
The AES Inverse Cipher
ciphertext
Add round key
Inv. Sub bytes
Inv. Sub bytes
Inv. Sub bytes
Add round key
Add round key
Add round key Inv. Mix Columns W[36,39]
key
Round 9
Inv. Shift rows Round 1
Inv. Shift rows
Inv. Mix columns W[4,7]
Inv. Shift rows
plaintext W[0,3]
Advantages
Encryption software protects Internet-connected computers from crackers and other online intruders. The technology is widely used to encrypt credit card information, bank account numbers, and other types of financial records so they can be sent safely and securely across the Internet. Protect much of the intellectual content that's marketed on the Web, such as music, videos, articles, and software, restricting its availability to paying customers.
Conclusion Hide data practically everywhere Detection of Steganography
− Possible, but can be difficult − Fastest for small blocks and hashes encryption Defeating Steganography is not hard
THANK YOU