Message Hiding

Post on 17-Jan-2017

150 views 0 download

Transcript of Message Hiding

BY,,,,,,

MAYURI & APURVA

COMPUTER SECURITYIN MESSAGE HIDING

CONTAINS:

1. Cryptography

2. Cryptanalysis

3. Cryptology

4. SUBSTITUTION TECHNIQUES

5. TRANSPOSITON TECHNIQUES

Cryptography:Readable

textCryptographic

systemUnreadable

text

It convert the Readable text in a Unreadable text.

Cryptanalysis:

Unreadabletext

Cryptologysystem

Readabletext

It convert the Unreadable text in a Readable text.

Cryptology:

It I the combination of Cryptography and Cryptanalysis

Cryptology:

INCRYPTIONDECRYPTION

ENCRYPTION:

Plain text ENCRYPT Cipher text

Plain text is convert to the Cipher text.

DECRYPTION:

Cipher text DENCRYPT Plain text

Cipher text is convert to the Plain text.

ENCRYPTION AND DECRYPTION:

SUBSTITUTION TECHNIQUES:

CAESAR`S CIPHER VIGENERE CIPHER

CAESAR`S CHIPER:

VIGENERE CHIPHER:

Click icon to add picture

CIPHER TEXT:

OVBRGGMJWYOIWRURGM

key

Plain text

C R I N G E F R I N G E F R I N G E

M E T E A C H S O L I E R A M E A l

TRANSPOSITON TECHNIQUES:

RAIL FENCE CIPHER COLUMNAR TRANSPOSITION STEGANOGRAPHY

RAIL FENCE CIPHER:

Plain text: COME HOME TOMORROW

Cipher text:

CMHMTMROOEOEOORW

COLUMNAR TRANSPOSITION:

KEYWORD: ZEBRASMASSAGE: WE ARE DISCOVERED FLEE AT ONCE

Z E B R A S

6 3 2 4 1 5

CIPHER TEXT:EVLN ACDT ESEA ROFO DEEC WIREE

STEGANOGRAPHY

CONCLUSION :-

It is major achievement in computer engineering.It will allow perfectly secure messages ,secure discussion etc. between sender and receiver.

ANY QUESTION??????