You are on page 1of 11

m   

 
 m 
m 
 m
m m m

 m
CRYPTIX R    R R
  

    
R R R
  R


R R  R

  R 


 
 
     
 R


RR

  R 

m R   
 
 
m
 
 m  


m
  R 
R
 
R R
  
 R
R      R

  


ÕTEGANOGRAPHY deals with hiding confidential data in
still digital images.

It is a network related software. Õo the proposed software is


required to be installed on the sender side as well as on the
receiver side.

It is a form like structure and tells the user how to use the
software.
In the era of information technology, the possibility that the information stored
in a person¶s computer or the information that are being transferred through
network of computers or internet being read by other people is very high. This
causes a major concern for privacy, identity theft, electronic payments, corporate
security, military communications and many others. We need an efficient and
simple way of securing the electronic documents from being read or used by
people other than who are authorized to do it. Cryptography is a standard way of
securing the electronic documents

  
   R       
   R   

_ Interception: Anunauthorized individual intercepts the message content and


changes it or uses it for malicious purposes. After this type of attack, the
message does not remain confidential
_ M  n: The content of the message is modified by a third
party.
This attack affects the integrity of the message.

Õo for maintaining the data secretly while communicating data


between two persons or two organizations data is to be converted to
other format and the data is to be transmitted. Õo now we deal with
the Cryptography which is process of transmitting data securely
without any interruption. Network security is the security of data
transmission in the communication.

Fig. The Cryptographic Process


_ m  R
 R     R R
  R  R 


    
 R
  R
 
     
 R  

 
  R
   R
 R
 
 R
 
 
R
  R
  R R
   

_       R


R
  R
R  
   

  R

 RR
R   
 
  R
  R


_ 6 
 
    RR
  R
R    
 
 RR
    RR

      

R

R
  R
R   
      R  

_ m       
  R
  R
R
   R
R
R 
R  R   

  
 
 R  


      R  R
  R
  
  R
  R

R

R

_          
  R
  R


 
R 
 
 

R R
 R R
  
 



 R
 R R
     

  
R R R
  R
 R
R 
    
 R       
R 
 R    R  
  R
    
 R R  
   R R
  


R  
R
R   R
R R   R     R

   
  R m
R 

 m   
 R     R 
 


      
 
    
  R

 R   RR    


  R   

  
  
   R 
There are two kinds of cryptosystems: i  and i .
Õymmetric cryptosystems use the same key (the secret key) to encrypt and
decrypt a message, and asymmetric cryptosystems use one key (the public
key) to encrypt a message and a different key (the private key) to decrypt it.

O        

In private-key cryptography, the sender and recipient agree


beforehand on a secret private key. The plaintext is somehow
combined with the key to create the ciphertext. The method of
combination is such that, it is hoped, an adversary could not
determine the meaning of the message without decrypting the
message, for which he needs the key. The following diagram
illustrates the encryption process

You might also like