Sei sulla pagina 1di 12

IMAGE CRYPTOGRAPHY

MINOR PROJECT

Submitted in partial fulfillment of the requirement for the award of Degree of


Bachelor of Engineering in Information Technology Discipline

Submitted To

[Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal (M.P.)]

Submitted By:
Ritesh Kumar
Enrollment No – 0111IT161085

Under The Supervision Of:

Ms. Shifa Manihar


(Professor, Department of IT)
(TIT, Bhopal)

Department of Information Technology


TECHNOCRATS INSTITUTE OF TECHNOLOGY, BHOPAL
MAY 2019
Technocrats Institute of Technology, Bhopal (M.P.)
Department of Information Technology

CERTIFICATE

This is to certify that the work embodies in this dissertation entitled “Image
Cryptography” being submitted by “Ritesh Kumar” (Roll No.:
0111IT161085) for partial fulfillment of the requirement for the award of
“Bachelor of Engineering in Information Technology” discipline to “Rajiv
Gandhi Praudyogiki Vishwavidyalaya, Bhopal(M.P.)” during the academic
year 2018-19 is a record of bonafide piece of work, carried out by him/her
under my supervision and guidance in the “Department of Information
Technology”, Technocrats Institute of Technology, Bhopal (M.P.).

APPROVED & SUPERVISED BY:

Ms. Shifa Manihar


(Asst./Asso./Prof. (Designation), Department of IT)
TIT, Bhopal

FORWARDED BY:

Prof. (Dr.) Rajesh Boghey Prof. (Dr.) Bhupendra Verma


(Professor & Head, Department of IT) (Director)
TIT, Bhopal TIT, Bhopal
Technocrats Institute of Technology, Bhopal (M.P.)
Department of Information Technology

CERTIFICATE OF APPROVAL

The Project entitled “Image Cryptography” being submitted by “Ritesh


Kumar” (Roll No.:0111IT161085) has been examined by us and is hereby
approved for the award of degree “Bachelor of Engineering in Information
Technology Discipline”, for which it has been submitted. It is understood that
by this approval the undersigned do not necessarily endorse or approve any
statement made, opinion expressed or conclusion drawn therein, but approve the
project only for the purpose for which it has been submitted.

(Internal Examiner) (External Examiner)

Date: Date:
Technocrats Institute of Technology, Bhopal (M.P.)
Department of Information Technology

DECLARATION

I Ritesh Kumar, a student of Bachelor of Engineering in Information


Technology discipline, session: 2018-19, Technocrats Institute of
Technology-Bhopal (M.P.), here by declare that the work presented in this
project entitled “Image Cryptography” is the outcome of my own work, is
bonafide and correct to the best of my knowledge and this work has been carried
out taking care of Engineering Ethics. The work presented does not infringe any
patented work and has not been submitted to any other university or anywhere
else for the award of any degree or any professional diploma.

(Subhash Kumar)
Enrollment No.: 0111IT161113

(Ritesh Kumar)
Enrollment No.: 0111IT161085

Date:
Technocrats Institute of Technology, Bhopal (M.P.)
Department of Information Technology

ACKNOWLEDGEMENT

It gives me immense pleasure to express my deepest sense of gratitude


and sincere thanks to my highly respected and esteemed guide Ms. Shifa
Manihar, Professor of Department of IT, TIT Bhopal, for her valuable guidance,
encouragement and help for completing this work. Her useful suggestions for
this whole work and co-operative behavior are sincerely acknowledged.
I also wish to express my gratitude to Dr. Rajesh Boghey, Professor &
Head (Department of IT) for his kind hearted support. I am also grateful to all
my teachers for their constant support and guidance.
I would like to express my sincere thank to Dr. Bhupendra Verma,
Director, TIT Bhopal for giving me this opportunity to undertake this project.
I also wish to express my indebtedness to my parents as well as my family
member whose blessings and support always helped me to face the challenges
ahead.
At the end I would like to express my sincere thanks to all my friends and
others who helped me directly or indirectly during this project work.

Place: Bhopal Name: Subhash Kumar


Date: Enrollment no.:0111IT161113
Name: Ritesh Kumar
Enrollment no.:0111IT161085
Cryptography | Introduction to Crypto-
terminologies
Cryptography is an important aspect when we deal with network security.
‘Crypto’ means secret or hidden. Cryptography is the science of secret writing
with the intention of keeping the data secret. Cryptanalysis, on the other hand, is
the science or sometimes the art of breaking cryptosystems. These both terms
are a subset of what is called as Cryptology.

Classification –
The flowchart depicts that cryptology is only one of the factors involved in
securing networks. Cryptology refers to study of codes, which involves both
writing (cryptography) and solving (cryptanalysis) them. Below is a
classification of the crypto-terminologies and their various types.
Cryptography –

Cryptography is classified into symmetric cryptography, asymmetric


cryptography and hashing. Below are the description of these types.

1. Symmetric key cryptography –

It involves usage of one secret key along with encryption and decryption
algorithms which help in securing the contents of the message. The strength of
symmetric key cryptography depends upon the number of key bits. It is
relatively faster than asymmetric key cryptography. There arises a key
distribution problem as the key has to be transferred from the sender to receiver
through a secure channel.
2. Asymmetric key cryptography –

It is also known as public key cryptography because it involves usage of a


public key along with secret key. It solves the problem of key
distribution as both parties use different keys for encryption/decryption. It is not
feasible to use for decrypting bulk messages as it is very slow compared to
symmetric key cryptography.

3. Hashing –

It involves taking the plain-text and converting it to a hash value of fixed size
by a hash function. This process ensures integrity of the message as the hash
value on both, sender’s and receiver’s side should match if the message is
unaltered.
Hashing is a one-way process commonly used to validate the integrity of
information. A hash function generates fixed-length value that is always the
same length no matter how large or small the data entering the process.
Additionally, the resulting output is intended to be non-reversible. The fixed
length value generated is unique for every different input that enters the process.
It is because of this unique property and behavior the hashes are used to detect
the alternations to data to any type.

The following is a list of hashing algorithms currently in use:

1.Message Digest 2(MD2): - A one-way hash function used in the privacy-


enhanced mail (PEM) protocols along with MD5.

2.Message Digest 4(MD4): - A one-way hash function used for PGP (Pretty
good Privacy), is another application of cryptographic technologies. Using
public key encryption, PGP is one of the most widely recognized cryptosystems
in the world. PGP has been used to protect the privacy of email, data, data
storage and other forms of communications such as instant massaging.

3.Message Digest 5(MD5): - An improved and redesigned version of MD4 that


produces 128-bit hash.MD5 is still extremely popular in many circles, but it is
being phaseout due to weaknesses that have led to the system being vulnerable.
In many cases, MD5 has been replaced with SHA2.

4.Secure Hash Algorithm-0(SHA-0): - It has been replaced by SHA-1 and


SHA-2.

5. Secure Hash Algorithm-1(SHA-1): - It has been compromised and is being


replaced by SHA-2.
6. Secure Hash Algorithm-2(SHA-2): - Designed to be an upgrade to SHA-
1,SHA-2.
Cryptanalysis –

1. Classical attacks –
It can be divided into a) Mathematical analysis and b) Brute-force attacks.
Brute-force attacks runs the encryption algorithm for all possible cases of the
keys until a match is found. Encryption algorithm is treated as a black box.
Analytical attacks are those attacks which focuses on breaking the cryptosystem
by analyzing the internal structure of the encryption algorithm.

2. Social Engineering attack –


It is something which is dependent on the human factor. Tricking someone to
reveal their passwords to the attacker or allowing access to the restricted area
comes under this attack. People should be cautious when revealing their
passwords to any third party which is not trusted.
3. Implementation attacks –
Implementation attacks such as side-channel analysis can be used to obtain a
secret key. They are relevant in cases where the attacker can obtain physical
access to the cryptosystem.

What is visual cryptography?

Visual cryptography is a cryptographic technique which allows visual


information (pictures, text, etc.) to be encrypted in such a way that decryption
can be done just by sight reading. Visual cryptography, degree associated
rising cryptography technology, uses the characteristics of human vision to
rewrite encrypted photos. Visual cryptography provides secured digital
transmission that is used just for merely the once.

Potrebbero piacerti anche