8
A Competitive Study of Cryptography Techniques over Block Cipher B.Sandeep kumar (08W81A1237) L.Mallesh (08W81A1219) P.Abshiek (08W81A1227) Under The Guidance Of Mr.Shravan(Asst.Pro fess)

Presentation 1

Embed Size (px)

Citation preview

Page 1: Presentation 1

A Competitive Study of Cryptography Techniques over Block Cipher

B.Sandeep kumar (08W81A1237)L.Mallesh (08W81A1219)P.Abshiek (08W81A1227)

Under The Guidance OfMr.Shravan(Asst.Profess)

Page 2: Presentation 1

ABSTRACT The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography. Cryptography process seeks to distribute an estimation of basic cryptographic primitives across a number of confluences in order to reduce security assumptions on individual nodes, which establish a level of fault tolerance opposing to the node alteration. In a progressively networked and distributed communications environment, there are more and more useful situations where the ability to distribute a computation between a number of unlike network intersections is needed.The reason back to the efficiency (separate nodes perform distinct tasks), fault-tolerance (if some nodes are unavailable then others can perform the task) and security (the trust required to perform the task is shared between nodes) that order differently. Hence, the aim is to describe and review the different research that has done toward text encryption and description in the block cipher. Moreover, to suggest a cryptography model in the block cipher.

Page 3: Presentation 1

EXISTING SYSTEM

Generally, the utilization of the encryption techniques has raises different security issues, which consisted mostly on how to effectively manage the encryption keys to ensure that they are safeguarded throughout their life cycle and are protected from unauthorized disclosure and modification.

Several reasons in the encryption of information over block cipher are observed in terms of key management, which known as an important issue to the public safety community, most of these issues addressed the following:

Difficulties in addressing the security issues regarding encryption key management;

Lacks in providing a suitable details about the different threats in terms of decision makers on the importance of key management;

Page 4: Presentation 1

PROPOSED SYSTEM

•Sequentially, providing a secure and flexible cryptography mechanism raises the needs for analyzing and comparing different encryption algorithms for the aim of enhancing the security during the encryption process.

• Hence, this paper suggested a cryptography mechanism in the block cipher by managing the keys sequentially.

• These keys will works dependently for extracting and generating the content relation to be managed later by the key management that helps to communicate and share sensitive information.

•This model aims to secure dissemination, loading, saving, and eliminating faults of keys to make encryption implementations effective.

•This risk can be meaningfully appeased through sufficient key controls and proper education on encryption key management.

Page 5: Presentation 1

MODULES

Homophonic Cryptographic Ide Encryption Module With Key Generation Decryption Module

Decryption Module:

This module is the opposite as such as Encryption module where the Key file should be also specified same as that of encryption part. Then the user should select the encrypted cover file and then should select the extract button so that the hidden message is displayed in the text area specified in the application or else it is extracted to the place where the user specifies it.

 Encryption Module:

In Encryption module, it consists of Key file part, where key file can be specified with the password as a special security in it. Then the user can type the data or else can up load the data also though the browse button, when it is clicked the open file dialog box is opened and where the user can select the secret message

Page 6: Presentation 1

 Encryption Module:

In Encryption module, it consists of Key file part, where key file can be specified with the password as a special security in it. Then the user can type the data or else can up load the data also though the browse button, when it is clicked the open file dialog box is opened and where the user can select the secret message. Then the user can select the image or video file through another open file dialog box which is opened when the cover file button is clicked.

Where the user can select the cover file and then the Hide button is clicked so that the secret data or message is hidden in cover file using Forbidden Zone Data Hiding Technique

Page 7: Presentation 1

Hardware Requirements:

• System : Pentium IV 2.4 GHz.• Hard Disk : 40 GB.• Floppy Drive : 1.44 Mb.• Monitor : 15 VGA Colour.• Mouse : Logitech.• Ram : 256 Mb

Software Requirements:

•Operating system :- Windows XP Professional•Front End :- JAVA, Swing(JFC)•Tool : Eclipse 3.3

System Requirements

Page 8: Presentation 1

Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender,ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit.

This paper describes the cryptographic concepts of symmetric key encryption, public-key encryption, types of encryption algorithms, hash algorithms, digital signatures, and key exchange.

Conclusion