Application of Steganography and Cryptography for Secured Data Communication – a Review

Application of Steganography and Cryptography for Secured Data Communication – a Review

Published by : International Journal of Engineering Research & Technology (IJERT) http://www.ijert.org ISSN: 2278-0181 Vol. 5 Issue 04, April-2016 Application of Steganography and Cryptography for Secured Data Communication – A Review Babangida Zachariah Patience Ndang Yabuwat School of Architecture, Computing & Engineering Computer Science Department FTMS Global Col., Malaysia KSCOE Gidan Waya, Nigeria Ephraim Bernard School of Architecture, Computing & Engineering FTMS Global Col., Malaysia Abstract - The need for security in data communication is as eavesdropper intercepting communication and making long as mankind; since eavesdroppers often intercept such meaning out it thereby able to attack. These rising concern communication for malicious purposes. Several techniques has led to the development of several security measures and such as steganography and cryptography have been employed techniques such as cryptography [7] and steganography [8]. to hide the existence of communication and scramble such communication making it difficult to interpret in cases where steganography fails. Combining Cryptography and 1.1 CRYPTOGRAPHY steganography has proven to have taken data communication Cryptography, also called cryptology is a word from Ancient security to another level. In this work, a review of these Greek words: Kryptos (hidden secret), Graphein (writing), techniques is presented with major focus on two journals titled and Logy (study) [9]. It describes the techniques of “Dual Layer Security of Data Using LSB Image Steganography scrambling data from the third party called eavesdropper. Method and AES Encryption Algorithm” [1] and “An Efficient That is, it is essentially the encryption of data such that it is Data Hiding Scheme Using Steganography and Cryptography difficult to make meaning of it if not the intended recipient. Technique” [2]were considered for review. A brief description of the techniques is provided. It is found that these techniques It is the science of mathematics that uses algorithms such as could improve security of data communication beyond the Hash Functions, Public, or Private Keys to encrypt and present levels if properly combined with little or no decrypt data. performance degradation. Those days when printed documents were means of communication, mechanical encryption was used [10]; in Keywords: Data Security, Steganography, Cryptography, Least this era of digital data, digital cryptography is used to secure Significant Bit (LSB), Fourteen-Square Substitution communication of such information. In digital cryptography, keys are used in the encryption and 1.0 INTRODUCTION decryption processes. If the same key is used at encryption Communication is as old as the universe itself and the need and decryption, it is called Symmetric Encryption; if for security in such communication is as old as mankind. different keys are used at encryption and decryption, it is The need for security in data communication is even more called Asymmetric Encryption. The distribution and with advances in technologies such as the computers and management of these keys is usually the challenge of networks. The user of such technologies desires modern cryptography. Symmetric cryptography may be security/privacy of the messages sent over either wireless or categorized as Block Cipher or Stream Cipher and use such wired transmissions. That is, the message is received only key schemes as Data Encryption Standard (DES), Triple- by the intended receiver [3]. Hackers on the other hand are DES, Advanced Encryption Standard (AES), Rivest Cipher interested in intercepting such communications to read the (RC4, RC5), Blowfish, KASUMI; Asymmetric content and for malicious attacks such as spoofing, exploit cryptography key scheme includes Rivest Shamir Adleman password, phishing, and many more. According to [4], 7% (RSA), Diffie-Hellman (D-H) Encryption, Digital Signature of all adults in the USA are victims of identity theft and on Algorithms (DSA), Elliptic Curve Cryptography (ECC) the average $3,500 is lost in each incidence. In [5], it was [11]. For the purpose of this, RSA and AES are explained. reported that there are at least 2,418 cases of National Health Services Data Breaches every year. In another report of 1.1.1 Rivest Shamir Adleman (RSA) Algorithm February, 2014, titled “Third Report on Card Fraud”, RSA, developed by Clifford Cocks in 1973 and later by European Central Bank showed that of the 0.02% increase Rivest Ron, Shamir Adi, and Len Adleman in 1977. It is one over the 2011 cases, One-Point-Thirty-Three billion Euros the mostly used asymmetric encryption algorithm for digital (€1.33 billion) was lost due to total fraudulent transactions signatures and for public key cryptography. It generates the in 2012, 60% was due to internet/telephone payments, 23% public key used for the encryption and the private key used due to Point-of-Sale (POS) terminals, and 17% due to for decryption. The algorithm [12]: Automated Teller Machines (ATMs) [6]. These imply that 1. Generate any two random prime values p and q the security of data communication should be everyone’s such that n = pq is equivalent to key bit length. For concern since most of these frauds are as a result of some example, p=3 and q=11 thus, n=(3*11)=33≈1024 IJERTV5IS040354 186 (This work is licensed under a Creative Commons Attribution 4.0 International License.) Published by : International Journal of Engineering Research & Technology (IJERT) http://www.ijert.org ISSN: 2278-0181 Vol. 5 Issue 04, April-2016 2. Set n=pq and ᵠ(phi)=(p-1)(q-1). That is, ᵠ(phi)=(3- Modern cryptography techniques have also evolved over 1)(11-1)=20, and n=(3*11) = 33. time to what we presently have. It started as early as the days 3. Let e be an integer such that 1<e<ᵠ(phi) and e and of electronic mails where digital signature and public-key n are coprime. Say e=7 crypto-systems were used Invalid source specified.. 4. Set private/secret exponent/key d such that Several techniques of encryption have been used to ensure (d*e)mod(ᵠ(phi))=1 That is, d=3 since security of digital data, such techniques among several (3*7)mod(20)=1 others includes 5. Public key is (n,e) and private key is (d,p,q). Thus, Caesar: Affine Ciphers that use MODULUS operation d,p,q and ᵠ(phi) must be kept secret. [14], ROT-X that rotates plaintext by X places [15]. Note that n is called modulus, e is called public/encryption Null Encryption that hides messages within messages exponent, d is called secret/decryption exponent. The larger using null confuses cryptanalysis [16]. the key length, the more the security Polybius Square: ADFGVX which is a fractionating To encrypt a plaintext message m, the sender obtains the transposition cipher used during World War I [17], receiver’s public key (n,e), represent m such that 1<m<n, Bifid which uses fractionation by combining Polybius computes the cipher text c=(me)mod(n), and sends the cipher and transposition to achieve diffusion [18]. text c to receiver. When the receiver gets the cipher text c, Polygraphic (Square) Substitution: Two-Square, four- use the private key (n,d), to decrypt/extract the message square, five-square [18], fourteen-square substitution m=(cd)mod(n). [2]. 1.1.2 Advanced Encryption Standard (AES) Algorithm 1.1.3 Fourteen-Square Substitution Technique AES is a symmetric encryption algorithm established by Any N-square substitution technique uses N-tables National Institute of Standards and Technology (NIST) in containing alphabets, digits, and/or special characters of the 2001; based on three Rijndael ciphers of block size 128, with keyboard. However, the completeness depends on N. The key lengths of 128, 192, and 256-bits. It uses the principle twelve-square being the most advanced before the fourteen- of Substitution-Permutation Networks, and is efficient both square proposed in this work uses twelve squares of six 5X5 in hardware and software. The key size determines the matrices for alphabets and six 6X7 matrices for digits and number of repetitive transformations required to convert a special characters. The twelve-square technique has such plaintext to a cipher text. For 128-bits, 10 repetitions; 192- limitations as “Q” is omitted, not all special characters are bits, 12 repetitions; and 256-bits, 14 repetitions are required. contained, does not differentiate between upper and lower In converting plaintext to cipher text, each repetition has cases of alphabets, only one mechanism for key generation, four similar but different stages of processing are done, with and one level encryption. one stage depending on the key. The reverse of these is used The fourteen-square technique which is a modified twelve- to get back plaintext from cipher text. The high level square technique uses eight 9X6 matrices for both uppercase description of the AES is provided [13] as: and lowercase characters and six 6X7 matrices for special characters. The tables for alphabets are formed with the first 1. KeyExpansion: using Rijndael’s key schedule, containing both upper and lowercase characters and two derive cipher key. AES requires for each round, a special characters, and all other follow from the preceding separate 128-bit round key block and one more. one having either row and/or column manipulations or 2. InitialRound switches. The tables for digit and special characters also AddRoundKey: combine each byte of the follow the same pattern. To convert a plaintext, if it is an state with a block of the round key using alphabet, the alphabet table k is lookup for the character lock bitwise XOR. (i, j) and the corresponding character at lock+4 (i, j) of table 3. Rounds k+4 is used to substitute such a character with k<6. The SubBytes: a non-linear substitution step same goes for digits and special characters with k<4.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us