File Transfer Encryption
File Transfer Encryption
project SECURITY
Page 02
OBJECTIVE
To introduce a new mode of secure communication
over the internet by using a steganographic and
personal encryption methods that integrates an
innocuous-looking image which is password protected
and will be used to hide the text file containing the
sensitive data.
Page 03
Literature Review
STEGANOS
means to hide something
Page 05
SEVERAL SYMMETRIC KEY BASE ALGORITHMS
HAVE BEEN DEVELOPED IN THE PAST YEAR.
IN THE PAPER AN EFFICIENT RELIABLE
SYMMETRIC KEY-BASED ALGORITHM TO
ENCRYPT AND DECRYPT THE TEXT DATA HAS
BEEN PROPOSED.
The image file will be protected using a password and the file within the image file will
be encrypted, thereby providing two levels of protection.
One algorithm will be used for encrypting the file contents from plain text to a unique
encrypted value. So, if a third-party member were to find the contents in the text file it
would still be uninterpretable to the intruder.
A file key is generated using MD5 hashing and it is added to the end of file using the
append insertion method.
Page 07
Proposed Work (Cont...)
The encrypted text file is embedded into the image file using LSB Algorithm.
The image will be password protected and to identify the password for the respective
image , filename is added to the password string after a backslash('\').
The password protected image and the encrypted password is sent to the receiver
The receiver will decode the password and open the image file to view the text file in it.
Page 07
File .txt Encrypted File
Image .jpg
ENCRYPTION
LSB Algorithm
Hashing MD5Sum
Transmission
File Key
Sender's Append Insertion Embedded
End Image .jpg
Encrypted Password+'\'
Password
Value +FileName
AES
Algorithm
Password Protected
RECEIVER
Image .jpg
Password Protected
Image .jpg
FileName
Embedded
Password+'\' Password Image .jpg
Encrypted Value
Decryption +FileName
of AES
Transmission
Algorithm Decryption of LSB
Receiver's Algorithm
Encrypted File
End File .txt
DECRYPTION
Image .jpg
Hashing MD5Sum Removing the file key
non-malicious meddling.
LSB Algorithm
Least significant bit (LSB) insertion is a
common and simple method to embed
data in an image file.
When the app launches, you’ll see that there’s only one
option you can configure.
eE
p t i on
F i l
Since these files may carry highly confidential information.And to
provide such security and privacy to the user, File encryption is
essential to protect from unauthorized user access.
This file encryption allows transfers of data from one country to
another from agencys such as RAW, NIA and FBI.
Page 08
CYBER software SECURITY
Softwares
Python
Kali Linux
Visual Studio Code
PyCharm
IDLE Python
Prevent
Page 09
ED BOZY HASH
Algorithm
THEN ADDING
SPLIT THE FILE
THE INDEX
FILE CONTENTS AND
VALUES WITH A
CONTENTS FINDS THEIR
"/"
INDEX VALUES
EG:12/IINI
rit
go
hm
Al
THE LIST IS
RANDOMIZED RANDOMIZED SAVED IN A
VALUES ARE USING LIST
WRITTEN TO A RANDOM
NEW TEXT FILE MODULE
FILE
CONTENTS Page 10
ENCRYPTED
Python Code 1
Page 11
Algorithm
"\N" rit
CHARACTERS
AFTER go
hm
AO F TR EDRE RT IHNAGT
Al
ARE
TT HH EE YN AT RH EE
RECOGNIZED
INAD L LE X
AND GIVEN
V
AA RR LU AE N GAENDD
AS NEW LINE
W I "T/ H" OI SU T
T HREERME OI V N EDDE X
DECRYPTED V A L FU RE O S MA N D
SUCCESSFU E "A/ C" H
LLY VALUES
Page 12
ED BOZY
DECRYPTION Code HASH
Page 13
ED PHA250 HASH
Algorithm 3
PASSWORD ASCII
/PIN VALUE OCTAL
CONCATENATE
LIST rit
RANDOM VALUE go
hm
(ALPHANUMERIC CONVERT
Al
FROM
DICTIONARY VALUES) TO STRING
HASH
GENERATED
Page 14
ED PHA250
Python Code 3 HASH
Page 15
Hashing and Appending
LSB and AES
Decryption Process
Verifying the hash
Decrypting LSB
Encryption Process
Decryption Process - I
Decryption Process - II
conclusion
Conclusion
CYBER SECURITY
Page 17
References
https://link.springer.com/chapter/10.1007/978-3-642-27948-5_23
https://www.engpaper.net/data-encryption.html
https://www.researchgate.net/publication/320149845_A_Secure_
and_Fast_Approach_for_Encryption_and_Decryption_of_Message
_Communication
https://stackoverflow.com/questions/18569784/python-
password-protection
https://roytuts.com/how-to-encrypt-pdf-as-password-protected-
file-in-python/
Page 18
CYBER SECURITY
THANK YOU
nc r y
pt n
f i le e
presentation by
io
Group 50
Page 19