The Development Application by Steganography in Image via Multimedia Messaging Service

Size: px
Start display at page:

Download "The Development Application by Steganography in Image via Multimedia Messaging Service"

Transcription

1 ก ก ก The Development Application by Steganography in Image via Multimedia Messaging Service (Pattarapong Reabroicharoen) 1 กก (Kiattisak Yochanang) 2 1,2 ก fotofuns_kiss@hotmail.com, umph2002tct@hotmail.com ก ก ก ก ก ก ก ก ก (Blowfish Encryption) ก (Least Significant Bit) ก ก ก ก ก ก ก ก ก ก ก 5 ก ก 4.46 ก ก 30 ก ก 4.41 : ก ก ก Abstract This Research a purpose was to developing an application program for steganography in image via multimedia messaging service, The main purposive of disclosure make people know that the secret is hidden information, there for this research presents steganography in image by using cryptography with Blowfish encryption before then method for hiding in image at least significant bit of image (LSB), A popular algorithms for hidden information, these methods is simple and sufficient in hidden information and this method will increase information security, The result shows that after experimental research, it is more effective in using these methods, In the quality evaluation result from 5 experts the average is 4.46 show that result of the program has a good quality level and In the quality evaluation result from 5 end user the average is 4.41 show that result of the program has a good quality level Keyword: Steganography, Cryptography, Blowfish Encryption, Least Significant Bit 1. ก ก ก ก ก ก ก ก ก ก กก ก กกก ก (Steganography) ก ก ก ก ก ก ก ก -619-

2 ก ก ก ก ก ก ก (Least Significant Bit) ก (Message) ก ก (Encryption) ก (Decryption) (Blowfish) กก ก ก ก กก ก ก ก ก ก ก 448 ก ก ก ก Blowfish ก ก ก ก secure shell (SSH) 2. ก 2.1 ก (Steganography Theory) ก ก ก ก ก ก ก ก ก กก ก ก ก ก ก ก ก 2.2 ก (Blowfish Encryption) Blowfish [1] ก 64 Bit Block Cipher กก ก ก ก 64 Variable-Length Key ก ก 16 กก Feistel Network ก ก S-boxes ก ก กก CAST-128 Fixed S-boxes 1:* ก (Diagram of Blowfish) ก 1 Diagram ก ก ก F (F-function) กก F Input ก 4 S-boxes ก F ก S-box Output ก 32 ก S-box ก ก 2 32 ก XOR ก Shirali-Shahreza [2] ก ก Steganography in MMS (2007) ก ก ก MMS (Multimedia Messaging Service) Message ก ก ก 2 ก (Image) ก ก (Text) ก ก ก (Image) (Text) (Text) (Image) PNG (Portable Network Graphics) J2ME (JAVA 2 Micro Edition) Gutub, Al-Qahtani, Tabakh [3] ก ก Triple-A: Secure RGB Image Steganography Based on Randomization (2009) ก ก ก ก triple-a algorithm ก -620-

3 (Least Significant Bit (LSB) ก ก ก ก 1 ก ก ก Samaratunge, S.G.K [4] ก ก New steganography technique for palette based images (2007) ก Stretching Palette ก กก public key ก Stretching Palette indexed image (8 ก ) GIF, BMP and PNG-8 3. ก ก 3.1 ก ก 2:* ก 2 ก ก Blowfish (Cipher) ก Cipher (Encode) ก (Decode) Cipher Cipher Blowfish ก ก ก ก ก Flow ก ก ก (ก) ( ) 3:*ก (ก) ( ) ก 3 (ก) ก ก ก (Plaintext) Secret key ก ก Blowfish (Ciphertext) ก Encode (Stego files) ก MMS (Send MMS) ก ( ) ก (Stego files) ก ก Decode ก ก (Ciphertext) ก ก secret key key ก ก ก ก Blowfish (Plaintext) ก ก MMS ก ก (Data Flow Diagram : DFD) ก ก ก ก ก กก ก

4 (ก) ( ) 4:* ก 1 (Data Flow Diagram Level 1) ก ก ก 4*Data Flow Diagram Level 1 ก ก 3 ก ก ก ก 1.0 Encryption and Decryption ก กก ก กก Blowfish ก ก กก ก ก 2.0 Hidden in Image ก กก ก ก ก ก ก ก 3.0 Connect system ก ก ก ก ก Windows Mobile ก ก ก ก 3.2 ก ก ก ก 5:*ก ก ก (ก) ( ) ก 5 กก ก 5 (ก) ก ก ก ก ก ก ก ก Cipher Text 5 ( ) ก ก ก ก ก ก ก ก (Plaintext) ก ก ก ก 4. ก 4.1 ก ก ก ก ก ก 2 ก Encode ก Blowfish ก Decode ก ก ก ก ก ก Blowfish (Plaintext) -622-

5 ก กก ก 1 ก 2 1:* ก ก (ก) ( ) 6:* ก ก (ก) ( ) ก 6 (ก) ก ก ก Filename ก, Save To ก ก main Memory Storage card, Message Key ก ก Encode ก กก ก ก 6 ( ) ก ก Filename ก ก, Key ก, Message (Plaintext), ก Decode ก ก (Plaintext) กก ก ก ก ก ก ก ก กก ก ก ก กก ก กก กก ก ก 2:* ก 4.2 ก ก ก ก ก ก 2 ก ก ก ก ก กก ก 4.46 ( ก 0.50) กก ก 4.41 ( ก 0.60) ก ก ก -623-

6 ก technique for palette based images. Second International Conference on Industrial and Information Systems, ก ก ก ก กก Steganography Cryptography ก ก ก กก Cryptography ก Blowfish Algorithm ก กก Steganography ก กก ก Blowfish ก ก ก (Least Significant Bit) ก ก กก ก ก ก ก ก ก ก ก ก ก 4.46 ( ก 0.50) ก ก ก ก ก [1] Blowfish. [online]. [cited 2008 September 10] Available from : URL : [2] Mohammad Shirali-Shahreza. Steganography in MMS. The 11th IEEE International Multitopic Conference, [3] Adnan Gutub, Ayed Al-Qahtani, and Abdulaziz Tabakh. Triple-A: Secure RGB Image Steganography Based on Randomization. The 7th ACS/IEEE International Conference on Computer Systems and Applications, [4] S.G.K.D.N Samaratunge. New steganography -624-

ก ก API Two-factor Authentication by Web Application API and J2ME. Software ก ก. : Two-factor Authentication, One Time Password, Packet Sniffer

ก ก API Two-factor Authentication by Web Application API and J2ME. Software ก ก. : Two-factor Authentication, One Time Password, Packet Sniffer ก ก API J2ME Two-factor Authentication by Web Application API and J2ME Software 1 2 ก ก ก 41/20 ก 44150 : 0-4375-4322 2414 1 2 E-mail: c.pratchaya@msu.ac.th E-mail: somnuk.p@msu.ac.th ก ก ก Username/Password

More information

: ก ก [RECUVA FILE RECOVERY] ก ก - ก www.it-guides.com

: ก ก [RECUVA FILE RECOVERY] ก ก - ก www.it-guides.com 2010 : : ก ก [RECUVA FILE RECOVERY] ก ก ก ก ก ก - ก www.it-guides.com ก ก Piriform Recuva File Recovery ก ก ก ก ก ก ก ก ก MP3 Player, ipod, ipad ก ก ก 2010 - ก 2 P a g e ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก ก

More information

บทน ำ ว สด และว ธ การ

บทน ำ ว สด และว ธ การ The Development of Document Control Information System (DOC-IS) บทน ำ การควบค มเอกสารเป นข อก ำหนดท 4.3 ในระบบค ณภาพ ISO/IEC 17025:2005 ก ำหนดให ห องปฏ บ ต การ ต องม การจ ดการเพ อควบค มเอกสารท กชน ดในระบบค

More information

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies Alaa_hamami@yahoo.com Dr. Mohammad Alaa Al-

More information

บทท 2 ทฤษฎ และวรรณกรรมท เก ยวข อง

บทท 2 ทฤษฎ และวรรณกรรมท เก ยวข อง 6 บทท 2 ทฤษฎ และวรรณกรรมท เก ยวข อง 2.1 ทฤษฎ ท เก ยวข อง 2.1.1 น ยามคาศ พท ท ใช ในระบบ 2.1.1.1 สมาช ก หมายถ ง ผ ม ส ทธ และม ส วนร วมในสมาคม องค กร หร อก จกรรมใด ๆ ฝากบ าน เป นต น 2.1.1.2 ฝาก หมายถ ง การมอบให

More information

The 7th National Conference on Computing and Information Technology. A Web-based Single Sign-on (SSO) using SAML 2.0

The 7th National Conference on Computing and Information Technology. A Web-based Single Sign-on (SSO) using SAML 2.0 ก ก ก SAML 2.0 A Web-based Single Sign-on (SSO) using SAML 2.0 (Tatchai Russameroj) 1 (Pornchai Mongkolnam) 2 ก ก ก (Kriengkrai Porkaew) 3 1, 2, 3 ก tum010@hotmail.com 1, pornchai@sit.kmutt.ac.th 2, porkaew@sit.kmutt.ac.th

More information

A Study of New Trends in Blowfish Algorithm

A Study of New Trends in Blowfish Algorithm A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department

More information

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015 CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

More information

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh

More information

PMQA หมวด 5 การม งเนนทร พยากรบ คคล ดร.ธนาว ขญ จ นดาประด ษฐ

PMQA หมวด 5 การม งเนนทร พยากรบ คคล ดร.ธนาว ขญ จ นดาประด ษฐ PMQA หมวด 5 การม งเนนทร พยากรบ คคล ดร.ธนาว ขญ จ นดาประด ษฐ ย ทธศาสตรการพ ฒนาระบบราชการไทย พ.ศ. 2556-2561 เป/นย ทธศาสตรหล กท ใชในการพ ฒนาระบบราชการแบ4ง ออกเป/น 3 ห วขอ รวม 7 ประเด น เพ อ ยกระด บองคการส

More information

Triple Security of Information Using Stegnography and Cryptography

Triple Security of Information Using Stegnography and Cryptography Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all

More information

Cryptography and Network Security Block Cipher

Cryptography and Network Security Block Cipher Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit

More information

) "**!ก ก )$+$,ก,ก.-.2550 ก +ก,ก 1!&1!& 2!ก34&#+)ก&ก5) ก ก )$+ )ก!26&

) **!ก ก )$+$,ก,ก.-.2550 ก +ก,ก 1!&1!& 2!ก34&#+)ก&ก5) ก ก )$+ )ก!26& 1 ก ก () กก กก!.#.2550 1. ) "**!ก ก )$+$,ก,ก.-.2550 ก# +ก,ก 1!&1!& 2!ก34&#+)ก&ก5) ก ก )$+ )ก!26& ) "**!ก ก )$+$,ก,ก.-.2550 ก #+ก,ก 1!&17 1. ก!34& ) 6" ( 5) " ก 2"!6 ก 6! +% &+!,,2"!%ก %ก!12 ) &+!7 611!

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

Network Security. Omer Rana

Network Security. Omer Rana Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption

More information

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher

More information

ค ม อการใช โปรแกรมร บ-ส งข อม ลอ เล กทรอน กส แบบท 1 ระหว างบร ษ ทประก นภ ยก บส าน กงาน คปภ. โดยว ธ การแบบปลอดภ ย แบบท 1 การร บ-ส งจดหมายโดยใช โปรแกรม MS Outlook Express 1.1 ว ธ ต ดต ง TOT ROOT CA Certificate

More information

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms. A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,

More information

Keywords Web Service, security, DES, cryptography.

Keywords Web Service, security, DES, cryptography. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the

More information

'( )& 1. #$%)*+, ก-)* +*"ก./*ก#$% ก.ก /"ก"ก* 01 " ก. +"ก/2)ก3%"

'( )& 1. #$%)*+, ก-)* +*ก./*ก#$% ก.ก /กก* 01  ก. +ก/2)ก3% ก ก ก 2557!!"ก#$% &!! '( )& 1. #$%)*+, ก)* +*"ก./*ก#$% ก.ก /"ก"ก* 01 " ก. +"ก/2)ก3%" 2. #$%)*+ +&*)4กก"4/ก ก)*!!"กก &%%$+ก$&*%กก3!! )*5%ก $" " +ก**&%.6ก4 +"!! 3. #$%)*+ +&*)4)กก"กก2)ก5+#6/*!! #$%)*+,3!

More information

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction

More information

6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure

More information

Properties of Secure Network Communication

Properties of Secure Network Communication Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

More information

Cover Story Facebook บ นท กความประท บใจท ไม อยากเก บไว คนเด ยว

Cover Story Facebook บ นท กความประท บใจท ไม อยากเก บไว คนเด ยว 1 ว ธ การใช งาน Facebook เบ องต น จะว าไปคนท เข ามาเย ยม facebookgoo น นก เป นคนท เข ามาหาข อม ลว ธ เล นแบบเบ องต นอย เยอะ เหม อนก น ว นน ก เลยขอค ดลอกบทความจากน ตยสาร Computer Today มาลงไว ท น นะคร บ

More information

How To Encrypt With A 64 Bit Block Cipher

How To Encrypt With A 64 Bit Block Cipher The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric

More information

Network Security: Secret Key Cryptography

Network Security: Secret Key Cryptography 1 Network Security: Secret Key Cryptography Henning Schulzrinne Columbia University, New York schulzrinne@cs.columbia.edu Columbia University, Fall 2000 c 1999-2000, Henning Schulzrinne Last modified September

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Implementing Microsoft Windows

Implementing Microsoft Windows Implementing Microsoft Windows SharePoint Services 3.0 Introduction Name Company affiliation Title/function Job responsibility Systems administration experience Microsoft Windows Server operating systems

More information

A Novel Security Scheme for Secret Data using Cryptography and Steganography

A Novel Security Scheme for Secret Data using Cryptography and Steganography I. J. Computer Network and Information Security, 2012, 2, 36-42 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.06 A Novel Security Scheme for Secret Data using

More information

Evaluation of the RC4 Algorithm for Data Encryption

Evaluation of the RC4 Algorithm for Data Encryption Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,

More information

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images Encryption Quality Analysis and Security Evaluation CAST-128 Algorithm and its Modified Version using Digital s Krishnamurthy G N, Dr. V Ramaswamy Abstract this paper demonstrates analysis well known block

More information

แบบทดสอบระหว างภาค รายว ชา เทคโนโลย สารสนเทศและการส อสาร ระด บช นม ธยมศ กษาป ท 4 ภาคเร ยนท 1 ป การศ กษา 2555 เวลา 60 นาท

แบบทดสอบระหว างภาค รายว ชา เทคโนโลย สารสนเทศและการส อสาร ระด บช นม ธยมศ กษาป ท 4 ภาคเร ยนท 1 ป การศ กษา 2555 เวลา 60 นาท แบบทดสอบระหว างภาค รายว ชา เทคโนโลย สารสนเทศและการส อสาร ระด บช นม ธยมศ กษาป ท 4 ภาคเร ยนท 1 ป การศ กษา 2555 เวลา 60 นาท ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

More information

A CLOUD SECURITY APPROACH FOR DATA AT REST USING FPE

A CLOUD SECURITY APPROACH FOR DATA AT REST USING FPE A CLOUD SECURITY APPROACH FOR DATA AT REST USING FPE Nilekh Chaudhari 1 1 Cloud Research and Development, Syntel Ltd., Mumbai, India ABSTRACT In a cloud scenario, biggest concern is around security of

More information

How To Understand And Understand The History Of Cryptography

How To Understand And Understand The History Of Cryptography CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

More information

Using ASP-Based Message Encryption Project To Teach Information Security Concepts

Using ASP-Based Message Encryption Project To Teach Information Security Concepts Using ASP-Based Message Encryption Project To Teach Information Security Concepts Qidong Cao College of Business Administration, Winthrop University Rock Hill, SC 29733, USA caoq@winthrop.edu John S. Davis

More information

แนวปฏ บ ตท ด ส าหร บการควบค มความเส ยงของระบบงานเทคโนโลย สารสนเทศท สน บสน นธ รก จหล ก (IT Best Practices)

แนวปฏ บ ตท ด ส าหร บการควบค มความเส ยงของระบบงานเทคโนโลย สารสนเทศท สน บสน นธ รก จหล ก (IT Best Practices) แนวปฏ บ ต ท ด ส าหร บการควบค มความเส ยงของระบบงานเทคโนโลย สารสนเทศท สน บสน นธ รก จหล ก (IT Best Practices) ISO 27001 COSO COBIT แนวปฏ บ ตท ด ส าหร บการควบค มความเส ยงของระบบงานเทคโนโลย สารสนเทศท สน บสน

More information

Security over Cloud Data through Encryption Standards

Security over Cloud Data through Encryption Standards Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering

More information

Cryptography and Network Security Chapter 3

Cryptography and Network Security Chapter 3 Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon

More information

1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.

1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control. Secure Control of Remote Electrical Devices Using Mobile SMS Services Kishor T. Mane 1, G.A. Patil 2 1. Asst. Professor, 2. Head and Asst. Professor D. Y. Patil college of Engg. & Tech. Kolhapur, Maharashtra,

More information

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra

More information

Chapter 8. Network Security

Chapter 8. Network Security Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard

More information

Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:

Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages: Designing Hash functions and message authentication codes Reviewing... We have seen how to authenticate messages: Using symmetric encryption, in an heuristic fashion Using public-key encryption in interactive

More information

แนวโน มของ Unified Communication Technology

แนวโน มของ Unified Communication Technology แนวโน มของ Unified Communication Technology สราว ธ ต นา The Communication Solution Company Limited Enterprise Communication Department 1of 53 2of 53 ว นพ ธท 19 ธ นวาคม 2550 ห องประช มก าพล อด ลว ทย เวลา

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5) Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Developing and Investigation of a New Technique Combining Message Authentication and Encryption Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.

More information

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g. Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:

More information

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University

More information

Secure Data Transmission using Blowfish Algorithm

Secure Data Transmission using Blowfish Algorithm Secure Data Transmission using Blowfish lgorithm Panem.Charan rur 1, M. Sai Chandrasekhar 2, S.Sai Sreeram 3, K.RamKishore 4, S.Venu gopal 5, 1 ssistant professor, 2 UG Students[ B.Tech] Dept. of ECE,

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer

More information

Fuzzy Keyword Search over Encrypted Stego in Cloud

Fuzzy Keyword Search over Encrypted Stego in Cloud International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Fuzzy Keyword Search over Encrypted Stego in Cloud TanmayDahake 1*, MirsohailShaikh

More information

1. DNS Primary zone DNS. user name : train password : p@ssw0rd (Computer name) clientxx (xx ก ก ). 27 www.kroonis.org

1. DNS Primary zone DNS. user name : train password : p@ssw0rd (Computer name) clientxx (xx ก ก ). 27 www.kroonis.org 1 DNS 1. DNS Primary zone DNS ก Vmware Windows 7 ก (Clients) ก Image Windows 7 Network NAT user name : train password : p@ssw0rd (Computer name) clientxx (xx ก ก ) ก DNS clientxx Server 192.168.1.38 Server

More information

Overview of Symmetric Encryption

Overview of Symmetric Encryption CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main

More information

Steganography and Visual Cryptography in Computer Forensics

Steganography and Visual Cryptography in Computer Forensics 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and

More information

(C) Global Journal of Engineering Science and Research Management

(C) Global Journal of Engineering Science and Research Management DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.

More information

CIS433/533 - Computer and Network Security Cryptography

CIS433/533 - Computer and Network Security Cryptography CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and

More information

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 International

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004 BRIEF INTRODUCTION TO CRYPTOGRAPHY By PAGVAC February 8, 2004 What will I learn from this file? What cryptography is How encryption and decryption works Cryptography terms Symmetric cryptography Asymmetric

More information

Integrating basic Access Control Models for efficient security along with encryption for the ERP System

Integrating basic Access Control Models for efficient security along with encryption for the ERP System Integrating basic Access Control Models for efficient security along with encryption for the ERP System Prof. Swapnaja A. Ubale Research Scholar (Computer Science & Engineering Department) Research Center

More information

Fi-5530C2 FJS-Fi-5530C2. Fi-6670 FJS-Fi-6670. Fi-6770 FJS-Fi-6770. Fi-6750S FJS-Fi-6750S

Fi-5530C2 FJS-Fi-5530C2. Fi-6670 FJS-Fi-6670. Fi-6770 FJS-Fi-6770. Fi-6750S FJS-Fi-6750S SUGGESTED RETAIL PRICE : January 2013 Fujitsu : Scanner Fi-Series Fi-6110 FJS-Fi-6110 สแกนเนอร ส แบบ ADF ความละเอ ยดส งส ด 600 dpi (optical) รองร บเอกสาร A8-A4 เอกสารต อเน องยาว 3,048 mm ความเร ว Simplex

More information

Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm

Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm G.Devi 1, M.Pramod Kumar 2 1 M.Tech(CSE),devi.gujjula9@gmail.com,Sri Vasavi Engineering College, Tadepalligudem

More information

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

How To Use Pretty Good Privacy (Pgp) For A Secure Communication Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

การใช เทคน คเหม องข อม ลท านายความเส ยหายด านคอมพ วเตอร

การใช เทคน คเหม องข อม ลท านายความเส ยหายด านคอมพ วเตอร การใช เทคน คเหม องข อม ลท านายความเส ยหายด านคอมพ วเตอร Computer Damage Prediction Using Data Mining Technique บทค ดย อ โชต กา วรธนาน วงศ ค ารณ ส น ต เผ าภ ค ศ ร ส ข ภาคว ชาว ศวกรรมคอมพ วเตอร คณะว ศวกรรมศาสตร

More information

OpenStack. tutorial. ท มงาน vasabilab

OpenStack. tutorial. ท มงาน vasabilab OpenStack tutorial ท มงาน vasabilab Vasabilab Team กษ ด ศ ชาญเช ยว วศ น ศ ร ป ณย กรรณ การ ทร พย สมบ รณ สมเก ยรต โกศลสมบ ต พ เชษฐ วงศ ว บ ลศ ลป พ ท กษ แท นแก ว ชยาว ฒน เพชรว เศษ THANK TO OUR SPONSORS vasabilab

More information

6 Data Encryption Standard (DES)

6 Data Encryption Standard (DES) 6 Data Encryption Standard (DES) Objectives In this chapter, we discuss the Data Encryption Standard (DES), the modern symmetric-key block cipher. The following are our main objectives for this chapter:

More information

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

More information

Cryptographic Engine

Cryptographic Engine Cryptographic Engine HIGHLIGHTS This section of the manual contains the following major topics: 1.0 Introduction... 2 2.0 Registers... 4 3.0 Theory of Operation... 12 4.0 Module Operation... 27 5.0 Operation

More information

{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x

{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x ON THE DESIGN OF S-BOXES A. F. Webster and S. E. Tavares Department of Electrical Engineering Queen's University Kingston, Ont. Canada The ideas of completeness and the avalanche effect were first introduced

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

Text Steganography in SMS

Text Steganography in SMS 2007 International Conference on Convergence Information Technology Text Steganography in SMS Mohammad Shirali-Shahreza Computer Science Department Sharif University of Technology Tehran, Iran shirali@cs.sharif.edu

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

Lecture 4 Data Encryption Standard (DES)

Lecture 4 Data Encryption Standard (DES) Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption

More information

Differential Fault Analysis of Secret Key Cryptosystems

Differential Fault Analysis of Secret Key Cryptosystems Differential Fault Analysis of Secret Key Cryptosystems Eli Biham Computer Science Department Technion - Israel Institute of Technology Haifa 32000, Israel bihamocs.technion.ac.il http://www.cs.technion.ac.il/-

More information

MICROSOFT SYSTEM CENTER 2012 R2 CONFIGURATION MANAGER ADMINISTRATION

MICROSOFT SYSTEM CENTER 2012 R2 CONFIGURATION MANAGER ADMINISTRATION MICROSOFT SYSTEM CENTER 2012 R2 CONFIGURATION MANAGER ADMINISTRATION Category: System > System Center 2012 Server > Microsoft System Center 2012 R2 Configuration Manager Administration Duration: 30 Hours

More information

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security

More information

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the

More information

Implementation of Advance Encryption Standard (AES) in Biometric Electronic Voting Software

Implementation of Advance Encryption Standard (AES) in Biometric Electronic Voting Software Implementation of Advance Encryption Standard (AES) in Biometric Electronic Voting Software M. O. Yinyeh University for Development Studies Faculty of Mathematical Sciences Department of Computer Science

More information

Efficient Software Implementation of AES on 32-bit Platforms

Efficient Software Implementation of AES on 32-bit Platforms Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate

More information

Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V

Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 965 OPTIMIZATION OF AES ALGORITHM USING HARDWARE AND SOFTWARE Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V Abstract-In

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

Microsoft. SharePoint Designer 2013 (Workflow)

Microsoft. SharePoint Designer 2013 (Workflow) Microsoft SharePoint Designer 2013 (Workflow) Last Update on 11/07/2013 Introduction Name Company affiliation Title/function Job responsibility Systems administration experience Microsoft Windows Server

More information

FPGA BASED OPTIMAL SECURED COMMUNICATION

FPGA BASED OPTIMAL SECURED COMMUNICATION FPGA BASED OPTIMAL SECURED COMMUNICATION Mr.G. Manikandan 1, Mr. M.Paramasivan 2, Mr.N.Mathavan 3,Ms.X.Benedict priyanka 4 1 Research Scholar, St. Peter s University, St. Peter s, Institute of Higher Education

More information

23 280 ก ก 2558. ก ก Hydrologic Cycle

23 280 ก ก 2558. ก ก Hydrologic Cycle ก 23 28 ก ก 2558 ก ก Hydrologic Cycle ก. ก ก ก ก. ก... ก 65-5533-46-5533-47 ก - ก - 8 ก ก ก ก ก 12-46 ก 17 1 ก ก ก ก ก ก ก 1. ก ก 25 2. ก ก ก ก ก 3. ก ก ก ก ก ก 4. ก ก ก ก 5. 1 31 - 1. ก. ก 2 2. P.7A..

More information

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What

More information

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Hardware Implementation of AES Encryption and Decryption System Based on FPGA Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors

A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors Leonid Domnitser, Nael Abu-Ghazaleh and Dmitry Ponomarev Department of Computer Science SUNY-Binghamton {lenny,

More information

การออกแบบหล กส ตรและท ศทางการเร ยนการสอนด านว ศวกรรม ส าหร บป พ.ศ. 2550 2559 Curriculum Design and Engineering Education Trend for Year 2007-2016

การออกแบบหล กส ตรและท ศทางการเร ยนการสอนด านว ศวกรรม ส าหร บป พ.ศ. 2550 2559 Curriculum Design and Engineering Education Trend for Year 2007-2016 การออกแบบหล กส ตรและท ศทางการเร ยนการสอนด านว ศวกรรม ส าหร บป พ.ศ. 2550 2559 Curriculum Design and Engineering Education Trend for Year 2007-2016 ผ ช วยศาสตราจารย ดร. ณฐา ค ปต ษเฐ ยร ภาคว ชาว ศวกรรมอ ตสาหการ

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information