SlideShare a Scribd company logo
1 of 3
PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC 
KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES 
ABSTRACT 
The secret messages passed through network are hacked and algorithms 
are not efficient to the expected level. A powerful encryption technique is 
introduced and performs a large variety of generating keys to encrypt the 
message in the form of pictures. The arithmetic operations are performed over 
the picture key to make the technique even more powerful. First encryption is 
done with the help of vigenere cipher and the key is generated through picture. 
Second encryption is done with the help of newly designed 10x26 table and the 
key is generated from the first key. The decryption is done by the reverse of 
encryption process.
EXISTING SYSTEM 
The cryptographic systems use the key to encrypt messages in the form of text or 
string. Vigenere cipher can be broken using counting diagram.Total number of combinations 
required to break the system using counting diagram is very small. Large key size makes the 
system less efficient. The secret key to perform encryption is more reliable to attack because 
it is an easily recognizable format. 
PROPOSED SYSTEM 
The encryption of the message is done using the picture key which is difficult to 
break. Total number of combinations required to break the system exceeds hundred digit 
number and more with increase in number of pictures. The system performances increases 
with increase in key size. The system uses two main operations to make the key stronger. The 
first operation is LOCK-10(Logical Crypto Key)is performed over the secret code to get the 
picture sorting key.LOCK-10 involves 10 different operations and these are performed over 
the secret code to get the picture sorting key. The operation LOCK-10 can be performed in 10 
factorial ways .The picture sorting key is obtained and the ‘N’ pictures are arranged in one of 
the ‘N’ factorial ways. The PACK(Picture Arithmetic Crypto Key) operation is performed 
over the picture key to get the first key. The second key is generated from the first key by 
performing LOCK-5 operation over the first key. The vigenere encryption is performed over 
the first key and encryption is performed over the second key with the help of 10x26 matrix. 
Increase in number of pictures used for ciphering, increases the system performance 
proportionally.
REQUIREMENT SPECIFICATIONS 
HARDWARE REQUIREMENT 
Processor : Pentium IV or above 
Ram : 512 MB 
Hdd : 80 GB 
SOFTWARE REQUIREMENT 
Operating system : windows 
Platform : c#.Net 4.0 
Front End : C Sharp

More Related Content

Similar to Picture Arithmetic Cryptosystems Using Symmetric Key

Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageZTech Proje
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsMaddiSujitha
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) cscpconf
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using SteganographyIRJET Journal
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...swapnalithakur7
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 

Similar to Picture Arithmetic Cryptosystems Using Symmetric Key (20)

7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
G05124550
G05124550G05124550
G05124550
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Unit 2
Unit 2Unit 2
Unit 2
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 

More from hari krishnan.n

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisationhari krishnan.n
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketinghari krishnan.n
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInhari krishnan.n
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education systemhari krishnan.n
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communicationhari krishnan.n
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategyhari krishnan.n
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...hari krishnan.n
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.hari krishnan.n
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality testshari krishnan.n
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality testshari krishnan.n
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1hari krishnan.n
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classificationhari krishnan.n
 

More from hari krishnan.n (17)

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisation
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketing
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedIn
 
ERP IN CLOUD
ERP IN CLOUDERP IN CLOUD
ERP IN CLOUD
 
Make science in india
Make science in indiaMake science in india
Make science in india
 
Derivative Market
Derivative MarketDerivative Market
Derivative Market
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education system
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communication
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategy
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classification
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
i-mode ppt and syncml
i-mode ppt and syncmli-mode ppt and syncml
i-mode ppt and syncml
 

Recently uploaded

The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Picture Arithmetic Cryptosystems Using Symmetric Key

  • 1. PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES ABSTRACT The secret messages passed through network are hacked and algorithms are not efficient to the expected level. A powerful encryption technique is introduced and performs a large variety of generating keys to encrypt the message in the form of pictures. The arithmetic operations are performed over the picture key to make the technique even more powerful. First encryption is done with the help of vigenere cipher and the key is generated through picture. Second encryption is done with the help of newly designed 10x26 table and the key is generated from the first key. The decryption is done by the reverse of encryption process.
  • 2. EXISTING SYSTEM The cryptographic systems use the key to encrypt messages in the form of text or string. Vigenere cipher can be broken using counting diagram.Total number of combinations required to break the system using counting diagram is very small. Large key size makes the system less efficient. The secret key to perform encryption is more reliable to attack because it is an easily recognizable format. PROPOSED SYSTEM The encryption of the message is done using the picture key which is difficult to break. Total number of combinations required to break the system exceeds hundred digit number and more with increase in number of pictures. The system performances increases with increase in key size. The system uses two main operations to make the key stronger. The first operation is LOCK-10(Logical Crypto Key)is performed over the secret code to get the picture sorting key.LOCK-10 involves 10 different operations and these are performed over the secret code to get the picture sorting key. The operation LOCK-10 can be performed in 10 factorial ways .The picture sorting key is obtained and the ‘N’ pictures are arranged in one of the ‘N’ factorial ways. The PACK(Picture Arithmetic Crypto Key) operation is performed over the picture key to get the first key. The second key is generated from the first key by performing LOCK-5 operation over the first key. The vigenere encryption is performed over the first key and encryption is performed over the second key with the help of 10x26 matrix. Increase in number of pictures used for ciphering, increases the system performance proportionally.
  • 3. REQUIREMENT SPECIFICATIONS HARDWARE REQUIREMENT Processor : Pentium IV or above Ram : 512 MB Hdd : 80 GB SOFTWARE REQUIREMENT Operating system : windows Platform : c#.Net 4.0 Front End : C Sharp