SlideShare a Scribd company logo
1 of 7
Final year project 
PICTURE ARITHMETIC CRYPTOSYSTEM USING SYMMETRIC KEY 
ENCRYPTION ALGORITHM WITH LEGITIMATE PICTURES. 
Document explanation : 
1. GENERATION OF PICTURE SORTING KEY: 
On the receiver side, the picture sorting 
key is generated from the secret code sent by the sender. To generate the picture 
sorting key, LOCK-10(LOgical Crypto Key) operation is performed over the secret 
code. LOCK-10 consists of ten different logical operations which can be done in 
ten factorial (3628800) ways. The ten operations are 
1. GCD (Greatest Common Divisor) of the digits 
2. LCM (Least Common Multiple) of the digits 
3. Sum of the digits 
4. Product of the digits 
5. Square of the number 
6. Sum of square of digits 
7. Product of square of digits 
8. Sum of cube of digits 
9. Product of cube of digits 
10.Cube of the number 
Let the secret code be 12345. Now the picture sorting key is generated as follows: 
 GCD of the digits (GCD (1,2,3,4,5) ) is 1. 
 LCM of the digits (LCM (1,2,3,4,5) ) is 60. 
 Sum of the digits (1+2+3+4+5) is 15. 
 Product of the digits (1*2*3*4*5) is 120. 
 Square of the number (123452) is 152399025. 
 Sum of square of digits (12+22+32+42+52) is 55. 
 Product of square of digits (12*22*32*42*52) is 14400. 
 Sum of cube of digits (13+23+33+43+53) is 225.
 Product of cube of digits (13*23*33*43*53) is 1728000. 
 Cube of the number (123453) is 1881365963625. 
Now the Picture sorting key can be produced in 3628800 ways (10 factorial). 
Anyone of those ways is chosen at random to create the picture sorting key. E.g. 
14400152399025115601881365963625225120551728000 is the new picture 
sorting key generated in the order 7,5,1,3,2,10,8,4,6,9. 
2. SORTING ‘N’ PICTURES: 
The ‘N’ pictures in the folder are sorted using picture 
sorting key (which is already generated from the secret key). We know that N 
pictures can be sorted in ‘N’ factorial ways. Let the picture sorting key be 
14400152399025115601881365963625225120551728000. Then the N pictures 
are arranged in (14400152399025115601881365963625225120551728000 mod 
‘N’ Factorial)th way in the folder. These ‘N’ pictures are sorted and pasted in a 
folder by converting each picture into a BYTE array (byte []). Thus the ‘N’ pictures 
are sorted in a new folder by using Picture Sorting key. Without knowing the exact 
arrangement of pictures in folder, it will take a very long time for the hackers to 
crack the key. 
3. CONSTRUCTION OF 10X26 TABLE: 
It is a table with 26 English alphabets (a-z) and 
10 numbers (0-9). It is a 10x26 matrix where the 26 English alphabets are 
arranged in different forms as 10 rows. This matrix is stored in a double 
dimensional array. We have used four 10x26 matrices to encrypt the message 
which are stored in four discrete 2d arrays. Any one of these 2d arrays is chosen 
in random to encrypt the message which makes the task very hard for the hackers 
to break our system. 
A sample 10x26 matrix is shown below: 
A B C D E F G H I J K L M N O P Q R S T U V W X Y 
Z 
0 j r z w y x f h a o m u p d g b e t v n q c i l s k
1 d c t l r a w z j h v b k e s n i x g y o m p f u q 
2 p l r x s f y j t c w k q e a v b i g d n m z u o h 
3 v e j x r i n k w d u y s b p h o m a c l g f z t q 
4 n v z o t i x q f h m b r c g y p a e j u d l w s k 
5 a w e f u b r i m g t d c j p n v x o k q s l h z y 
6 d b h r k a o z p g t v n u j y m f w q c i x e s l 
7 n v z f h w b e l k d g x a m c r o j y s t i q u p 
8 p j i n f y e d s l q t w c r x m z u o a b g k h v 
9 c z n m k x p e a l w s d r t i f u g v q b h j o y 
4. CONVERSION OF PICTURES TO KEY (1st key): 
To get the pictures from the key PACK (Picture 
Arithmetic Crypto Key) operation is performed over the pictures. N pictures are 
spitted in six groups and each group is assigned with certain specific operations. 
 The first group is assigned with no-operation and so the key digit will be 
taken as the position of the picture mod 10. E.g.: if the picture is in 12th 
place of the first group then the key digit will be taken as 12%10=2. 
 The second group is assigned with the operation Addition. The mod 
operation is performed with the position of the picture and the result is 
added with the previous key digit. If the result of the add operation exceeds 
9 then mod 10 operation is performed over the result. 
 The third group is assigned with the operation Subtraction. The mod 
operation is performed with the position of the picture and the result is 
subtracted from the previous key digit. If the result of the sub operation 
takes a negative value then mod 10 operation is performed over the result. 
 The fourth group is assigned with the operation Multiplication. The mod 
operation is performed with the position of the picture and the result is 
multiplied with the previous key digit. If the result of the mul operation 
exceeds 9 then mod 10 operation is performed over the result. 
 The fifth group is assigned with the operation Division. The mod operation 
is performed with the position of the picture and the result is used to divide
the previous key digit. If the result of the div operation exceeds 9 then mod 
10 operation is performed over the result. 
 The sixth group is assigned with the operation Mod. The mod operation is 
performed with the position of the picture and the result is used to perform 
mod operation with the previous key digit. If the result of the mod 
operation exceeds 9 then mod 10 operation is performed over the result. 
The above six operations are continuously applied to get the key from the 
pictures. As a result of this process we get the first key. Since the key digits are 
continuously changing with every picture, it will be a very tough task for the 
hackers to know the key. We will send the picture-key part by part so if a cracker 
is not aware of any one of this part then he cannot get even a part of the key. 
5. GENERATION OF SECOND KEY: 
The second key is generated from the first key by 
performing LOCK-5(LOgical Crypto Key) operation. LOCK-5 consists of five 
different operations. The five operations are 
1. GCD (Greatest Common Divisor) of the digits 
2. LCM (Least Common Multiple) of the digits 
3. Sum of the digits 
4. Product of the digits 
5. Square of the number. 
Let the 1st key be 12345. Now the second key is generated as follows: 
 GCD of the digits (1,2,3,4,5) is 1. 
 LCM of the digits (1,2,3,4,5) is 60. 
 Sum of the digits (1,2,3,4,5) is 15. 
 Product of the digits (1,2,3,4,5) is 120. 
 Square of the number (12345) is 152399025. 
Now the second key can be produced in 120 ways (5 factorial). Anyone of those 
ways is chosen at random to create the second key. E.g. 12015115239902560 is 
the new second key generated in the order 4,3,1,5,2.
6. ENCRYPTION WITH 1ST KEY USING VIGENERE CIPHER: 
Encryption with Vigenere cipher is usually 
performed by using the key as a string or a group of words. But here we are using 
the numeric key to encrypt our message. Let the message be “hello world” and the 
key be “454565”. Now encryption with vigenere cipher is done as follows: 
 The first character of the message is ‘h’ and it is shifted forward by 4 places 
of English alphabets, since the first key digit is 4. Therefore, the first 
character of the encrypted message is ‘l’. 
 The second character of the message is ‘e’ and it is shifted forward by 5 
places of English alphabets, since the second key digit is 5. Therefore, the 
second character of the encrypted message is ‘j’. 
Similarly, we get the encrypted message as “ljpqu bswpi”. 
Note: The encryption process follows round-robin fashion if the key reaches its 
end. 
7. ENCRYPTION WITH 2nd KEY USING 10x26 matrix: 
Let the message be “hello world” and 
the key be 324345. Now the encryption procedure is as follows: 
 The first letter of the message is ’h’ and first digit of the key is 3. In the 
above matrix, the row 3 (i.e., 4th row) corresponding to column H has the 
alphabet ‘k’. Therefore the first letter of the encrypted message is ‘k’. 
 The second letter of the message is ’e’ and first digit of the key is 2. In the 
above matrix, the row 2 (i.e., 3rd row) corresponding to column E has the 
alphabet ‘s’. Therefore the second letter of the encrypted message is ‘s’. 
Similarly, for the message “hello world” we get the encrypted message as “ksbyg 
lpibx”. 
Note: The encryption process follows round-robin fashion if the key reaches its 
end. 
8. DECRYPTION WITH SECOND KEY USING 10x26 MATRIX:
The decryption process using 10x26 matrix 
is just the reverse process of encryption. Let the encrypted message be “ksbyg 
lpibx” and the key be 324345. Now the decryption procedure is as follows: 
 The first letter of the encrypted message is ’k’ and first digit of the key is 3. 
In the above matrix, the row 3 (i.e., 4th row) corresponding to column H has 
the alphabet ‘k’. Therefore the first letter of the decrypted message is ‘h’. 
 The second letter of the encrypted message is ’s’ and first digit of the key is 
2. In the above matrix, the row 2 (i.e., 3rd row) corresponding to column E 
has the alphabet ‘s’. Therefore the second letter of the decrypted message 
is ‘s’. 
Similarly, for the encrypted message “ksbyg lpibx” we get the decrypted message 
as “hello world”. 
Note: The decryption process follows round-robin fashion if the key reaches its 
end. 
9. DECRYPTION WITH 1ST KEY USING VIGENERE CIPHER: 
The decryption process using vigenere 
cipher is just the reverse process of encryption. Let the encrypted message be 
“ljpqu bswpi” and the key be “454565”. Now decryption with vigenere cipher is 
done as follows: 
 The first character of the message is ‘l’ and it is shifted backward by 4 
places of English alphabets, since the first key digit is 4. Therefore, the first 
character of the decrypted message is ‘h’. 
 The second character of the encrypted message is ‘j’ and it is shifted 
backward by 5 places of English alphabets, since the second key digit is 5. 
Therefore, the second character of the decrypted message is ‘e’. 
Similarly, we get the decrypted message as “hello world”. 
Note: The decryption process follows round-robin fashion if the key reaches its 
end.
Picture arithmetic cryptosystem module explanation

More Related Content

What's hot

Lesson 6 Nov 23 24 09
Lesson 6 Nov 23 24 09Lesson 6 Nov 23 24 09
Lesson 6 Nov 23 24 09
ingroy
 

What's hot (20)

Chess board problem(divide and conquer)
Chess board problem(divide and conquer)Chess board problem(divide and conquer)
Chess board problem(divide and conquer)
 
An Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eAn Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent e
 
RSA cracking puzzle
RSA cracking puzzleRSA cracking puzzle
RSA cracking puzzle
 
RSA without Padding
RSA without PaddingRSA without Padding
RSA without Padding
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dAnalysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
 
On deriving the private key from a public key
On deriving the private key from a public keyOn deriving the private key from a public key
On deriving the private key from a public key
 
Solutions to online rsa factoring challenges
Solutions to online rsa factoring challengesSolutions to online rsa factoring challenges
Solutions to online rsa factoring challenges
 
An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)
 
Cyclic Attacks on the RSA Trapdoor Function
Cyclic Attacks on the RSA Trapdoor FunctionCyclic Attacks on the RSA Trapdoor Function
Cyclic Attacks on the RSA Trapdoor Function
 
Computer graphics
Computer graphicsComputer graphics
Computer graphics
 
Unit 1(stld)
Unit 1(stld)Unit 1(stld)
Unit 1(stld)
 
Algebra [project]
Algebra [project]Algebra [project]
Algebra [project]
 
0302 ch 3 day 2
0302 ch 3 day 20302 ch 3 day 2
0302 ch 3 day 2
 
The Blockchain
The BlockchainThe Blockchain
The Blockchain
 
Recursion - Computer Algorithms
Recursion - Computer AlgorithmsRecursion - Computer Algorithms
Recursion - Computer Algorithms
 
Lesson 6 Nov 23 24 09
Lesson 6 Nov 23 24 09Lesson 6 Nov 23 24 09
Lesson 6 Nov 23 24 09
 
DFA
DFA DFA
DFA
 
Rsa encryption
Rsa encryptionRsa encryption
Rsa encryption
 
Differntials equatoin
Differntials equatoinDifferntials equatoin
Differntials equatoin
 
Lec10-CS110 Computational Engineering
Lec10-CS110 Computational EngineeringLec10-CS110 Computational Engineering
Lec10-CS110 Computational Engineering
 

Similar to Picture arithmetic cryptosystem module explanation

HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
wellesleyterresa
 
A Bizarre Way to do Real-Time Lighting
A Bizarre Way to do Real-Time LightingA Bizarre Way to do Real-Time Lighting
A Bizarre Way to do Real-Time Lighting
Steven Tovey
 
Mathematics in everyday life
Mathematics in everyday lifeMathematics in everyday life
Mathematics in everyday life
Prathika Jp Jp
 
There are two types of ciphers - Block and Stream. Block is used to .docx
There are two types of ciphers - Block and Stream. Block is used to .docxThere are two types of ciphers - Block and Stream. Block is used to .docx
There are two types of ciphers - Block and Stream. Block is used to .docx
relaine1
 
A NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLE
A NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLEA NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLE
A NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLE
satya kishore
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 

Similar to Picture arithmetic cryptosystem module explanation (20)

HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
 
DeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningDeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep Learning
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
DES Simplified
DES SimplifiedDES Simplified
DES Simplified
 
con-dif2
con-dif2con-dif2
con-dif2
 
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docx
 
Assignment6
Assignment6Assignment6
Assignment6
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
 
CMT
CMTCMT
CMT
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Ceng232 Decoder Multiplexer Adder
Ceng232 Decoder Multiplexer AdderCeng232 Decoder Multiplexer Adder
Ceng232 Decoder Multiplexer Adder
 
Cryptography
CryptographyCryptography
Cryptography
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
A Bizarre Way to do Real-Time Lighting
A Bizarre Way to do Real-Time LightingA Bizarre Way to do Real-Time Lighting
A Bizarre Way to do Real-Time Lighting
 
How to invent a new cryptosystem.pdf
How to invent a new cryptosystem.pdfHow to invent a new cryptosystem.pdf
How to invent a new cryptosystem.pdf
 
Mathematics in everyday life
Mathematics in everyday lifeMathematics in everyday life
Mathematics in everyday life
 
There are two types of ciphers - Block and Stream. Block is used to .docx
There are two types of ciphers - Block and Stream. Block is used to .docxThere are two types of ciphers - Block and Stream. Block is used to .docx
There are two types of ciphers - Block and Stream. Block is used to .docx
 
A NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLE
A NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLEA NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLE
A NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLE
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 

More from hari krishnan.n

More from hari krishnan.n (18)

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisation
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketing
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedIn
 
ERP IN CLOUD
ERP IN CLOUDERP IN CLOUD
ERP IN CLOUD
 
Make science in india
Make science in indiaMake science in india
Make science in india
 
Derivative Market
Derivative MarketDerivative Market
Derivative Market
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education system
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communication
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategy
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...
 
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classification
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
i-mode ppt and syncml
i-mode ppt and syncmli-mode ppt and syncml
i-mode ppt and syncml
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Picture arithmetic cryptosystem module explanation

  • 1. Final year project PICTURE ARITHMETIC CRYPTOSYSTEM USING SYMMETRIC KEY ENCRYPTION ALGORITHM WITH LEGITIMATE PICTURES. Document explanation : 1. GENERATION OF PICTURE SORTING KEY: On the receiver side, the picture sorting key is generated from the secret code sent by the sender. To generate the picture sorting key, LOCK-10(LOgical Crypto Key) operation is performed over the secret code. LOCK-10 consists of ten different logical operations which can be done in ten factorial (3628800) ways. The ten operations are 1. GCD (Greatest Common Divisor) of the digits 2. LCM (Least Common Multiple) of the digits 3. Sum of the digits 4. Product of the digits 5. Square of the number 6. Sum of square of digits 7. Product of square of digits 8. Sum of cube of digits 9. Product of cube of digits 10.Cube of the number Let the secret code be 12345. Now the picture sorting key is generated as follows:  GCD of the digits (GCD (1,2,3,4,5) ) is 1.  LCM of the digits (LCM (1,2,3,4,5) ) is 60.  Sum of the digits (1+2+3+4+5) is 15.  Product of the digits (1*2*3*4*5) is 120.  Square of the number (123452) is 152399025.  Sum of square of digits (12+22+32+42+52) is 55.  Product of square of digits (12*22*32*42*52) is 14400.  Sum of cube of digits (13+23+33+43+53) is 225.
  • 2.  Product of cube of digits (13*23*33*43*53) is 1728000.  Cube of the number (123453) is 1881365963625. Now the Picture sorting key can be produced in 3628800 ways (10 factorial). Anyone of those ways is chosen at random to create the picture sorting key. E.g. 14400152399025115601881365963625225120551728000 is the new picture sorting key generated in the order 7,5,1,3,2,10,8,4,6,9. 2. SORTING ‘N’ PICTURES: The ‘N’ pictures in the folder are sorted using picture sorting key (which is already generated from the secret key). We know that N pictures can be sorted in ‘N’ factorial ways. Let the picture sorting key be 14400152399025115601881365963625225120551728000. Then the N pictures are arranged in (14400152399025115601881365963625225120551728000 mod ‘N’ Factorial)th way in the folder. These ‘N’ pictures are sorted and pasted in a folder by converting each picture into a BYTE array (byte []). Thus the ‘N’ pictures are sorted in a new folder by using Picture Sorting key. Without knowing the exact arrangement of pictures in folder, it will take a very long time for the hackers to crack the key. 3. CONSTRUCTION OF 10X26 TABLE: It is a table with 26 English alphabets (a-z) and 10 numbers (0-9). It is a 10x26 matrix where the 26 English alphabets are arranged in different forms as 10 rows. This matrix is stored in a double dimensional array. We have used four 10x26 matrices to encrypt the message which are stored in four discrete 2d arrays. Any one of these 2d arrays is chosen in random to encrypt the message which makes the task very hard for the hackers to break our system. A sample 10x26 matrix is shown below: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 j r z w y x f h a o m u p d g b e t v n q c i l s k
  • 3. 1 d c t l r a w z j h v b k e s n i x g y o m p f u q 2 p l r x s f y j t c w k q e a v b i g d n m z u o h 3 v e j x r i n k w d u y s b p h o m a c l g f z t q 4 n v z o t i x q f h m b r c g y p a e j u d l w s k 5 a w e f u b r i m g t d c j p n v x o k q s l h z y 6 d b h r k a o z p g t v n u j y m f w q c i x e s l 7 n v z f h w b e l k d g x a m c r o j y s t i q u p 8 p j i n f y e d s l q t w c r x m z u o a b g k h v 9 c z n m k x p e a l w s d r t i f u g v q b h j o y 4. CONVERSION OF PICTURES TO KEY (1st key): To get the pictures from the key PACK (Picture Arithmetic Crypto Key) operation is performed over the pictures. N pictures are spitted in six groups and each group is assigned with certain specific operations.  The first group is assigned with no-operation and so the key digit will be taken as the position of the picture mod 10. E.g.: if the picture is in 12th place of the first group then the key digit will be taken as 12%10=2.  The second group is assigned with the operation Addition. The mod operation is performed with the position of the picture and the result is added with the previous key digit. If the result of the add operation exceeds 9 then mod 10 operation is performed over the result.  The third group is assigned with the operation Subtraction. The mod operation is performed with the position of the picture and the result is subtracted from the previous key digit. If the result of the sub operation takes a negative value then mod 10 operation is performed over the result.  The fourth group is assigned with the operation Multiplication. The mod operation is performed with the position of the picture and the result is multiplied with the previous key digit. If the result of the mul operation exceeds 9 then mod 10 operation is performed over the result.  The fifth group is assigned with the operation Division. The mod operation is performed with the position of the picture and the result is used to divide
  • 4. the previous key digit. If the result of the div operation exceeds 9 then mod 10 operation is performed over the result.  The sixth group is assigned with the operation Mod. The mod operation is performed with the position of the picture and the result is used to perform mod operation with the previous key digit. If the result of the mod operation exceeds 9 then mod 10 operation is performed over the result. The above six operations are continuously applied to get the key from the pictures. As a result of this process we get the first key. Since the key digits are continuously changing with every picture, it will be a very tough task for the hackers to know the key. We will send the picture-key part by part so if a cracker is not aware of any one of this part then he cannot get even a part of the key. 5. GENERATION OF SECOND KEY: The second key is generated from the first key by performing LOCK-5(LOgical Crypto Key) operation. LOCK-5 consists of five different operations. The five operations are 1. GCD (Greatest Common Divisor) of the digits 2. LCM (Least Common Multiple) of the digits 3. Sum of the digits 4. Product of the digits 5. Square of the number. Let the 1st key be 12345. Now the second key is generated as follows:  GCD of the digits (1,2,3,4,5) is 1.  LCM of the digits (1,2,3,4,5) is 60.  Sum of the digits (1,2,3,4,5) is 15.  Product of the digits (1,2,3,4,5) is 120.  Square of the number (12345) is 152399025. Now the second key can be produced in 120 ways (5 factorial). Anyone of those ways is chosen at random to create the second key. E.g. 12015115239902560 is the new second key generated in the order 4,3,1,5,2.
  • 5. 6. ENCRYPTION WITH 1ST KEY USING VIGENERE CIPHER: Encryption with Vigenere cipher is usually performed by using the key as a string or a group of words. But here we are using the numeric key to encrypt our message. Let the message be “hello world” and the key be “454565”. Now encryption with vigenere cipher is done as follows:  The first character of the message is ‘h’ and it is shifted forward by 4 places of English alphabets, since the first key digit is 4. Therefore, the first character of the encrypted message is ‘l’.  The second character of the message is ‘e’ and it is shifted forward by 5 places of English alphabets, since the second key digit is 5. Therefore, the second character of the encrypted message is ‘j’. Similarly, we get the encrypted message as “ljpqu bswpi”. Note: The encryption process follows round-robin fashion if the key reaches its end. 7. ENCRYPTION WITH 2nd KEY USING 10x26 matrix: Let the message be “hello world” and the key be 324345. Now the encryption procedure is as follows:  The first letter of the message is ’h’ and first digit of the key is 3. In the above matrix, the row 3 (i.e., 4th row) corresponding to column H has the alphabet ‘k’. Therefore the first letter of the encrypted message is ‘k’.  The second letter of the message is ’e’ and first digit of the key is 2. In the above matrix, the row 2 (i.e., 3rd row) corresponding to column E has the alphabet ‘s’. Therefore the second letter of the encrypted message is ‘s’. Similarly, for the message “hello world” we get the encrypted message as “ksbyg lpibx”. Note: The encryption process follows round-robin fashion if the key reaches its end. 8. DECRYPTION WITH SECOND KEY USING 10x26 MATRIX:
  • 6. The decryption process using 10x26 matrix is just the reverse process of encryption. Let the encrypted message be “ksbyg lpibx” and the key be 324345. Now the decryption procedure is as follows:  The first letter of the encrypted message is ’k’ and first digit of the key is 3. In the above matrix, the row 3 (i.e., 4th row) corresponding to column H has the alphabet ‘k’. Therefore the first letter of the decrypted message is ‘h’.  The second letter of the encrypted message is ’s’ and first digit of the key is 2. In the above matrix, the row 2 (i.e., 3rd row) corresponding to column E has the alphabet ‘s’. Therefore the second letter of the decrypted message is ‘s’. Similarly, for the encrypted message “ksbyg lpibx” we get the decrypted message as “hello world”. Note: The decryption process follows round-robin fashion if the key reaches its end. 9. DECRYPTION WITH 1ST KEY USING VIGENERE CIPHER: The decryption process using vigenere cipher is just the reverse process of encryption. Let the encrypted message be “ljpqu bswpi” and the key be “454565”. Now decryption with vigenere cipher is done as follows:  The first character of the message is ‘l’ and it is shifted backward by 4 places of English alphabets, since the first key digit is 4. Therefore, the first character of the decrypted message is ‘h’.  The second character of the encrypted message is ‘j’ and it is shifted backward by 5 places of English alphabets, since the second key digit is 5. Therefore, the second character of the decrypted message is ‘e’. Similarly, we get the decrypted message as “hello world”. Note: The decryption process follows round-robin fashion if the key reaches its end.