Abstract

Today Communication is mainly depends upon digital data communication. Data is sent across internet using sequence of bits. Data integrity is major issue in such a communication. To preserve data integrity of the message sent over the internet various method of cryptography is used. Though there are two types of algorithm for encryption namely symmetric [1] and asymmetric [1], This paper is mainly concern with digital symmetric cryptography using image to replace some bits and at the receiver side this encrypted message is decrypted at the receiver side For Encryption block cipher mode [2] is used which is data is encrypted in blocks rather than individual bits. Digital encryption of data is the approach, in which the original data, say x, is first digitized into a sequence of bits, x (k) which are then embedded digitally with the chosen segments of the image file, y (k) before transmission. For this, we have utilized the MATLAB (Matrix-Laboratory) which is a multi-paradigm numerical computing environment and fourth generation programming language. Encryption is a much stronger method of protecting speech communications than any form of scrambling. The ability to securely store and transfer sensitive information has proved to be a critical factor of success in today's day and age. The secrecy as well as integrity of data during storage and transmission has been the motivating factor for us in the build up to this paper.

Highlights

  • Cryptography is necessary When communicating over any entrusted medium, which includes just about any network, the Internet

  • Cryptography is a method of transferring the private data produces a unique plaintext for any given cipher text and onto the open network in a way that only those for whom it is Decryption key: It is a cryptographic algorithm that takes a intended can read and process it

  • Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption

Read more

Summary

INTRODUCTION

Sometime after writing was invented, with Applications ranging from diplomatic missives to wartime. A cryptographic algorithm takes plaintext and an encryption key as input and produces a cipher text. Cryptography is a method of transferring the private data produces a unique plaintext for any given cipher text and onto the open network in a way that only those for whom it is Decryption key: It is a cryptographic algorithm that takes a intended can read and process it. It is techniques through cipher text and a decryption key as input, and outputs a which third party hindrance in reading private messages is plaintext. The receiver inputs the decryption key into the decryption algorithm along with the cipher text in order to compute the plaintext. [4]

Types Of Cryptographic Algorithms
Speech Cryptography
Encryption Work Flow
Data Stream after Encryption
ADVANTAGES
CONCLUSION
VIII. REFERENCES
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call