You are on page 1of 18

WELCOME

By
P. Harini
M.R. Rahul Raj
P. Suresh
STEGANOGRAPHY
Seeing the Invisible
Aim of The Project
 To familiarize the audience what
STEGANOGRAPHY is all about.

 To provide security for our confidential


Messages.

 To explain it’s advantage over other


technology.
STEGANOGRAPHY

 What is STEGANOGRAPHY?

 How it is related to Cyber Security?

 Advanced Encryption Standard (AES)


Technologies
 Java 2 Standard edition (J2SE)


Abstract Window Tool Kit (AWT)
 Java Swings

 Java Script
Scope of The Project
 Designed to make an entire body of information
unreadable.

 Converts plain text into a secret code for


transmission over a public network, such as the
Internet.

 It provides privacy and confidentiality, access


control, proof of document transmission, and
document archiving and retrieval support.
The AES Cipher
 Block length is limited to 128 bit
 The key size can be independently
specified to 128, 192 or 256 bits

Key size (words/bytes/bits) 4/16/12 6/24/192 8/32/256


8
Number of rounds 10 12 14

Expanded key size 44/176 52/208 60/240


(words/byte)
The AES Cipher
 AddRoundKey() – round key is added to
the State using XOR operation
 Substitute Bytes() – uses S-box to perform
a byte-by-byte substitution of State
 ShiftRows() – processes the State by
cyclically shifting the last three rows of the
State by different offsets
 MixColumns() – takes all thecolumns of
the State and mixes their data,
independently of one another, making use
of arithmetic over GF(2^8)
The AES Cipher
 Only Add round key makes use of the key
 Other three functions are used for
diffusion and confusion
 Final round consists of only three stages
The AES Cipher
plaintext

Add round key

Substitute bytes Substitute bytes


Substitute bytes
Shift rows Shift rows
Round 1

Shift rows
Round 9

Mix columns Mix columns Add round key

Add Round key Add round key Cipher


text
W[4,7] W[36,39] W[40,43]
key
The AES Inverse Cipher
 Decryption algorithm uses the expanded
key in reverse order
 All functions are easily reversible and their
inverse form is used in decryption
 Decryption algorithm is not identical to the
encryption algorithm
 Again, final round consists of only three
stages
The AES Inverse Cipher
ciphertext

Add round key

Inv. Shift rows Inv. Shift rows


Inv. Shift rows
Inv. Sub bytes Inv. Sub bytes
Round 1

Inv. Sub bytes


Round 9

Add round key Add round key Add round key

Inv. Mix Columns Inv. Mix columns plaintext

W[36,39] W[4,7] W[0,3]


key
Advantages
 Encryption software protects Internet-connected
computers from crackers and other online
intruders.
 The technology is widely used to encrypt credit
card information, bank account numbers, and
other types of financial records so they can be
sent safely and securely across the Internet.
 Protect much of the intellectual content that's
marketed on the Web, such as music, videos,
articles, and software, restricting its availability to
paying customers.
Conclusion

 Hide data practically everywhere

 Detection of Steganography
− Possible, but can be difficult
− Fastest for small blocks and hashes
encryption
 Defeating Steganography is not hard
THANK YOU

You might also like