steganography (rahul raj)
DESCRIPTION
In this PPT you can get the details of Stenography Technology which uses Encryption algorithms. In this we used AES algorithm to develop this technology.TRANSCRIPT
WELCOMEWELCOME
ByByP. HariniP. Harini
M.R. Rahul RajM.R. Rahul RajP. SureshP. Suresh
STEGANOGRAPHYSTEGANOGRAPHY
Seeing the InvisibleSeeing the Invisible
Aim of The ProjectAim of The Project
To familiarize the audience what To familiarize the audience what STEGANOGRAPHY is all about.STEGANOGRAPHY is all about.
To provide security for our confidential To provide security for our confidential Messages.Messages.
To explain it’s advantage over other To explain it’s advantage over other technology.technology.
STEGANOGRAPHYSTEGANOGRAPHY
What is STEGANOGRAPHY?What is STEGANOGRAPHY?
How it is related to Cyber Security?How it is related to Cyber Security?
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
TechnologiesTechnologies
Java 2 Standard edition (J2SE)Java 2 Standard edition (J2SE)
Abstract Window Tool Kit (AWT)Abstract Window Tool Kit (AWT) Java SwingsJava Swings Java ScriptJava Script
Scope of The ProjectScope of The Project
Designed to make an entire body of information Designed to make an entire body of information unreadable.unreadable.
Converts plain text into a secret code for Converts plain text into a secret code for transmission over a public network, such as the transmission over a public network, such as the Internet.Internet.
It provides privacy and confidentiality, access It provides privacy and confidentiality, access control, proof of document transmission, and control, proof of document transmission, and document archiving and retrieval support. document archiving and retrieval support.
The AES Cipher The AES Cipher
Block length is limited to 128 bitBlock length is limited to 128 bit The key size can be independently The key size can be independently
specified to 128, 192 or 256 bitsspecified to 128, 192 or 256 bits
Key size (words/bytes/bits)Key size (words/bytes/bits) 4/16/124/16/1288
6/24/1926/24/192 8/32/2568/32/256
Number of roundsNumber of rounds 1010 1212 1414
Expanded key size Expanded key size (words/byte)(words/byte)
44/17644/176 52/20852/208 60/24060/240
The AES CipherThe AES Cipher
AddRoundKey() – round key is added to AddRoundKey() – round key is added to the State using XOR operationthe State using XOR operation
Substitute Bytes() – uses S-box to perform Substitute Bytes() – uses S-box to perform a byte-by-byte substitution of Statea byte-by-byte substitution of State
ShiftRows() – processes the State by ShiftRows() – processes the State by cyclically shifting the last three rows of the cyclically shifting the last three rows of the State by different offsetsState by different offsets
MixColumns() – takes all the columns of MixColumns() – takes all the columns of the State and mixes their data, the State and mixes their data, independently of one another, making use independently of one another, making use of arithmetic over GF(2^8)of arithmetic over GF(2^8)
The AES CipherThe AES Cipher
Only Add round key makes use of the keyOnly Add round key makes use of the key Other three functions are used for diffusion Other three functions are used for diffusion
and confusion and confusion Final round consists of only three stagesFinal round consists of only three stages
The AES CipherThe AES Cipher
Add round key
Substitute bytes
Shift rows
Mix columns
Add Round key
Substitute bytes
Shift rows
Mix columns
Add round key
Substitute bytes
Shift rows
Add round key
plaintext
Cipher text
keyW[4,7] W[36,39] W[40,43]
Round 1
Round 9
The AES Inverse CipherThe AES Inverse Cipher
Decryption algorithm uses the expanded Decryption algorithm uses the expanded key in reverse orderkey in reverse order
All functions are easily reversible and their All functions are easily reversible and their inverse form is used in decryptioninverse form is used in decryption
Decryption algorithm is not identical to the Decryption algorithm is not identical to the encryption algorithmencryption algorithm
Again, final round consists of only three Again, final round consists of only three stagesstages
The AES Inverse Cipher
Add round key
Inv. Shift rows
Inv. Sub bytes
Add round key
Inv. Mix Columns
Inv. Shift rows
Inv. Sub bytes
Add round key
Inv. Mix columns
Inv. Shift rows
Inv. Sub bytes
Add round key
ciphertext
plaintext
keyW[36,39] W[4,7] W[0,3]
Round 1
Round 9
AdvantagesAdvantages Encryption software protects Internet-connected Encryption software protects Internet-connected
computers from crackers and other online computers from crackers and other online intruders.intruders.
The technology is widely used to encrypt credit The technology is widely used to encrypt credit card information, bank account numbers, and card information, bank account numbers, and other types of financial records so they can be other types of financial records so they can be sent safely and securely across the Internet. sent safely and securely across the Internet.
Protect much of the intellectual content that's Protect much of the intellectual content that's marketed on the Web, such as music, videos, marketed on the Web, such as music, videos, articles, and software, restricting its availability to articles, and software, restricting its availability to paying customers.paying customers.
ConclusionConclusion
Hide data practically everywhereHide data practically everywhere
Detection of Detection of SteganographySteganography− − Possible, but can be difficultPossible, but can be difficult− − Fastest for small blocks and Fastest for small blocks and
hashes hashes encryption encryption Defeating Defeating SteganographySteganography is not hard is not hard
THANK YOUTHANK YOU