1. iii
TABLE OF CONTENTS
Candidate's Declaration i
Acknowledgement ii
Table of contents iii
List of Figures v
List of Tables vi
ABSTRACT 1
Chapter 1: INTRODUCTION 2
1.1 Users and Identities 2
1.2 Cryptography 3
1.2.1 Goals of Encryption/Decryption 4
1.2.2 Types of Cryptography 4
1.3 Types of Encryption Techniques 7
1.3.1 RC2 7
1.3.2 Advanced Encryption Standard (AES) 7
1.3.3 DES 7
1.3.4 Triple DES 8
1.3.5 RC6 8
1.4 Blowfish Encryption Algorithm 8
1.4.1 Description of Algorithm 9
1.4.2 Key-expansion 9
1.4.3 Generating the Subkeys 10
1.4.4 Data Encryption 10
1.5 MD5 algorithm 11
1.6 SHA-1 Function 12
1.7 Attacks against authentication mechanisms 14
1.7.1 Guessing attacks 15
1.7.1.1 Brute force 15
1.7.1.2 Dictionary 16
1.7.2 Interception attacks 16
1.7.2.1 Sniffing 17
1.7.2.2 Man in the middle attack 17
2. iv
1.7.2.3 Spoofing and masquerading 17
1.7.3 Attack on the underlying infrastructure 18
1.7.4 Denial of service attack 18
1.8 Social engineering 18
1.9 Attacks on biometrics 19
1.10 Applications of Cryptography 19
1.11 Dissertation Organization 14
Chapter 2: LITERATURE SURVEY 27
2.1 Review Process Adopted 28
2.1.1 Stage 0: Get a “feel” 28
2.1.2 Stage 1: Get the “big picture” 29
2.1.3 Stage 2: Get the “details” 30
2.1.4 Stage 3: “Evaluate the Details” 31
2.1.5 Stage 3: “Evaluate the Details” 31
2.2 Related Study 32
Chapter 3: PROPOSED WORK 44
3.1 Concept Proposed 44
3.1.1 User Validation 44
3.1.2 Message Exchange 44
3.2 Algorithm for the Image Encryption 46
3.3 Algorithm of Decrypting Image 46
3.4 Operation of AES 47
3.4.1 Encryption Process 47
3.4.2 Byte Substitution (Subbytes) 48
3.4.3 Decryption Process 48
3.4.4 AES Analysis 49
3.5 Software Requirement 49
3.6 ADVANTAGES 49
3.7 Technologies Used 49
3.7.1 Microsoft Visual Studio 50
3.7.2 SQL Server 50
3. v
Chapter 4: ANALYSIS OF PROPOSED WORK AND IMPLEMENTATION 52
4.1 Hardware Requirements 52
4.2 Operation of AES 52
4.3 Encryption Process 52
4.3.1 Byte Substitution (Subbytes) 53
4.3.2 Decryption Process 54
4.4 AES Analysis 54
4.5 Software Requirement 54
4.6 Advantages 55
4.7 Technologies Used 55
4.7.1 Microsoft Visual Studio 55
4.7.2 Sql Server 56
Chapter 5: CONCLUSION AND FUTURE SCOPE 59
REFERENCES 60
4. vi
LIST OF FIGURES
Figure 1.1: Cryptography 3
Figure 1.2: Symmetric Key Cryptography 5
Figure 1.3: Asymmetric Key Cryptography 5
Figure 1.4: Encryption/ Decryption Algorithm 6
Figure 1.5: The Feistel structure of Blowfish 9
Figure 1.6: Blowfish Encryption 11
Figure 1.7: MD5 Algorithm 12
Figure 1.8: Classification of different kinds of attacks 14
Figure 2.1 Review Process Stages 28
Figure 3.1: Validation Photo 44
Figure 3.2: Message sending 44
Figure 3.3 Advanced Encryption Standard 47
Figure 3.4: Encrypt Process 47
Figure 4.1: Advanced Encryption Standard 52
Figure 4.2: Encrypt Process 53
Figure 4.3: Validating the User 57
Figure 4.4: Encrypted Audio Message sending step 1 58
Figure 4.5: Finger Print validation 58