Image Encryption
Image Encryption
MINOR PROJECT
Submitted To
Submitted By:
Ritesh Kumar
Enrollment No – 0111IT161085
CERTIFICATE
This is to certify that the work embodies in this dissertation entitled “Image
Cryptography” being submitted by “Ritesh Kumar” (Roll No.:
0111IT161085) for partial fulfillment of the requirement for the award of
“Bachelor of Engineering in Information Technology” discipline to “Rajiv
Gandhi Praudyogiki Vishwavidyalaya, Bhopal(M.P.)” during the academic
year 2018-19 is a record of bonafide piece of work, carried out by him/her
under my supervision and guidance in the “Department of Information
Technology”, Technocrats Institute of Technology, Bhopal (M.P.).
FORWARDED BY:
CERTIFICATE OF APPROVAL
Date: Date:
Technocrats Institute of Technology, Bhopal (M.P.)
Department of Information Technology
DECLARATION
(Subhash Kumar)
Enrollment No.: 0111IT161113
(Ritesh Kumar)
Enrollment No.: 0111IT161085
Date:
Technocrats Institute of Technology, Bhopal (M.P.)
Department of Information Technology
ACKNOWLEDGEMENT
Classification –
The flowchart depicts that cryptology is only one of the factors involved in
securing networks. Cryptology refers to study of codes, which involves both
writing (cryptography) and solving (cryptanalysis) them. Below is a
classification of the crypto-terminologies and their various types.
Cryptography –
It involves usage of one secret key along with encryption and decryption
algorithms which help in securing the contents of the message. The strength of
symmetric key cryptography depends upon the number of key bits. It is
relatively faster than asymmetric key cryptography. There arises a key
distribution problem as the key has to be transferred from the sender to receiver
through a secure channel.
2. Asymmetric key cryptography –
3. Hashing –
It involves taking the plain-text and converting it to a hash value of fixed size
by a hash function. This process ensures integrity of the message as the hash
value on both, sender’s and receiver’s side should match if the message is
unaltered.
Hashing is a one-way process commonly used to validate the integrity of
information. A hash function generates fixed-length value that is always the
same length no matter how large or small the data entering the process.
Additionally, the resulting output is intended to be non-reversible. The fixed
length value generated is unique for every different input that enters the process.
It is because of this unique property and behavior the hashes are used to detect
the alternations to data to any type.
2.Message Digest 4(MD4): - A one-way hash function used for PGP (Pretty
good Privacy), is another application of cryptographic technologies. Using
public key encryption, PGP is one of the most widely recognized cryptosystems
in the world. PGP has been used to protect the privacy of email, data, data
storage and other forms of communications such as instant massaging.
1. Classical attacks –
It can be divided into a) Mathematical analysis and b) Brute-force attacks.
Brute-force attacks runs the encryption algorithm for all possible cases of the
keys until a match is found. Encryption algorithm is treated as a black box.
Analytical attacks are those attacks which focuses on breaking the cryptosystem
by analyzing the internal structure of the encryption algorithm.