Professional Documents
Culture Documents
A RESEARCH PROPOSAL
BY
SUBMITTED TO:
DR. R.M ISIAKA
PG CO-ORDINATOR
1
INTRODUCTION
Any data that can be seen and understood easily without the need for further understanding is
called plain text. The means of changing the representation of such data with the purpose of
guarantee that data escapes anybody for whom it isn't planned, even the individuals who can
see the encrypted data. The process of reverting cipher text to its original plaintext is called
decryption.
Cryptography is the science of using the mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across the insecure
networks (like the internet) such that it cannot be read by anyone except the intend recipient.
number, or phrase to encrypt the plaintext. The security of encrypted data is entirely
dependent on two things; the strength of the cryptographic algorithm and the secrecy of the
key.
Furthermore, in network security, cryptography has a long history of providing a way to store
sensitive information or transmit it across insecure networks (i.e. the Internet) so that it
cannot be read by anyone except the intended recipient, where the cryptosystem is a set of
algorithms combined with keys to convert the original message (Plain-text) to encrypted
message (Cipher-text) and convert it back in the intended recipient side to the original
message. In computer systems, the process consists of complex mathematical formulas that
2
dictate the rules of conversion process from plain text to cipher text and vice versa combined
with the key. However, some of encryption and decryption algorithms use the same key (i.e.
sender, and receiver). And in other encryption and decryption algorithms they use different
through hiding information in other information, thus hiding the existence of the
communicated information. The word steganography is derived from the Greek words
“stegos” meaning “cover” and “grafia” meaning “writing” defining it as “covered writing”. In
from cryptography in the sense that where cryptography focuses on keeping the contents of a
Steganography and cryptography are both ways to protect information from unwanted parties
but neither technology alone is perfect and can be compromised. Once the presence of hidden
The major issue to design any encryption and decryption algorithm is to improve the security
level. Therefore, this paper aims to propose an enhanced approach to improve the security
level and increase the performance by minimizing a significant amount of delay time to
Although various approaches have been implemented towards the course of ensuring data
security, which has proved to be effective and a bit efficient. It is to be noted that all
information sent across from the sender to the receiver passes through a communication line
which is monitored by the server administrator. With the disparity that occurs between a plain
3
text and cipher text, the cipher text can be noticed easily by the administrator, making it
accessible by the administrator. This therefore calls for a huge task of proffering a means
through which cipher text can be sent across to the receiver without the knowledge of the
administrator and also if by any means such data is noticed and accessed by the administrator,
the time taken to decrypt it will be long enough for the data to be decrypted by the supposed
recipient. Since cryptography was created as a technique for securing the secrecy of
communication and many different methods have been developed to encrypt and decrypt data
in order to keep the message secret, which unfortunately has sometimes not been enough to
keep the contents of a message secret. Thus, it may also be necessary to keep the existence of
The aim of this research is to implement an efficient information security system using
This research work is limited to the use of Residue Number System for the encryption and
decryption process, and lossless compression approach for the image compression.
4
1.5Significance of the study
This scheme will allow encrypted data to be sent securely over a network without the
knowledge of an intruder. It will further increase the understanding of how residue number
The method to be adopted in the proposed work involves both data encryption and data
hiding. Firstly, the data transformed to a numeric equivalent, thereafter, the process of
encrypting and decrypting the data will be done using Residue Number System, with respect
to the moduli set {2n-1, 2n, 2n +1}. Thereafter the encrypted data is hidden inside a given
image, with the image being compressed before and after the data hiding.
Start
Insert Plain
Text
Stop
5
Start
Insert Encrypted
data
Decrypt Data
Stop
Figure 2: Decryption
Start
Insert Image
Compress Image
Stop
6
Start
Insert Compressed
Image
Insert Encrypted
Data
Image containing
hidden data
Stop
Figure 4: Steganography
Furthermore, for the purpose of reducing the size of the image, the lossless compression
approach will be used, which is a better option than the lossy compression since it never
removes any information from the original image, by representing the data in mathematical
formulas. The original image’s integrity is maintained and the decompressed image output is
7
1.6Literature Review
A scheme was proposed by [ CITATION Oba13 \l 1033 ], he introduced a new approach with the
aim of maintaining the security on the communication channels by making it difficult for
attacker to predicate a pattern as well as speed of the encryption / decryption scheme, due to
the fact that most of the proposed algorithms encountered some problems such as lack of
robustness and significant amount of time added to packet delay to maintain the security on
The implemented algorithm for the encryption and decryption consists of combination of
public key infrastructure for hybrid system and RC6 algorithm for confusion and diffusion
operations. The RC6 algorithm play the roles of generating a private position based on the
secrete value from public key infrastructure. Plain-text 1024- bits size divided to 2 blocks.
One of these blocks used as key after performed confusion and diffusion operations using
RC6 algorithm. The last step is Insert the key inside the Cipher data based on the private
position.
The result obtained shows that the average time required to encrypt the data is 0.2972729 ms
in 512-bits key length using the proposed approach, and to encrypt the data using AES is
An image encryption scheme was proposed by [ CITATION Sha09 \l 1033 ] which is very similar
to image steganography and video steganography. The scheme adopted Private marking
system using symmetric key steganography technique and LSB technique for hiding the
secret information.
8
The main goal of this method is to hide information on the output image of the instrument
Following are the steps involved in embedding the secret information within a cover media.
a) Send the normal data that has to be displayed to the display board.
b) Using a suitable Steganography algorithm hide the secret data within the normal data
Description of the algorithm for embedding the secret message: Algorithm for embedding the
b) Divide the image into [R x C] smaller blocks .Where R & C are the first & second bytes of
d) The LSBs of the pixel are changed depending on the pattern bits and the secret message
bits.
f) If the pattern bit is 0, then the first LSB of the pixel is changed [i.e if data bit is 1 and pixel
g) If the pattern bit is 1, then the second LSB of the pixel is changed accordingly.
h) A single bit of the secret message is distributed throughout the block. This is done to have
9
i) Similarly the other bits are inserted in the remaining blocks.
j) If the length of the secret message is large, then it can be divided and stored in two or three
frames.
k) To extract the information, operations contrary to the ones carried out in embedding are
performed.
outsourcing of dynamic data, where the owner is capable of not only archiving and accessing
the data stored by the CSP, but also updating and scaling this data on the remote servers. The
proposed scheme enables the authorized users to ensure that they are receiving the most
recent version of the outsourced data. Moreover, in case of dispute regarding data
integrity/newness, a TTPA is able to determine the dishonest party. The data owner enforces
access control for the outsourced data by combining three cryptographic techniques:
broadcast encryption, lazy revocation, and key rotation. The experimental results show that
Cloud storage model considered in this work has four main components as depicted.
i. A data owner can be an organization, which generates sensitive data that is to be outsourced
ii. A Trusted Third Party Auditor (TTPA) who is trusted by all other components and has the
iii. A CSP who manages cloud services and provides paid storage service on its infrastructure
to the data owner, where he outsources the file and makes them available for authorized
users.
10
iv. Authorized users – a set of owner’s clients who have the right to access the outsourced
file.
An AES based algorithm was proposed by [ CITATION Deb14 \l 1033 ], which is a framework
which encrypts a file before it is uploaded on to the cloud. AES (Advanced Encryption
Standard) is one of the most secure encryption algorithms and not many attacks are
successful on data which is encrypted using AES. This proposal solves the problem of most,
if not all, of the threats that data stored in the cloud faces. Our framework also suggests the
use of login id and password to ensure authentic and authorized access to a user’s data. Thus,
if used securely, cloud computing provides a user with amazing benefits and overcomes its
11
References
Al-Hazaimeh, O. M. (2013). A new approach for complex encrypting and decrypting data.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, , 95-
103.
Debajyoti Mukhopadhyay, G. S. (2014). Enhanced Security for Cloud Storage using File
Technology, 55-98.
Technology, 2137-2143.
141.
12