Data Security using Cryptography and Steganography
Data Security using Cryptography and Steganography
ABSTRACT
As use of computer networks and internet is growing very fast and admiring day by day, information security is become a major concern in computer networks. There is always risk in violation of network security which leads a need of an efficient and simple way of securing the electronic documents from being read or used by people other than who are authorized to do it. Encryption is one of the security technique widely used to ensure secrecy. Encryption is an entirely mathematical process that takes in data, performs some predefined mathematical operations on the data, and then outputs the result. In this paper, we propose Elliptical curve cryptography algorithm for data encryption. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. However if any eavesdropper detects the presence of encrypted data he or she can try several attacks in order to get the original data. So there is a need to provide a three layer approach for better security. That’s why this work presents a security system using combination of cryptography and steganography to enhance the security and for authentication purpose, use Diffie–Hellman key exchange algorithm.
PROJECT OUTPUT VIDEO:
OBJECTIVE:
-
To enhance the data security by using elliptical curve cryptography and LSB steganography.
EXISTING SYSTEM & DISADVANTAGES:
-
In existing, DES based data encryption is proposed. DES is a block cipher. It encrypts data in blocks of size 64 bits each.64bit of plain text goes as the input to DES, which produces 64 bits of cipher text. The keys length is 56 bits. Cryptanalyst can perform cryptanalysis by exploiting the characteristic of DES algorithm but no one has succeeded in finding out the weakness. This was based on symmetric key algorithm which means that the same key will be used for both encryption and decryption.
-
DES can operate in CBC (chain block coding), ECB (Electronics codebook) and CFB (Cipher feedback) modes. DES has 16 rounds which mean a total of 16 processing steps are being applied on the input plaintext to produce cipher text. First, 64 bit data is passed through the initial permutation phase and then 16 rounds of processing takes place and finally the last step of final permutation is carried out on the input plaintext which results in 64 bit cipher text.
-
The drawback of this algorithm is that it can be easily prone to brute force attack in which the hacker attempts to break the key by applying all possible combination. In DES there are only 256 possible combinations which are quite easy to crack. So DES is not so secure
PROPOSED SYSTEM:
In proposed work, we provide a three layer approach for data security. First, Diffie Hellman key exchange algorithm is proposed for sender and receiver authentication. Second, data encryption is implemented based on elliptical curve cryptography algorithm. Third, steganography is concerned with security of transmitting data and allows communicating secretly by hiding the data within data (text/image). So for further enhancement of the data security, this system uses ECC algorithm along with steganography technique. Data is encrypted by ECC algorithm and obtained encrypted data is hidden inside a different image by using the LSB steganography. So eavesdropper will not be aware of the presence of some secret information behind the image noticeable to eyes. So there is very low probability of acquiring that secret message. Even though the secret message is acquired by the attackers, the message is in encrypted form. So again difficulty in acquiring secret message is increased.
ADVANTAGES OF PROPOSED SYSTEM:
- Robustness
- Efficiency
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
-
System : Pentium Dual Core.
-
Hard Disk : 120 GB.
-
Monitor : 15’’ LED
-
Input Devices : Keyboard, Mouse
-
Ram : 1GB.
SOFTWARE REQUIREMENTS:
-
Operating system : Windows 7.
-
Coding Language : MATLAB
-
Tool : MATLAB R2013A
REFERENCE:
Ms. Arati Appaso Pujari1, Mrs. Sunita Sunil Shinde, “Data Security using Cryptography and Steganography”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. V (Jul.-Aug. 2016).