Message Hiding
-
Upload
appynikki -
Category
Technology
-
view
150 -
download
0
Transcript of Message Hiding
BY,,,,,,
MAYURI & APURVA
COMPUTER SECURITYIN MESSAGE HIDING
CONTAINS:
1. Cryptography
2. Cryptanalysis
3. Cryptology
4. SUBSTITUTION TECHNIQUES
5. TRANSPOSITON TECHNIQUES
Cryptography:Readable
textCryptographic
systemUnreadable
text
It convert the Readable text in a Unreadable text.
Cryptanalysis:
Unreadabletext
Cryptologysystem
Readabletext
It convert the Unreadable text in a Readable text.
Cryptology:
It I the combination of Cryptography and Cryptanalysis
Cryptology:
INCRYPTIONDECRYPTION
ENCRYPTION:
Plain text ENCRYPT Cipher text
Plain text is convert to the Cipher text.
DECRYPTION:
Cipher text DENCRYPT Plain text
Cipher text is convert to the Plain text.
ENCRYPTION AND DECRYPTION:
SUBSTITUTION TECHNIQUES:
CAESAR`S CIPHER VIGENERE CIPHER
CAESAR`S CHIPER:
VIGENERE CHIPHER:
Click icon to add picture
CIPHER TEXT:
OVBRGGMJWYOIWRURGM
key
Plain text
C R I N G E F R I N G E F R I N G E
M E T E A C H S O L I E R A M E A l
TRANSPOSITON TECHNIQUES:
RAIL FENCE CIPHER COLUMNAR TRANSPOSITION STEGANOGRAPHY
RAIL FENCE CIPHER:
Plain text: COME HOME TOMORROW
Cipher text:
CMHMTMROOEOEOORW
COLUMNAR TRANSPOSITION:
KEYWORD: ZEBRASMASSAGE: WE ARE DISCOVERED FLEE AT ONCE
Z E B R A S
6 3 2 4 1 5
CIPHER TEXT:EVLN ACDT ESEA ROFO DEEC WIREE
STEGANOGRAPHY
CONCLUSION :-
It is major achievement in computer engineering.It will allow perfectly secure messages ,secure discussion etc. between sender and receiver.
ANY QUESTION??????