SlideShare a Scribd company logo
iii
TABLE OF CONTENTS
Candidate's Declaration i
Acknowledgement ii
Table of contents iii
List of Figures v
List of Tables vi
ABSTRACT 1
Chapter 1: INTRODUCTION 2
1.1 Users and Identities 2
1.2 Cryptography 3
1.2.1 Goals of Encryption/Decryption 4
1.2.2 Types of Cryptography 4
1.3 Types of Encryption Techniques 7
1.3.1 RC2 7
1.3.2 Advanced Encryption Standard (AES) 7
1.3.3 DES 7
1.3.4 Triple DES 8
1.3.5 RC6 8
1.4 Blowfish Encryption Algorithm 8
1.4.1 Description of Algorithm 9
1.4.2 Key-expansion 9
1.4.3 Generating the Subkeys 10
1.4.4 Data Encryption 10
1.5 MD5 algorithm 11
1.6 SHA-1 Function 12
1.7 Attacks against authentication mechanisms 14
1.7.1 Guessing attacks 15
1.7.1.1 Brute force 15
1.7.1.2 Dictionary 16
1.7.2 Interception attacks 16
1.7.2.1 Sniffing 17
1.7.2.2 Man in the middle attack 17
iv
1.7.2.3 Spoofing and masquerading 17
1.7.3 Attack on the underlying infrastructure 18
1.7.4 Denial of service attack 18
1.8 Social engineering 18
1.9 Attacks on biometrics 19
1.10 Applications of Cryptography 19
1.11 Dissertation Organization 14
Chapter 2: LITERATURE SURVEY 27
2.1 Review Process Adopted 28
2.1.1 Stage 0: Get a “feel” 28
2.1.2 Stage 1: Get the “big picture” 29
2.1.3 Stage 2: Get the “details” 30
2.1.4 Stage 3: “Evaluate the Details” 31
2.1.5 Stage 3: “Evaluate the Details” 31
2.2 Related Study 32
Chapter 3: PROPOSED WORK 44
3.1 Concept Proposed 44
3.1.1 User Validation 44
3.1.2 Message Exchange 44
3.2 Algorithm for the Image Encryption 46
3.3 Algorithm of Decrypting Image 46
3.4 Operation of AES 47
3.4.1 Encryption Process 47
3.4.2 Byte Substitution (Subbytes) 48
3.4.3 Decryption Process 48
3.4.4 AES Analysis 49
3.5 Software Requirement 49
3.6 ADVANTAGES 49
3.7 Technologies Used 49
3.7.1 Microsoft Visual Studio 50
3.7.2 SQL Server 50
v
Chapter 4: ANALYSIS OF PROPOSED WORK AND IMPLEMENTATION 52
4.1 Hardware Requirements 52
4.2 Operation of AES 52
4.3 Encryption Process 52
4.3.1 Byte Substitution (Subbytes) 53
4.3.2 Decryption Process 54
4.4 AES Analysis 54
4.5 Software Requirement 54
4.6 Advantages 55
4.7 Technologies Used 55
4.7.1 Microsoft Visual Studio 55
4.7.2 Sql Server 56
Chapter 5: CONCLUSION AND FUTURE SCOPE 59
REFERENCES 60
vi
LIST OF FIGURES
Figure 1.1: Cryptography 3
Figure 1.2: Symmetric Key Cryptography 5
Figure 1.3: Asymmetric Key Cryptography 5
Figure 1.4: Encryption/ Decryption Algorithm 6
Figure 1.5: The Feistel structure of Blowfish 9
Figure 1.6: Blowfish Encryption 11
Figure 1.7: MD5 Algorithm 12
Figure 1.8: Classification of different kinds of attacks 14
Figure 2.1 Review Process Stages 28
Figure 3.1: Validation Photo 44
Figure 3.2: Message sending 44
Figure 3.3 Advanced Encryption Standard 47
Figure 3.4: Encrypt Process 47
Figure 4.1: Advanced Encryption Standard 52
Figure 4.2: Encrypt Process 53
Figure 4.3: Validating the User 57
Figure 4.4: Encrypted Audio Message sending step 1 58
Figure 4.5: Finger Print validation 58
vii
LIST OF TABLE
Table 2.1: Stage 2 Questions Along With Probable Location of Answers 30

More Related Content

Similar to Toc

File Splitter Table of contents
File Splitter Table of contents File Splitter Table of contents
File Splitter Table of contents
Rajesh Roky
 
Admin Tech Ed Presentation Hardening Sql Server
Admin Tech Ed Presentation   Hardening Sql ServerAdmin Tech Ed Presentation   Hardening Sql Server
Admin Tech Ed Presentation Hardening Sql Server
rsnarayanan
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
IJNSA Journal
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
IJNSA Journal
 
0index
0index0index
0index
hanmya
 
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
Raj Kumar Thenua
 
msword
mswordmsword
msword
butest
 

Similar to Toc (20)

Onward15
Onward15Onward15
Onward15
 
File Splitter Table of contents
File Splitter Table of contents File Splitter Table of contents
File Splitter Table of contents
 
Admin Tech Ed Presentation Hardening Sql Server
Admin Tech Ed Presentation   Hardening Sql ServerAdmin Tech Ed Presentation   Hardening Sql Server
Admin Tech Ed Presentation Hardening Sql Server
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabus
 
Humantalk Angers 14 Mars
Humantalk Angers 14 MarsHumantalk Angers 14 Mars
Humantalk Angers 14 Mars
 
the grinder testing certification
the grinder testing certificationthe grinder testing certification
the grinder testing certification
 
Embedded System -Lyla B Das.pdf
Embedded System -Lyla B Das.pdfEmbedded System -Lyla B Das.pdf
Embedded System -Lyla B Das.pdf
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
list of figures.docx
list of figures.docxlist of figures.docx
list of figures.docx
 
list of figures.pdf
list of figures.pdflist of figures.pdf
list of figures.pdf
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
 
cd-2-Batch id-33
cd-2-Batch id-33cd-2-Batch id-33
cd-2-Batch id-33
 
0index
0index0index
0index
 
Book Preview: A Practical Introduction to the Xilinx Zynq-7000 Adaptive SoC
Book Preview: A Practical Introduction to the Xilinx Zynq-7000 Adaptive SoCBook Preview: A Practical Introduction to the Xilinx Zynq-7000 Adaptive SoC
Book Preview: A Practical Introduction to the Xilinx Zynq-7000 Adaptive SoC
 
Formbook - In-depth malware analysis (Botconf 2018)
Formbook - In-depth malware analysis (Botconf 2018)Formbook - In-depth malware analysis (Botconf 2018)
Formbook - In-depth malware analysis (Botconf 2018)
 
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
 
msword
mswordmsword
msword
 
Hhs toc glossary
Hhs toc glossaryHhs toc glossary
Hhs toc glossary
 

Recently uploaded

Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
StarCompliance.io
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
DilipVasan
 
Machine Learning For Career Growth..pptx
Machine Learning For Career Growth..pptxMachine Learning For Career Growth..pptx
Machine Learning For Career Growth..pptx
benishzehra469
 

Recently uploaded (20)

Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
how can i exchange pi coins for others currency like Bitcoin
how can i exchange pi coins for others currency like Bitcoinhow can i exchange pi coins for others currency like Bitcoin
how can i exchange pi coins for others currency like Bitcoin
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 
2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptx
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
 
Machine Learning For Career Growth..pptx
Machine Learning For Career Growth..pptxMachine Learning For Career Growth..pptx
Machine Learning For Career Growth..pptx
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdf
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdf
 

Toc

  • 1. iii TABLE OF CONTENTS Candidate's Declaration i Acknowledgement ii Table of contents iii List of Figures v List of Tables vi ABSTRACT 1 Chapter 1: INTRODUCTION 2 1.1 Users and Identities 2 1.2 Cryptography 3 1.2.1 Goals of Encryption/Decryption 4 1.2.2 Types of Cryptography 4 1.3 Types of Encryption Techniques 7 1.3.1 RC2 7 1.3.2 Advanced Encryption Standard (AES) 7 1.3.3 DES 7 1.3.4 Triple DES 8 1.3.5 RC6 8 1.4 Blowfish Encryption Algorithm 8 1.4.1 Description of Algorithm 9 1.4.2 Key-expansion 9 1.4.3 Generating the Subkeys 10 1.4.4 Data Encryption 10 1.5 MD5 algorithm 11 1.6 SHA-1 Function 12 1.7 Attacks against authentication mechanisms 14 1.7.1 Guessing attacks 15 1.7.1.1 Brute force 15 1.7.1.2 Dictionary 16 1.7.2 Interception attacks 16 1.7.2.1 Sniffing 17 1.7.2.2 Man in the middle attack 17
  • 2. iv 1.7.2.3 Spoofing and masquerading 17 1.7.3 Attack on the underlying infrastructure 18 1.7.4 Denial of service attack 18 1.8 Social engineering 18 1.9 Attacks on biometrics 19 1.10 Applications of Cryptography 19 1.11 Dissertation Organization 14 Chapter 2: LITERATURE SURVEY 27 2.1 Review Process Adopted 28 2.1.1 Stage 0: Get a “feel” 28 2.1.2 Stage 1: Get the “big picture” 29 2.1.3 Stage 2: Get the “details” 30 2.1.4 Stage 3: “Evaluate the Details” 31 2.1.5 Stage 3: “Evaluate the Details” 31 2.2 Related Study 32 Chapter 3: PROPOSED WORK 44 3.1 Concept Proposed 44 3.1.1 User Validation 44 3.1.2 Message Exchange 44 3.2 Algorithm for the Image Encryption 46 3.3 Algorithm of Decrypting Image 46 3.4 Operation of AES 47 3.4.1 Encryption Process 47 3.4.2 Byte Substitution (Subbytes) 48 3.4.3 Decryption Process 48 3.4.4 AES Analysis 49 3.5 Software Requirement 49 3.6 ADVANTAGES 49 3.7 Technologies Used 49 3.7.1 Microsoft Visual Studio 50 3.7.2 SQL Server 50
  • 3. v Chapter 4: ANALYSIS OF PROPOSED WORK AND IMPLEMENTATION 52 4.1 Hardware Requirements 52 4.2 Operation of AES 52 4.3 Encryption Process 52 4.3.1 Byte Substitution (Subbytes) 53 4.3.2 Decryption Process 54 4.4 AES Analysis 54 4.5 Software Requirement 54 4.6 Advantages 55 4.7 Technologies Used 55 4.7.1 Microsoft Visual Studio 55 4.7.2 Sql Server 56 Chapter 5: CONCLUSION AND FUTURE SCOPE 59 REFERENCES 60
  • 4. vi LIST OF FIGURES Figure 1.1: Cryptography 3 Figure 1.2: Symmetric Key Cryptography 5 Figure 1.3: Asymmetric Key Cryptography 5 Figure 1.4: Encryption/ Decryption Algorithm 6 Figure 1.5: The Feistel structure of Blowfish 9 Figure 1.6: Blowfish Encryption 11 Figure 1.7: MD5 Algorithm 12 Figure 1.8: Classification of different kinds of attacks 14 Figure 2.1 Review Process Stages 28 Figure 3.1: Validation Photo 44 Figure 3.2: Message sending 44 Figure 3.3 Advanced Encryption Standard 47 Figure 3.4: Encrypt Process 47 Figure 4.1: Advanced Encryption Standard 52 Figure 4.2: Encrypt Process 53 Figure 4.3: Validating the User 57 Figure 4.4: Encrypted Audio Message sending step 1 58 Figure 4.5: Finger Print validation 58
  • 5. vii LIST OF TABLE Table 2.1: Stage 2 Questions Along With Probable Location of Answers 30