You are on page 1of 11

INFORMATION SECURITY ANALYSIS AND AUDIT –

CSE3501

TEAM MEMBERS

P VIJAY NARASIMHA REDDY - 19BCE2425


YASWANTH REDDY AMBATI - 19BCE2392
V CHIRANJEEVI - 19BCE2166

PROJECT SUBMITTED TO

AMUTHA PRABHAKAR M

PROJECT TITLE

IMAGE ENCRYPTION AND DECRYPTION USING AES


ALGORITHM
ABSTRACT

AES (Advanced Encryption standard) is an algorithm which converts


plain text into cipher text using a secret key and you can use the same
key to decrypt the cipher text to obtain plain text.
Our project contains two parts encryption and decryption..
In encryption you have to browse the photo you want to encrypt and
enter a secret key…then a encrypted file will be generated
In decryption enter browse the encrypted file and enter the same
private key used by sender to get the original photo

Technique used to solve the problem:


Cryptography, defined as the science and study of secret writing
concerns the ways in which communications and data can be encoded
to prevent disclosure of their contents through eavesdropping or
message interception, using codes, ciphers and other methods, so that
only certain people can see the real message. Image security is an
utmost concern in the web attacks are become more serious.
Cryptography is used to encrypt data residing on storage devices or
travelling through communication channels to ensure that any illegal
access is not successful. Also, cryptography is used to secure the
process of authenticating different parties attempting any function on
the system. Since a party wishing be granted a certain functionality on
the system must present something that proves that they indeed who
they say they are. That something is sometimes known as credentials
and additional measures must be taken to ensure that these credentials
are only used by their rightful owner. The most classic and obvious
credential are passwords. Passwords are encrypted to protect against
illegal usage.
Security of internet banking account passwords, email accounts
password etc. requires text protection in digital media . Unlike text
messages, the multimedia information including image data has some
special characteristics like redundancy and high correlation among
pixels. One of the main goals that must be achieved during the
transmission of information over the network is security. This
technique will make the information to be transmitted into an
unintelligible form by encryption so that only authorized persons can
correctly recover the information. Encryption is the process of
transforming a piece of information, known as the plaintext, using an
algorithm, known as the cipher, to make it unreadable to anyone
except those possessing special knowledge, usually referred to as a
key. The output is known as the ciphertext. The reverse process of
transforming cipher text to plaintext is known as decryption .
A. SYMMETRIC CRYPTOGRAPHY :

Secret key cryptography is also known as symmetric key


cryptography. In this type both the sender and the receiver know the
same secret key. The sender is encrypting the data or the information
using the secret key and the receiver is decrypt the information using
the same secret key. In the symmetriccryptography the key is playing
a very important role which is depends on the nature of key.
B. Asymmetric key cryptography

Asymmetric cryptography is used encryption and decryption


algorithm pair. With public key cryptography, keys work in pairs of
matched public and private keys. Public key cryptography, also called
asymmetric key cryptography which is using a pair of keys for
encryption and decryption. With public key cryptography, keys work
in pairs of matched public and private keys. The cryptography
technique is using the secret message transfer from one place to
another place over the networks. The cryptography technique is
requiring some algorithms for encrypt the data.
Literature survey

AES ALGORITHM

The Advanced Encryption Standard (AES) is a symmetric


cryptographic algorithm that was established by the U.S. National
Institute of Standards and Technology (NIST) back in 2001. It is a
specification for the encryption of electronic data and is a subset of
the Rijndael block cipher that was created by Belgian cryptographers
NIST selected three different ciphers to include in AES with block
sizes of 128, 192, and 256 bits respectively. It is 256-bit (and
sometimes 128-bit) AES that is commonly seen included with VPNs.

SBOX:
Inverse SBOX
AES ENCRYPTION
AES DECRYPTION
OUTPUTS:

Original image

Encrypted image with secretkey “vijay19BCE2425vi”


Image decrypted with key “vijay19BCE2425vi”
CONCLUSION:
Today, AES is widely used by corporations, governments, and
government agencies around the world, including the U.S.
government, to secure data and transmit it without fear of it being
compromised. It is by far one of the most, if not the most notable
cryptographic algorithm in use today. Using Rijndael, a family of
block ciphers with different key and block sizes, AES securely
encrypts information. It is a cipher block chain, a mode of operation
for a block cipher,that uses an initialization vector. A key
characteristic of AES is that it uses a chaining mechanism that
depends on all preceding blocks of cipher text. If there is a single bit
error, subsequent blocks and thus the information itself can’t be
decrypted.

REFERENCE :
1. William Stallings, “Advance Encryption Standard,” in Cryptography
and Network Security, 4th Ed., India:PEARSON,pp. 134–165.

2. AtulKahate, “Computer-based symmetric key cryptographic


algorithm”, in Cryptography and Network Security, 3th Ed. New
Delhi:McGraw-Hill, pp. 130-141.

3. Manoj .B,Manjula N Harihar (2012, June). “Image Encryption and


Decryption using AES”, International Journal of Engineering and
Advance Technology (IJEAT) volume-1, issue-5, pp.290-294.

4. KundankumarRameshwarSaraf, Vishal PrakashJagtap, Amit Kumar


Mishra, (2014, May-June).”Text and Image Encryption Decryption
Using Advance Encryption Standard”, International Journal of
Emerging Trends and Technology in computer science(IJETTCS)
volume-3, issue-3, pp.118-126.

You might also like