Steganography (rahul Raj)

  • Uploaded by: Rahul Raj
  • 0
  • 0
  • December 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Steganography (rahul Raj) as PDF for free.

More details

  • Words: 518
  • Pages: 18
WELCOME By P. Harini M.R. Rahul Raj P. Suresh

STEGANOGRAPHY Seeing the Invisible

Aim of The Project  To familiarize the audience what

STEGANOGRAPHY is all about.  To provide security for our confidential

Messages.  To explain it’s advantage over other

technology.

STEGANOGRAPHY  What is STEGANOGRAPHY?  How it is related to Cyber Security?  Advanced Encryption Standard (AES)

Technologies  Java 2 Standard edition (J2SE) Abstract Window Tool Kit (AWT)  Java Swings  Java Script 

Scope of The Project 

Designed to make an entire body of information unreadable.



Converts plain text into a secret code for transmission over a public network, such as the Internet.



It provides privacy and confidentiality, access control, proof of document transmission, and document archiving and retrieval support.

The AES Cipher  Block length is limited to 128 bit  The key size can be independently

specified to 128, 192 or 256 bits Key size (words/bytes/bits) Number of rounds Expanded key size (words/byte)

4/16/12 8 10

6/24/192 8/32/256 12

14

44/176

52/208

60/240

The AES Cipher  AddRoundKey() – round key is added to

the State using XOR operation

 Substitute Bytes() – uses S-box to perform

a byte-by-byte substitution of State

 ShiftRows() – processes the State by

cyclically shifting the last three rows of the State by different offsets

 MixColumns() – takes all the

columns of the State and mixes their data, independently of one another, making use of arithmetic over GF(2^8)

The AES Cipher  Only Add round key makes use of the key  Other three functions are used for

diffusion and confusion  Final round consists of only three stages

The AES Cipher plaintext Add round key

Shift rows

Shift rows

Shift rows

Mix columns

Add round key

Add round key

Cipher text

Mix columns Add Round key W[4,7]

key

Round 9

Substitute bytes Round 1

Substitute bytes

W[36,39]

Substitute bytes

W[40,43]

The AES Inverse Cipher  Decryption algorithm

uses the expanded

key in reverse order  All functions are easily reversible and their inverse form is used in decryption  Decryption algorithm is not identical to the encryption algorithm  Again, final round consists of only three stages

The AES Inverse Cipher

ciphertext

Add round key

Inv. Sub bytes

Inv. Sub bytes

Inv. Sub bytes

Add round key

Add round key

Add round key Inv. Mix Columns W[36,39]

key

Round 9

Inv. Shift rows Round 1

Inv. Shift rows

Inv. Mix columns W[4,7]

Inv. Shift rows

plaintext W[0,3]

Advantages 





Encryption software protects Internet-connected computers from crackers and other online intruders. The technology is widely used to encrypt credit card information, bank account numbers, and other types of financial records so they can be sent safely and securely across the Internet. Protect much of the intellectual content that's marketed on the Web, such as music, videos, articles, and software, restricting its availability to paying customers.

Conclusion  Hide data practically everywhere  Detection of Steganography

− Possible, but can be difficult − Fastest for small blocks and hashes encryption  Defeating Steganography is not hard

THANK YOU

Related Documents


More Documents from "Rahul Raj"