steganography (rahul raj)

18
WELCOME WELCOME By By P. Harini P. Harini M.R. Rahul Raj M.R. Rahul Raj P. Suresh P. Suresh

Upload: rahul-raj

Post on 13-Nov-2014

842 views

Category:

Documents


0 download

DESCRIPTION

In this PPT you can get the details of Stenography Technology which uses Encryption algorithms. In this we used AES algorithm to develop this technology.

TRANSCRIPT

Page 1: Steganography (Rahul Raj)

WELCOMEWELCOME

ByByP. HariniP. Harini

M.R. Rahul RajM.R. Rahul RajP. SureshP. Suresh

Page 2: Steganography (Rahul Raj)

STEGANOGRAPHYSTEGANOGRAPHY

Seeing the InvisibleSeeing the Invisible

Page 3: Steganography (Rahul Raj)

Aim of The ProjectAim of The Project

To familiarize the audience what To familiarize the audience what STEGANOGRAPHY is all about.STEGANOGRAPHY is all about.

To provide security for our confidential To provide security for our confidential Messages.Messages.

To explain it’s advantage over other To explain it’s advantage over other technology.technology.

Page 4: Steganography (Rahul Raj)

STEGANOGRAPHYSTEGANOGRAPHY

What is STEGANOGRAPHY?What is STEGANOGRAPHY?

How it is related to Cyber Security?How it is related to Cyber Security?

Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)

Page 5: Steganography (Rahul Raj)

TechnologiesTechnologies

Java 2 Standard edition (J2SE)Java 2 Standard edition (J2SE)

Abstract Window Tool Kit (AWT)Abstract Window Tool Kit (AWT) Java SwingsJava Swings Java ScriptJava Script

Page 6: Steganography (Rahul Raj)

Scope of The ProjectScope of The Project

Designed to make an entire body of information Designed to make an entire body of information unreadable.unreadable.

Converts plain text into a secret code for Converts plain text into a secret code for transmission over a public network, such as the transmission over a public network, such as the Internet.Internet.

It provides privacy and confidentiality, access It provides privacy and confidentiality, access control, proof of document transmission, and control, proof of document transmission, and document archiving and retrieval support. document archiving and retrieval support.

Page 7: Steganography (Rahul Raj)

The AES Cipher The AES Cipher

Block length is limited to 128 bitBlock length is limited to 128 bit The key size can be independently The key size can be independently

specified to 128, 192 or 256 bitsspecified to 128, 192 or 256 bits

Key size (words/bytes/bits)Key size (words/bytes/bits) 4/16/124/16/1288

6/24/1926/24/192 8/32/2568/32/256

Number of roundsNumber of rounds 1010 1212 1414

Expanded key size Expanded key size (words/byte)(words/byte)

44/17644/176 52/20852/208 60/24060/240

Page 8: Steganography (Rahul Raj)

The AES CipherThe AES Cipher

AddRoundKey() – round key is added to AddRoundKey() – round key is added to the State using XOR operationthe State using XOR operation

Page 9: Steganography (Rahul Raj)

Substitute Bytes() – uses S-box to perform Substitute Bytes() – uses S-box to perform a byte-by-byte substitution of Statea byte-by-byte substitution of State

Page 10: Steganography (Rahul Raj)

ShiftRows() – processes the State by ShiftRows() – processes the State by cyclically shifting the last three rows of the cyclically shifting the last three rows of the State by different offsetsState by different offsets

Page 11: Steganography (Rahul Raj)

MixColumns() – takes all the columns of MixColumns() – takes all the columns of the State and mixes their data, the State and mixes their data, independently of one another, making use independently of one another, making use of arithmetic over GF(2^8)of arithmetic over GF(2^8)

Page 12: Steganography (Rahul Raj)

The AES CipherThe AES Cipher

Only Add round key makes use of the keyOnly Add round key makes use of the key Other three functions are used for diffusion Other three functions are used for diffusion

and confusion and confusion Final round consists of only three stagesFinal round consists of only three stages

Page 13: Steganography (Rahul Raj)

The AES CipherThe AES Cipher

Add round key

Substitute bytes

Shift rows

Mix columns

Add Round key

Substitute bytes

Shift rows

Mix columns

Add round key

Substitute bytes

Shift rows

Add round key

plaintext

Cipher text

keyW[4,7] W[36,39] W[40,43]

Round 1

Round 9

Page 14: Steganography (Rahul Raj)

The AES Inverse CipherThe AES Inverse Cipher

Decryption algorithm uses the expanded Decryption algorithm uses the expanded key in reverse orderkey in reverse order

All functions are easily reversible and their All functions are easily reversible and their inverse form is used in decryptioninverse form is used in decryption

Decryption algorithm is not identical to the Decryption algorithm is not identical to the encryption algorithmencryption algorithm

Again, final round consists of only three Again, final round consists of only three stagesstages

Page 15: Steganography (Rahul Raj)

The AES Inverse Cipher

Add round key

Inv. Shift rows

Inv. Sub bytes

Add round key

Inv. Mix Columns

Inv. Shift rows

Inv. Sub bytes

Add round key

Inv. Mix columns

Inv. Shift rows

Inv. Sub bytes

Add round key

ciphertext

plaintext

keyW[36,39] W[4,7] W[0,3]

Round 1

Round 9

Page 16: Steganography (Rahul Raj)

AdvantagesAdvantages Encryption software protects Internet-connected Encryption software protects Internet-connected

computers from crackers and other online computers from crackers and other online intruders.intruders.

The technology is widely used to encrypt credit The technology is widely used to encrypt credit card information, bank account numbers, and card information, bank account numbers, and other types of financial records so they can be other types of financial records so they can be sent safely and securely across the Internet. sent safely and securely across the Internet.

Protect much of the intellectual content that's Protect much of the intellectual content that's marketed on the Web, such as music, videos, marketed on the Web, such as music, videos, articles, and software, restricting its availability to articles, and software, restricting its availability to paying customers.paying customers.

Page 17: Steganography (Rahul Raj)

ConclusionConclusion

Hide data practically everywhereHide data practically everywhere

Detection of Detection of SteganographySteganography− − Possible, but can be difficultPossible, but can be difficult− − Fastest for small blocks and Fastest for small blocks and

hashes hashes encryption encryption Defeating Defeating SteganographySteganography is not hard is not hard

Page 18: Steganography (Rahul Raj)

THANK YOUTHANK YOU