PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC
KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES
ABSTRACT
The secret messages passed through network are hacked and algorithms
are not efficient to the expected level. A powerful encryption technique is
introduced and performs a large variety of generating keys to encrypt the
message in the form of pictures. The arithmetic operations are performed over
the picture key to make the technique even more powerful. First encryption is
done with the help of vigenere cipher and the key is generated through picture.
Second encryption is done with the help of newly designed 10x26 table and the
key is generated from the first key. The decryption is done by the reverse of
encryption process.
EXISTING SYSTEM
The cryptographic systems use the key to encrypt messages in the form of text or
string. Vigenere cipher can be broken using counting diagram.Total number of combinations
required to break the system using counting diagram is very small. Large key size makes the
system less efficient. The secret key to perform encryption is more reliable to attack because
it is an easily recognizable format.
PROPOSED SYSTEM
The encryption of the message is done using the picture key which is difficult to
break. Total number of combinations required to break the system exceeds hundred digit
number and more with increase in number of pictures. The system performances increases
with increase in key size. The system uses two main operations to make the key stronger. The
first operation is LOCK-10(Logical Crypto Key)is performed over the secret code to get the
picture sorting key.LOCK-10 involves 10 different operations and these are performed over
the secret code to get the picture sorting key. The operation LOCK-10 can be performed in 10
factorial ways .The picture sorting key is obtained and the ‘N’ pictures are arranged in one of
the ‘N’ factorial ways. The PACK(Picture Arithmetic Crypto Key) operation is performed
over the picture key to get the first key. The second key is generated from the first key by
performing LOCK-5 operation over the first key. The vigenere encryption is performed over
the first key and encryption is performed over the second key with the help of 10x26 matrix.
Increase in number of pictures used for ciphering, increases the system performance
proportionally.
REQUIREMENT SPECIFICATIONS
HARDWARE REQUIREMENT
Processor : Pentium IV or above
Ram : 512 MB
Hdd : 80 GB
SOFTWARE REQUIREMENT
Operating system : windows
Platform : c#.Net 4.0
Front End : C Sharp