SlideShare a Scribd company logo
1 of 12
AN EFFICIENT OPERATOR BASED UNICODE
CRYPTOGRAPHY ALGORITHM FOR TEXT,
AUDIO AND VIDEO FILES
CRYPTOGRAPHY
 In modern times, science of using mathematics to
encrypt and decrypt data
 Examples: ATM Cards, Computer passwords,
E-Commerce
CONDITIONS TO BE SATISFIED
 Authentication: verifying the identity of user
 Privacy: only the intended user reads the message
 Integrity: the exact original message received by
user
 Non-repudiation: proving that the sender really sent
the message
CRYPTOGRAPHIC TECHNIQUES
OPERATORS IN ENCODING
 Every plain text can be converted into numeric
value irrespective of its magnitude.
Value 1
Value 2
Value X*
Plain
Text
Cipher
Text
Encoding
WHY UNICODE ?
 Common standard-65536 characters available
 100,000 code positions allocated to characters
 Many code points not yet assigned
 Many code points are permanent non characters
 Hence Unicode mapping (UTF 16) is chosen
DESIGN USING UNICODE
Plain
Text
Unicode
Cipher Text
Operator F(x)
KEY BINDING METHODS
 Numeric key is binded
 Entire Text Binding:
- Each character key added
- Inefficient method , hence avoided
 Feed Back Based Security:
- First character key added
- Loop continued till end of the word or input
- Current Char Key depends Previous Char
input
-No repetition
 Criteria for secret key:
- Must be numeric value
- Unique value range from 0 to 65536
 Serial Digit Secret Key:
- Depending on the operator , key is added to
block
- Key range is larger
 String Structure Key Bind:
-Series of characters instead of numbers
-Key can have Unicode equivalent values
CONCLUSION
 Thus Unicode character set provides better
encoding algorithm
 Hence it increases complexity of cipher text &
provides better security for all file types
An Efficient Operator Based Unicode Cryptography Algorithm For Text, Audio And Video Files

More Related Content

Similar to An Efficient Operator Based Unicode Cryptography Algorithm For Text, Audio And Video Files

SmartWorld Portfolio
SmartWorld PortfolioSmartWorld Portfolio
SmartWorld PortfolioSmart World
 
Cryptography101
Cryptography101Cryptography101
Cryptography101NCC Group
 
How do Things talk? IoT Application Protocols 101
How do Things talk? IoT Application Protocols 101How do Things talk? IoT Application Protocols 101
How do Things talk? IoT Application Protocols 101Christian Götz
 
Secubio Iclear100 Colored Fingerprint+ID Card Time Clock and Access Control S...
Secubio Iclear100 Colored Fingerprint+ID Card Time Clock and Access Control S...Secubio Iclear100 Colored Fingerprint+ID Card Time Clock and Access Control S...
Secubio Iclear100 Colored Fingerprint+ID Card Time Clock and Access Control S...secubio Secubio
 
IDEX Smartfinger Product Data Sheet
IDEX Smartfinger Product Data SheetIDEX Smartfinger Product Data Sheet
IDEX Smartfinger Product Data SheetIDEX ASA
 
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 WorkshopNXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 WorkshopOpen Mobile Alliance
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmVittorio Giovara
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image4HG20EC020MouneshGow
 
Reflection bio metric product brochure
Reflection bio metric product brochureReflection bio metric product brochure
Reflection bio metric product brochureReflectiontechnologies
 
Access Control Device in Bangladesh-CCTV Bangladesh
Access Control Device in Bangladesh-CCTV BangladeshAccess Control Device in Bangladesh-CCTV Bangladesh
Access Control Device in Bangladesh-CCTV Bangladeshsmnoornabisohag
 
Access Control System in Bangladesh-OptimationBD
Access Control System in Bangladesh-OptimationBDAccess Control System in Bangladesh-OptimationBD
Access Control System in Bangladesh-OptimationBDCCTV Camera Bangladesh
 
Access Control Device-CCTV Camera in Bangladesh
Access Control Device-CCTV Camera in BangladeshAccess Control Device-CCTV Camera in Bangladesh
Access Control Device-CCTV Camera in BangladeshOptimationBD
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsIRJET Journal
 
How to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemHow to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemFEIG Electronics
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...IRJET Journal
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 

Similar to An Efficient Operator Based Unicode Cryptography Algorithm For Text, Audio And Video Files (20)

SmartWorld Portfolio
SmartWorld PortfolioSmartWorld Portfolio
SmartWorld Portfolio
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
 
How do Things talk? IoT Application Protocols 101
How do Things talk? IoT Application Protocols 101How do Things talk? IoT Application Protocols 101
How do Things talk? IoT Application Protocols 101
 
Secubio Iclear100 Colored Fingerprint+ID Card Time Clock and Access Control S...
Secubio Iclear100 Colored Fingerprint+ID Card Time Clock and Access Control S...Secubio Iclear100 Colored Fingerprint+ID Card Time Clock and Access Control S...
Secubio Iclear100 Colored Fingerprint+ID Card Time Clock and Access Control S...
 
IDEX Smartfinger Product Data Sheet
IDEX Smartfinger Product Data SheetIDEX Smartfinger Product Data Sheet
IDEX Smartfinger Product Data Sheet
 
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 WorkshopNXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
 
May doc ma_vach_opticon_opi3201
May doc ma_vach_opticon_opi3201May doc ma_vach_opticon_opi3201
May doc ma_vach_opticon_opi3201
 
Civintec introduction 2015
Civintec introduction 2015Civintec introduction 2015
Civintec introduction 2015
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image
 
Reflection bio metric product brochure
Reflection bio metric product brochureReflection bio metric product brochure
Reflection bio metric product brochure
 
Access Control Device in Bangladesh-CCTV Bangladesh
Access Control Device in Bangladesh-CCTV BangladeshAccess Control Device in Bangladesh-CCTV Bangladesh
Access Control Device in Bangladesh-CCTV Bangladesh
 
Access Control System in Bangladesh-OptimationBD
Access Control System in Bangladesh-OptimationBDAccess Control System in Bangladesh-OptimationBD
Access Control System in Bangladesh-OptimationBD
 
Access Control Device-CCTV Camera in Bangladesh
Access Control Device-CCTV Camera in BangladeshAccess Control Device-CCTV Camera in Bangladesh
Access Control Device-CCTV Camera in Bangladesh
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
May doc ma_vach_opticon_nvl2101
May doc ma_vach_opticon_nvl2101May doc ma_vach_opticon_nvl2101
May doc ma_vach_opticon_nvl2101
 
How to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment SystemHow to Easily Upgrade to a Next-Generation Transit Payment System
How to Easily Upgrade to a Next-Generation Transit Payment System
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
May doc ma_vach_opticon_opi2202
May doc ma_vach_opticon_opi2202May doc ma_vach_opticon_opi2202
May doc ma_vach_opticon_opi2202
 

More from Pratyusha Mahavadi

COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING
COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING
COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING Pratyusha Mahavadi
 
ELECTROMAGNETIC EMISSION AND SUSCEPTIBILITY STANDARDS AND SPECIFICATIONS,MIL ...
ELECTROMAGNETIC EMISSION AND SUSCEPTIBILITY STANDARDS AND SPECIFICATIONS,MIL ...ELECTROMAGNETIC EMISSION AND SUSCEPTIBILITY STANDARDS AND SPECIFICATIONS,MIL ...
ELECTROMAGNETIC EMISSION AND SUSCEPTIBILITY STANDARDS AND SPECIFICATIONS,MIL ...Pratyusha Mahavadi
 
Piezo Resistive Pressure Sensor & Case Study of MAP Sensor
Piezo Resistive Pressure Sensor & Case Study of MAP SensorPiezo Resistive Pressure Sensor & Case Study of MAP Sensor
Piezo Resistive Pressure Sensor & Case Study of MAP SensorPratyusha Mahavadi
 
System Model and Power Penalty
System Model and Power PenaltySystem Model and Power Penalty
System Model and Power PenaltyPratyusha Mahavadi
 
Brain gate- thoughts into actions
Brain gate- thoughts into actionsBrain gate- thoughts into actions
Brain gate- thoughts into actionsPratyusha Mahavadi
 

More from Pratyusha Mahavadi (7)

COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING
COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING
COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING
 
ELECTROMAGNETIC EMISSION AND SUSCEPTIBILITY STANDARDS AND SPECIFICATIONS,MIL ...
ELECTROMAGNETIC EMISSION AND SUSCEPTIBILITY STANDARDS AND SPECIFICATIONS,MIL ...ELECTROMAGNETIC EMISSION AND SUSCEPTIBILITY STANDARDS AND SPECIFICATIONS,MIL ...
ELECTROMAGNETIC EMISSION AND SUSCEPTIBILITY STANDARDS AND SPECIFICATIONS,MIL ...
 
Vivaldi
VivaldiVivaldi
Vivaldi
 
Piezo Resistive Pressure Sensor & Case Study of MAP Sensor
Piezo Resistive Pressure Sensor & Case Study of MAP SensorPiezo Resistive Pressure Sensor & Case Study of MAP Sensor
Piezo Resistive Pressure Sensor & Case Study of MAP Sensor
 
System Model and Power Penalty
System Model and Power PenaltySystem Model and Power Penalty
System Model and Power Penalty
 
Bioprinting
BioprintingBioprinting
Bioprinting
 
Brain gate- thoughts into actions
Brain gate- thoughts into actionsBrain gate- thoughts into actions
Brain gate- thoughts into actions
 

Recently uploaded

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Recently uploaded (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

An Efficient Operator Based Unicode Cryptography Algorithm For Text, Audio And Video Files

  • 1.
  • 2. AN EFFICIENT OPERATOR BASED UNICODE CRYPTOGRAPHY ALGORITHM FOR TEXT, AUDIO AND VIDEO FILES
  • 3. CRYPTOGRAPHY  In modern times, science of using mathematics to encrypt and decrypt data  Examples: ATM Cards, Computer passwords, E-Commerce
  • 4. CONDITIONS TO BE SATISFIED  Authentication: verifying the identity of user  Privacy: only the intended user reads the message  Integrity: the exact original message received by user  Non-repudiation: proving that the sender really sent the message
  • 6. OPERATORS IN ENCODING  Every plain text can be converted into numeric value irrespective of its magnitude. Value 1 Value 2 Value X* Plain Text Cipher Text Encoding
  • 7. WHY UNICODE ?  Common standard-65536 characters available  100,000 code positions allocated to characters  Many code points not yet assigned  Many code points are permanent non characters  Hence Unicode mapping (UTF 16) is chosen
  • 9. KEY BINDING METHODS  Numeric key is binded  Entire Text Binding: - Each character key added - Inefficient method , hence avoided  Feed Back Based Security: - First character key added - Loop continued till end of the word or input - Current Char Key depends Previous Char input -No repetition
  • 10.  Criteria for secret key: - Must be numeric value - Unique value range from 0 to 65536  Serial Digit Secret Key: - Depending on the operator , key is added to block - Key range is larger  String Structure Key Bind: -Series of characters instead of numbers -Key can have Unicode equivalent values
  • 11. CONCLUSION  Thus Unicode character set provides better encoding algorithm  Hence it increases complexity of cipher text & provides better security for all file types