Preview

Steganography, Diffie Hellman And One Time Pad Cryptography?

Powerful Essays
Open Document
Open Document
2516 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography, Diffie Hellman And One Time Pad Cryptography?
ABSTRACT
Transferring vital information securely without any threat of intrusion is extremely important. Crypography and steganography, both provide security to messages. But, it would be best if both of these are combined and provide a high-level of security. Cryptography only scrambles a message into a form which can’t be understood whereas steganography hides the information in a vessel like Image, Audio or Video. In this Paper, a combination of four techniques is done to analyze the level of security provided be them when they are combined. For cryptography, Diffie-Hellman and One Time Pad cryptography are used. For Steganography, DCT and DWT based techniques are considered. It is further concluded that cryptography combined with steganography offers great potential for securing of data copyright, and detection of infringers. Soon, through a combination of cryptography and steganography, personal messages, files, all artistic creations, pictures, and songs can be protected from piracy.
KEYWORDS: Steganography, Cryptography, Diffie Hellman, One Time Pad, DCT, DWT
…show more content…
DHDWT : Diffie Hellman cryptography combined with DWT based steganography
c. OTPDCT : One Time Pad cryptography combined with DCT based steganography
d. OTPDWT : One Time Pad cryptography combined with DWT based steganography

In part (a.), the secret message is to be encrypted using DIFFIE HELLMAN and then to be embedded using DCT. At receiver’s end, the encrypted form of message needs to be retrieved from the image and then it is to be decrypted using the key of Diffie Hellman. Similarly the other parts are followed.
The four techniques used are discussed below.
Diffie-Hellman
In 1976, after voicing their disapproval of DES and the difficulty in handling secret keys, Whitfield Diffie and Martin Hellman published the Diffie-Hellman algorithm for key exchange. This was the first published use of public key cryptography, and arguably one of the cryptography field’s greatest advances

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Apply common cryptographic and hashing techniques on a message to ensure message confidentiality and integrity…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: Calloway, D. (2012). Introduction to Cryptography and its role in Network Security Principles and Practice. Retrieved from The Chronichler 's Web Log: http://dancalloway.com/wordpress/2009/08/introduction-to-cryptography-and-its-role-in-network-security-principles-and-practice/…

    • 1325 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Essential researches have been done about how to secure file storage and transfer considering the requirements. Further more details will be provided in Task 3.1.…

    • 1608 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    The first step is steganography is that to embed and hiding information is to pass both the secret message and the cover message in to the encoder, inside the encoder, one or several protocols will be implemented to embed the secret information into the cover message.…

    • 2601 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    An interceptor (Eve) can block u and v. Discover a from (u = ga mod p);Find b from (v = gb mod p); Then she can figure (K = g stomach muscle mod p). The mystery key is not mystery any longer. To make Diffie-Hellman safe from the discrete logarithm assault, the accompanying are prescribed:…

    • 1070 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Data Encryption with Ecc

    • 2392 Words
    • 10 Pages

    Keywords: ECC,Encryption,Decryption,Key size I. INTRODUCTION Cryptography is the science and study of secret writing. The Cryptography means scrambling or modifying the information in such a way that it is not understandable and hence information is hidden from an unauthorized person. The main objectives of cryptography are Confidentiality (the information cannot be understandable to anyone except to the intended person), Integrity (the information cannot be altered by third person between transmitter and sender), Non-repudiation (the creator/sender of the information cannot deny at a later stages), Authentication (the sender and receiver can verify each others identity). In todays world, right from the internet sites to banks need security. Hence the cryptography systems are playing a vital role. There are different types of cryptography methods that are available. The cryptography methods are mainly classified into two types. 1. Private Key cryptography: This is also known as symmetric key cryptography where both the sender and a receiver share a…

    • 2392 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient realizes there is a hidden message. In this technique, a secret message is hidden within an ordinary message and the extraction of it is done at its destination. The term steganography combines the two Ancient Greek words Steganos and graphein, where “steganos” means “covered, concealed, or protected” and “graphein” means “writing or drawing”. Thus, steganography is covered writing. The main purpose of steganography is to hide the fact of communication. The need to ensure that only the right people have authorization to high-security accesses, has led to the…

    • 9982 Words
    • 40 Pages
    Good Essays