SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 1, December 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD29360 | Volume – 4 | Issue – 1 | November-December 2019 Page 98
Color Cryptography using Substitution Method
Yashvanth. L1, Dr. N. Shanmugapriya2
1MCA Student, 2
Assistant Professor,
1,2Department of Computer Application (PG),
1,2Dr. SNS Rajalakshimi College of Arts and Science, Coimbatore, Tamil Nadu, India
ABSTRACT
In world of computer network, fears come in many different forms. Some of
the most common fears today are software attacks. If we want to secure any
type of data then we can use encryption method. All traditional encryption
methods use substitutionandswitch.Substitutionmethodsmapplaintextinto
ciphertext in which characters, numbers and special symbols are substituted
with other characters, numbers and special symbols. In this paper, we are
using a creative cryptographic replacement method is to generate a stronger
cipher than the existing replacement algorithms. This method focuses on the
replacement of characters, numbers and special symbols with color blocks.
This algorithm of substitution is based on Play Color Cipher.
KEYWORDS: Play Color Cipher (PCC), Color substitution, Color block, Color code
How to cite this paper: Yashvanth. L | Dr.
N. Shanmugapriya "Color Cryptography
using Substitution
Method" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-1, December 2019, pp.98-100, URL:
https://www.ijtsrd.com/papers/ijtsrd29
360.pdf
Copyright © 2019 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
Information security is the safety of information and
minimises the risk of exposing information to unauthorised
gatherings from expose, modification, and destruction of
data. Cryptography is a method of storing and conducting
data in a particular form so that only those for whom it is
future can read and process it. The security of cipher text is
totally dependent twothings:thepowerofthecryptographic
algorithm and the privacy of the key. Many researchershave
adapted the existing algorithms to fulfil the need in the
current market, yet the ciphers are weak to attacks.
2. LITERATURE SURVEY
2.1. Existing Cryptographic System
A. Traditional Symmetric-Key Ciphers
In symmetric key ciphers, plaintext is new into cipher-text
using a shared secret key and anencryptionalgorithm.Using
the same key and a decryption algorithm, the plaintext is
better from the cipher-text. The Secret Keyissharedbyboth,
the sender and the receiver which they must havecreate ina
secure fashion & should keep the key unseen. These ciphers
consist of Switch and Transposition ciphers. A Substitution
cipher replaces one figure with another. A Transposition
cipher rearranges the symbols .
B. Modern Symmetric-Key Ciphers
A symmetric-key modern block cipher encrypts an n-bit
block of plaintext or decrypts an n-bit block of cipher-text.
The encryption or decryption algorithm usages a k-bit key.
A modern block cipher can be intended to act as a
substitution cipher or a transposition cipher DES and AES
are examples of this type of cryptography algorithm.
C. Asymmetric-Key Cryptography
Unequal cryptography or public-key cryptography is
cryptography in which a couple of keys is used to encrypt
and decrypt a message so that it spreads securely. In such
type of cryptography worker who needs to send an
encrypted message can grow the future recipient's public
key from a public directory. They use this key to encrypt the
message, and they refer it to the recipient. Whenthereceiver
gets the message, they decrypt it with their secluded key,
which no one else should yield access to. RSA and Merkle–
Hellman knapsack cryptosystem is the mostcommonlyused
irregular key algorithm. The security of RSA relies on the
difficulty of factoring huge numbers.
2.2. Threats and vulnerabilities in existing systems
RSA is occupied on the improper growth of two prime facts.
Hence, number factorization is a grave intimidating in error
of RSA and currently different kinds of spells have identified
against RSA by cryptanalysis. Most spells seem to be the
effect of waste of the scheme or evil choice of parameters.
Substitution methods like Caesar Cipher, Mono alphabetic
Cipher, play just Cipher and Poly alphabetic Ciphers are not
strong enough since they are weedy to brute-force spells.
IJTSRD29360
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29360 | Volume – 4 | Issue – 1 | November-December 2019 Page 99
3. PROPOSED CRYPTOGRAPHIC SYSTEM
Green and blue (RGB). The user must specify the standards
for the R, G and B channels among the ranges 0-255. Too a
block size of color block requests to be detailed. We propose
a cryptographic substitution method which alters the “Play
Color Cipher” that is called as color coded cryptography.
This system is constructed on symmetric encryptionwhich
is applied by encrypting text into color image. Each
troposphere of the message is encrypted into a section of
color. Every character will be swapped by a different colour
block. The inverse process is used to produce the original
text from color block at the earpiece side. The user enters a
message which is the plaintext spring side. A channel needs
to be special from the three color channels i.e. red
All the characters of the text are then converted to color
blocks formed by joining the values of R, G and B channels. A
single image is then generated by combining all the color
blocks of the message. The block sizeandthechannel certain
form the symmetric key. At the decryption side, thereceived
image is divided into blocks of the size specified in the key.
From each block, the value of thecentrepixel isremovedand
then converted to a plaintext character. This is done for all
blocks and the matching characters are removed.
Fig 1: Block Diagram
3.1. Advantages of proposed system
Each character current in the plaintext is replaced with a
color block from the available 18 Decillions of colors in the
creation and at the getting end the encryption text block (in
color) is decrypted in to plain text block. It stops against
problems like Meet in the mid attack, Birthday outbreak and
Brute force outbreaks.
4. ALGORITHM
4.1. Encryption.
Receive the input text file and the key.
Isolated the input text into isolated fonts. Input the
color-channel (R/G/B) and a color (RGB value).
Undefined on the predefined block-size (say n), divide
the copy box into a web of blocks, each of extent.
Rise the ASCII charge of every paradise withkeyandput
the charge in the colour-channel chosen.
For the remaining 2 channels, put the value of the Color
inside by the user.
Pull the bitmap image.
Create the Key.
Send the image to the telephone.
4.2. Decryption
Receiver obtains the image and the key.
Divide the colour copy into color slabs giving to block
size definite into the key.
Get the charge of separate colour block and withdraw
the key from that value.
Convert the resulting value into attractiveness and
become the writing.
Decrypt the text using the decryption process of the
normal encryption process used.
Get the unique writing posterior.
5. IMPLEMENTATION
Fig 2: describes a working of this concept.
5.1. Encryption
1. The user chooses a one color network (R, G or B) and
springs the ideals for outstanding two networks among
the arrays 0-255. The atmosphereischangedtoitsASCII
charge and allocated to the designated color channel.
Also, a block scope larger than 0, is stated by the user.
Colour is given to the color slab of the sure slab extent is
then shaped by joining the values of all three networks.
2. Key Generation
The color channel selected and the color block size
systems the key.
3. Image Generation
All the characters are changed to color blocksandthena
only image is produced by merging all the color slabs of.
5.2. Decryption
1. Getting copy and common hide key
The section size and the colour network are removed
from the common hide key.
2. Extracting of pixel value from the image
The established image is separated into blocks of the
size stated in the key. A pixel and its 4-nearest
neighbour pixels from each wedge are removed and the
most shared pixel value is particular. This is to recover
the strength of the procedure in the situation of
company of noise.
3. Retrieval of the plaintext
From the designated pixel value, the section charge of
the particular network is occupied (R, G or B
component) and careful as an ASCII value. This ASCII
value is before renewed to its agreeing heaven likewise
for all additional color blocks. After removing all such
characters, the unique communication is saved.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29360 | Volume – 4 | Issue – 1 | November-December 2019 Page 100
6. Technology used
A. C#.net
C# is a jazzy and nature-safe article situated language that
enables makers to manufacture an unrest of sheltered and
lively applications that course on the .NET Framework. You
can use C# to make Windows customer applications, XML
Web administrations, spread apparatuses, customer server
applications, database applications, and bountiful, plentiful
extra. C# grammar is exceptionally expressive, yet it is
likewise basic and simple to learn. The wavy-brace syntax of
C# will be instantly recognizable to anyone familiar with C,
C++ or Java [8] [9].
7. APPLICATION
This arrangement of shading cryptography can be utilized
for validation of login frameworks. During the enlistment
procedure, the new client will enter his own subtleties and
the secret word. The secret key is then scrambled into a
shading coded picture utilizing the proposed shading
substitution calculation. The picture is then put away at the
server. At the hour of login, the client enters the username
and secret key. In view of the username, relating picture of
the secret key is recovered from server, decoded and
changed over to content. This content is then coordinated
with the secret phrase entered by the client.Intheeventthat
it coordinates, the client effectively signs in. The key for
encryption and unscrambling can be founded on the
parameters of the individual subtleties enteredbytheclient.
Numerical capacities performed on the timestamp of
enrollment and user‟s date of birth canproducea key.Inthis
manner, the requirement for capacity of key is disposed of
8. CONCLUSION
The present standard cryptographic strategies are
dependent upon an assortment of assaults. A creative
methodology exhibited and executed in this paper makes
data secure by shading substitution. In future, the figures,
tables, pictures, and so forth can be incorporated into the
plaintext for transformation and subsequently the extent of
the calculation can be expanded.
9. REFERENCES
[1] Aditya gaitonde 2016. Color Coded Cryptography,
International Journal of Scientific & Engineering
Research, Volume 3, Issue 7.
[2] Andrey Bogdanov, Dmitry Khovratovich, Christian
Rechberger, 2015, Biclique Cryptanalysis of the Full
AES, Crypto 2015 cryptology conference, Santa
Barbara, California.
[3] Prof. K. Ravindra Babu, Dr. S. Udaya Kumar, Dr. A.
Vinaya Babu and Dr. Thirupathi Reddy, 2017. A block
cipher generation using color substitution,
International Journal ofComputerApplicationsVolume
1 – No. 28.
[4] Sastry V. U. K, S. Udaya Kumar and A. Vinaya babu,
2016. A large block cipher using modular arithmetic
inverse of a key matrix and mixing of the key matrix
and the plain text. Journal of Computer Science, 2(9):
698703.
[5] Pritha Johar, Santosh Easo and K K Johar, 2017. “A
Novel Approach to Substitution Play Color Cipher”,
International Journal of Next Generation Computer
Application Volume 1- Issue 2.
[6] Johan Hastad, 1986. “On using RSA with low exponent
in a public key network”, Advances in Cryptology-
CRYPTO ‟85, LNCS 218, pp. 403-408.
[7] B. A. Forouzan, Cryptography and Network Security,
4th edition, 2017.

More Related Content

What's hot

Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using RsaIJERA Editor
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelMohit Goel
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationAhmad Sharifi
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
Zhao huang deep sim deep learning code functional similarity
Zhao huang deep sim   deep learning code functional similarityZhao huang deep sim   deep learning code functional similarity
Zhao huang deep sim deep learning code functional similarityitrejos
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451IJRAT
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 

What's hot (20)

Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using Rsa
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Steganography
SteganographySteganography
Steganography
 
Cns 1
Cns 1Cns 1
Cns 1
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communication
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Zhao huang deep sim deep learning code functional similarity
Zhao huang deep sim   deep learning code functional similarityZhao huang deep sim   deep learning code functional similarity
Zhao huang deep sim deep learning code functional similarity
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 
E031022026
E031022026E031022026
E031022026
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
82 86
82 8682 86
82 86
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Pdf6
Pdf6Pdf6
Pdf6
 

Similar to Color Cryptography using Substitution Method

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET Journal
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database SecurityIRJET Journal
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...IJECEIAES
 

Similar to Color Cryptography using Substitution Method (20)

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

Color Cryptography using Substitution Method

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 1, December 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD29360 | Volume – 4 | Issue – 1 | November-December 2019 Page 98 Color Cryptography using Substitution Method Yashvanth. L1, Dr. N. Shanmugapriya2 1MCA Student, 2 Assistant Professor, 1,2Department of Computer Application (PG), 1,2Dr. SNS Rajalakshimi College of Arts and Science, Coimbatore, Tamil Nadu, India ABSTRACT In world of computer network, fears come in many different forms. Some of the most common fears today are software attacks. If we want to secure any type of data then we can use encryption method. All traditional encryption methods use substitutionandswitch.Substitutionmethodsmapplaintextinto ciphertext in which characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this paper, we are using a creative cryptographic replacement method is to generate a stronger cipher than the existing replacement algorithms. This method focuses on the replacement of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. KEYWORDS: Play Color Cipher (PCC), Color substitution, Color block, Color code How to cite this paper: Yashvanth. L | Dr. N. Shanmugapriya "Color Cryptography using Substitution Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-1, December 2019, pp.98-100, URL: https://www.ijtsrd.com/papers/ijtsrd29 360.pdf Copyright © 2019 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION Information security is the safety of information and minimises the risk of exposing information to unauthorised gatherings from expose, modification, and destruction of data. Cryptography is a method of storing and conducting data in a particular form so that only those for whom it is future can read and process it. The security of cipher text is totally dependent twothings:thepowerofthecryptographic algorithm and the privacy of the key. Many researchershave adapted the existing algorithms to fulfil the need in the current market, yet the ciphers are weak to attacks. 2. LITERATURE SURVEY 2.1. Existing Cryptographic System A. Traditional Symmetric-Key Ciphers In symmetric key ciphers, plaintext is new into cipher-text using a shared secret key and anencryptionalgorithm.Using the same key and a decryption algorithm, the plaintext is better from the cipher-text. The Secret Keyissharedbyboth, the sender and the receiver which they must havecreate ina secure fashion & should keep the key unseen. These ciphers consist of Switch and Transposition ciphers. A Substitution cipher replaces one figure with another. A Transposition cipher rearranges the symbols . B. Modern Symmetric-Key Ciphers A symmetric-key modern block cipher encrypts an n-bit block of plaintext or decrypts an n-bit block of cipher-text. The encryption or decryption algorithm usages a k-bit key. A modern block cipher can be intended to act as a substitution cipher or a transposition cipher DES and AES are examples of this type of cryptography algorithm. C. Asymmetric-Key Cryptography Unequal cryptography or public-key cryptography is cryptography in which a couple of keys is used to encrypt and decrypt a message so that it spreads securely. In such type of cryptography worker who needs to send an encrypted message can grow the future recipient's public key from a public directory. They use this key to encrypt the message, and they refer it to the recipient. Whenthereceiver gets the message, they decrypt it with their secluded key, which no one else should yield access to. RSA and Merkle– Hellman knapsack cryptosystem is the mostcommonlyused irregular key algorithm. The security of RSA relies on the difficulty of factoring huge numbers. 2.2. Threats and vulnerabilities in existing systems RSA is occupied on the improper growth of two prime facts. Hence, number factorization is a grave intimidating in error of RSA and currently different kinds of spells have identified against RSA by cryptanalysis. Most spells seem to be the effect of waste of the scheme or evil choice of parameters. Substitution methods like Caesar Cipher, Mono alphabetic Cipher, play just Cipher and Poly alphabetic Ciphers are not strong enough since they are weedy to brute-force spells. IJTSRD29360
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29360 | Volume – 4 | Issue – 1 | November-December 2019 Page 99 3. PROPOSED CRYPTOGRAPHIC SYSTEM Green and blue (RGB). The user must specify the standards for the R, G and B channels among the ranges 0-255. Too a block size of color block requests to be detailed. We propose a cryptographic substitution method which alters the “Play Color Cipher” that is called as color coded cryptography. This system is constructed on symmetric encryptionwhich is applied by encrypting text into color image. Each troposphere of the message is encrypted into a section of color. Every character will be swapped by a different colour block. The inverse process is used to produce the original text from color block at the earpiece side. The user enters a message which is the plaintext spring side. A channel needs to be special from the three color channels i.e. red All the characters of the text are then converted to color blocks formed by joining the values of R, G and B channels. A single image is then generated by combining all the color blocks of the message. The block sizeandthechannel certain form the symmetric key. At the decryption side, thereceived image is divided into blocks of the size specified in the key. From each block, the value of thecentrepixel isremovedand then converted to a plaintext character. This is done for all blocks and the matching characters are removed. Fig 1: Block Diagram 3.1. Advantages of proposed system Each character current in the plaintext is replaced with a color block from the available 18 Decillions of colors in the creation and at the getting end the encryption text block (in color) is decrypted in to plain text block. It stops against problems like Meet in the mid attack, Birthday outbreak and Brute force outbreaks. 4. ALGORITHM 4.1. Encryption. Receive the input text file and the key. Isolated the input text into isolated fonts. Input the color-channel (R/G/B) and a color (RGB value). Undefined on the predefined block-size (say n), divide the copy box into a web of blocks, each of extent. Rise the ASCII charge of every paradise withkeyandput the charge in the colour-channel chosen. For the remaining 2 channels, put the value of the Color inside by the user. Pull the bitmap image. Create the Key. Send the image to the telephone. 4.2. Decryption Receiver obtains the image and the key. Divide the colour copy into color slabs giving to block size definite into the key. Get the charge of separate colour block and withdraw the key from that value. Convert the resulting value into attractiveness and become the writing. Decrypt the text using the decryption process of the normal encryption process used. Get the unique writing posterior. 5. IMPLEMENTATION Fig 2: describes a working of this concept. 5.1. Encryption 1. The user chooses a one color network (R, G or B) and springs the ideals for outstanding two networks among the arrays 0-255. The atmosphereischangedtoitsASCII charge and allocated to the designated color channel. Also, a block scope larger than 0, is stated by the user. Colour is given to the color slab of the sure slab extent is then shaped by joining the values of all three networks. 2. Key Generation The color channel selected and the color block size systems the key. 3. Image Generation All the characters are changed to color blocksandthena only image is produced by merging all the color slabs of. 5.2. Decryption 1. Getting copy and common hide key The section size and the colour network are removed from the common hide key. 2. Extracting of pixel value from the image The established image is separated into blocks of the size stated in the key. A pixel and its 4-nearest neighbour pixels from each wedge are removed and the most shared pixel value is particular. This is to recover the strength of the procedure in the situation of company of noise. 3. Retrieval of the plaintext From the designated pixel value, the section charge of the particular network is occupied (R, G or B component) and careful as an ASCII value. This ASCII value is before renewed to its agreeing heaven likewise for all additional color blocks. After removing all such characters, the unique communication is saved.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29360 | Volume – 4 | Issue – 1 | November-December 2019 Page 100 6. Technology used A. C#.net C# is a jazzy and nature-safe article situated language that enables makers to manufacture an unrest of sheltered and lively applications that course on the .NET Framework. You can use C# to make Windows customer applications, XML Web administrations, spread apparatuses, customer server applications, database applications, and bountiful, plentiful extra. C# grammar is exceptionally expressive, yet it is likewise basic and simple to learn. The wavy-brace syntax of C# will be instantly recognizable to anyone familiar with C, C++ or Java [8] [9]. 7. APPLICATION This arrangement of shading cryptography can be utilized for validation of login frameworks. During the enlistment procedure, the new client will enter his own subtleties and the secret word. The secret key is then scrambled into a shading coded picture utilizing the proposed shading substitution calculation. The picture is then put away at the server. At the hour of login, the client enters the username and secret key. In view of the username, relating picture of the secret key is recovered from server, decoded and changed over to content. This content is then coordinated with the secret phrase entered by the client.Intheeventthat it coordinates, the client effectively signs in. The key for encryption and unscrambling can be founded on the parameters of the individual subtleties enteredbytheclient. Numerical capacities performed on the timestamp of enrollment and user‟s date of birth canproducea key.Inthis manner, the requirement for capacity of key is disposed of 8. CONCLUSION The present standard cryptographic strategies are dependent upon an assortment of assaults. A creative methodology exhibited and executed in this paper makes data secure by shading substitution. In future, the figures, tables, pictures, and so forth can be incorporated into the plaintext for transformation and subsequently the extent of the calculation can be expanded. 9. REFERENCES [1] Aditya gaitonde 2016. Color Coded Cryptography, International Journal of Scientific & Engineering Research, Volume 3, Issue 7. [2] Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, 2015, Biclique Cryptanalysis of the Full AES, Crypto 2015 cryptology conference, Santa Barbara, California. [3] Prof. K. Ravindra Babu, Dr. S. Udaya Kumar, Dr. A. Vinaya Babu and Dr. Thirupathi Reddy, 2017. A block cipher generation using color substitution, International Journal ofComputerApplicationsVolume 1 – No. 28. [4] Sastry V. U. K, S. Udaya Kumar and A. Vinaya babu, 2016. A large block cipher using modular arithmetic inverse of a key matrix and mixing of the key matrix and the plain text. Journal of Computer Science, 2(9): 698703. [5] Pritha Johar, Santosh Easo and K K Johar, 2017. “A Novel Approach to Substitution Play Color Cipher”, International Journal of Next Generation Computer Application Volume 1- Issue 2. [6] Johan Hastad, 1986. “On using RSA with low exponent in a public key network”, Advances in Cryptology- CRYPTO ‟85, LNCS 218, pp. 403-408. [7] B. A. Forouzan, Cryptography and Network Security, 4th edition, 2017.