4
PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES ABSTRACT The secret messages passed through network are hacked and algorithms are not efficient to the expected level. A powerful encryption technique is introduced and performs a large variety of generating keys to encrypt the message in the form of pictures. The arithmetic operations are performed over the picture key to make the technique even more powerful. First encryption is done with the help of vigenere cipher and the key is generated through picture. Second encryption is done with the help of newly designed 10x26 table and the key is generated from the first key. The decryption is done by the reverse of encryption process.

Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract

Embed Size (px)

Citation preview

Page 1: Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract

PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC

KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES

ABSTRACT

The secret messages passed through network are hacked and algorithms

are not efficient to the expected level. A powerful encryption technique is

introduced and performs a large variety of generating keys to encrypt the

message in the form of pictures. The arithmetic operations are performed over

the picture key to make the technique even more powerful. First encryption is

done with the help of vigenere cipher and the key is generated through picture.

Second encryption is done with the help of newly designed 10x26 table and the

key is generated from the first key. The decryption is done by the reverse of

encryption process.

Page 2: Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract

EXISTING SYSTEM

The cryptographic systems use the key to encrypt messages in the form of text or

string. Vigenere cipher can be broken using counting diagram.Total number of combinations

required to break the system using counting diagram is very small. Large key size makes the

system less efficient. The secret key to perform encryption is more reliable to attack because

it is an easily recognizable format.

PROPOSED SYSTEM

The encryption of the message is done using the picture key which is difficult to

break. Total number of combinations required to break the system exceeds hundred digit

number and more with increase in number of pictures. The system performances increases

with increase in key size. The system uses two main operations to make the key stronger. The

first operation is LOCK-10(Logical Crypto Key)is performed over the secret code to get the

picture sorting key.LOCK-10 involves 10 different operations and these are performed over

the secret code to get the picture sorting key. The operation LOCK-10 can be performed in 10

factorial ways .The picture sorting key is obtained and the ‘N’ pictures are arranged in one of

the ‘N’ factorial ways. The PACK(Picture Arithmetic Crypto Key) operation is performed

over the picture key to get the first key. The second key is generated from the first key by

performing LOCK-5 operation over the first key. The vigenere encryption is performed over

the first key and encryption is performed over the second key with the help of 10x26 matrix.

Increase in number of pictures used for ciphering, increases the system performance

proportionally.

Page 3: Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract

REQUIREMENT SPECIFICATIONS

HARDWARE REQUIREMENT

Processor : Pentium IV or above

Ram : 512 MB

Hdd : 80 GB

SOFTWARE REQUIREMENT

Operating system : windows

Platform : c#.Net 4.0

Front End : C Sharp