Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Security and Privacy Issues in Communications: Internal Guide Mrs. P.Gayathri Submitted BY A.Shanthi

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 24

SECURITY AND PRIVACY

ISSUES IN COMMUNICATIONS

INTERNAL GUIDE
Mrs. P.GAYATHRI
SUBMITTED
BY
A.SHANTHI
CONTENTS
Introduction
Cryptography
Cryptographic algorithms
Steganography
Advantages and Disadvantages
Applications
Conclusion
Future scope
References
INTRODUCTION
Security has became a more sensible issue either it may be in
real world or in cyber world.
The main problem that occurred in network security are
secrecy,authentication,nonrepudiation and integrity control.
Data security deals with security during transmission of data.
Commonly used technologies are cryptography,steganography.
As the internet and other forms of electronic communications
become more prevalent ,electronic security is becoming
increasingly important
CRYPTOGRAPHY
The art of protecting the information by transforming it into an
unreadable format ,called cipher text.
The word “cryptography” means secrete writing.
Cryptography is the science of using mathematics to encrypt
and decrypt data.
Example
Here is a quick example of the encryption and
decryption steps involved with the simple substitution
cipher. The text we will encrypt is 'defend the east
wall of the castle'.
Keys for the simple substitution cipher usually consist
of 26 letters (compared to the caeser cipher's single
number). An example key is:
plain alphabet : abcdefghijklmnopqrstuvwxyz
cipher alphabet: phqgiumeaylnofdxjkrcvstzwb
An example encryption using the above key:
plaintext : defend the east wall of the castle
ciphertext: giuifg cei iprc tpnn du cei qprcni
NEED OF CRYTOGRAPHY
Confidentiality :ensuring that no one can read message expect
the intended receiver.
Authentication :the process of proving ones identity.
Data integrity :Only authorized parties are able to modify
computer system assets and transmitted information.
Non-repudiation: Both the sender & receiver are unable to
deny the transmission.
TYPES OF ALGORITHMS
Secret key Cryptography (symmetric)
Public key Cryptography (asymmetric)
Hash function
SECRET KEY CRYPTOGRAPHY
Follows symmetric algorithms.
Single key is used to encrypt and
decrypt.
Key must be known by both parties
PUBLIC KEY CRYPTOGRAPHY
 Follows asymmetric algorithms.
 Each entity has two keys.
private key (a secret)
public key (well known)
 Public keys are used for encryption
 Private keys are used for decryption
HASH FUNCTION
Hash function also called message digest &one way
encryption, are algorithms that in one sense use no key. Instead
a fixed hash value is computed based upon the plain text that
makes it possible for either the contents or length of plain text
to be recovered.
Hash function is easy to compute.
STEGANOGRAPHY
Steganography is a art & science of hiding the fact that
communication is taking place.
Steganography is the practice of hiding private or sensitive
information within something that appears to be nothing out of
the usual.
 Steganography in the modern day sense of the word usually
refers to information or a file that has been concealed inside a
digital Picture, Video or Audio file
TYPES OF STEGANOGRAPHY
Secret message is hidden in different forms:
STEGANOGRAPHY IN TEXT
The code word is embedded in the document by altering
textual features. by applying each bit of code word to a
particular document.
line-shift coding: lines are vertically shifted.
word shift coding: code words are horizontally shifted.
feature coding: coding done using certain text features.
STEGANOGARPHY IN IMAGES
Image Steganography has come quite far in recent years with
the development of fast,powerful graphical computers.
The techniques used are:
1. Image compression
2. Image encoding techniques
least significant bit insertion
masking and filtering techniques
transformations
STEGANOGRAPHY IN AUDIO
Low bit encoding method is used to hide information inside
audio files which is similar to LSB used in images.
Spread spectrum is another method used to hide the
information inside the audio file. This method works by adding
random noises to the signal information is conceal inside a
carrier and spread across the frequency spectrum.
Echo data hiding is another method of hiding information
inside an audio file.
STEGANOGRAPHY IN VIDEOS
Steganography in videos is similar to that of in images, apart of
information is hidden in each frame of video.
When only small amount of information is hidden inside the
video it is generally isn’t noticeable at all, however more the
information that is hidden the more noticeable it will become.
ADVANTAGES
The main advantage is we can provide security to data with
multiple levels of security.
We can embed huge volumes of data with modern
Steganography.
Symmetric encryption is simple and fast.
DISADVANTAGES
Transmission time for documents encrypted using public key
cryptography is significantly slower then symmetric
cryptography.
Message is hard to recover if image is subject to attacks such
as translation and rotation.
Some data hiding methods follow the principle that the edge
area can tolerate more changes than smooth areas. this does not
differentiate the texture features from edge ones.
APPLICATIONS
Smart ID’S
Military applications
Banking applications
Companies secret data safe circulation
ATM security
Computer password
Digital signatures
CONCLUSION
The system deals with providing easy and secure files
transmissions across the network. The data is encrypted and
embedded with any container file and transmitted through the
network, at the receiving end the data is deembedded,decrypted
and displayed.
The application can now be used in any organization
that uses networks. the proposed methods achieves higher
embedding capacity and physical property.
FUTURE SCOPE
Crypto smart cards
Java rings
DNA cryptography
Quantum cryptography
REFERENCES
www.cryptography.com
www.wikipedia.com
www.cryptography.org
wikipedia contributers.steganography.wikipedia
An introduction to Steganography ,IEEE security and privacy
THANK YOU…..
QUERIES ?

You might also like