CRYPTOGRAPHY (INFORMATION SECURITY)

advertisement
CRYPTOGRAPHY
(INFORMATION SECURITY)
&
STEGANOGRAPHY
- A different combination
Presented by…
P. Anusha (3rd year CSE)
Email id: liveanusha@yahoo.com
Ph.no: 9866177530
Y.Rajitha (3rd year CSE)
Email id: rajitha_sree_70@yahoo.com
From:
SREE VIDYANIKETHEN ENGINEERING
COLLEGE
Cryptography or Cryptology is derived from
Abstract:
Greek, which means the practice and study of hiding
This paper is about CRYPTOGRAPHY and
information. In modern times, cryptography is
STEGANOGRAPHY– the science of scrambling
considered to be a branch of both mathematics and
data and the art of being invisible are used to make it
computer science, and is affiliated closely with
unintelligible to all, except the intended person, and
information
its various methods in making the work look more
engineering. Cryptography is used in applications
perfect. Cyber crimes have become a common piece
present
of vandalism in the present computerized world.
especially
What has changed dramatically is the ability to
importance.
in
theory,
computer
technologically
where
data
security,
advanced
security
has
and
societies;
highest
tamper with information. In a society where
information is mostly stored and transmitted in
Until modern times, cryptography referred
electronic form, what has become an absolute must is
almost exclusively to encryption, the process of
a means to ensure information security that is
converting ordinary information (plaintext) into
independent
medium
unintelligible gibberish. Decryption is the reverse,
responsible for generating or storing it. Today, there
moving from unintelligible cipher text to plaintext. A
is an immediate need to delve into the clutter of
cipher (or cipher) is a pair of algorithms which
material. There are many laws in enforcement and
perform this encryption and the reversing decryption.
many new devices, which are used to prevent such
The detailed operation of a cipher is controlled both
crimes. Nevertheless, these all devices resemble a
by the algorithm and, in each instance, by a key. This
seismograph, which records the amount of quake but
is a secret parameter (ideally, known only to the
cannot prevent the same. Here comes the discussion
communicants) for a specific message exchange
on cryptography, which plays a major role in this
context. Keys are important, as ciphers without
field of security of sending messages?
variable keys are trivially breakable and therefore
of
the
actual
physical
less than useful for most purposes. Historically,
Steganography is the art and science of
ciphers were often used directly for encryption or
writing hidden messages in such a way that no one
decryption, without additional procedures such as
apart from the sender and intended recipient even
authentication or integrity checks.
realizes there is a hidden message. By contrast,
cryptography obscures the meaning of a message, but
it does not conceal the fact that there is a message.
Today,
the
term
steganography
includes
the
concealment of digital information within computer
files.
In colloquial use, the term "code" is often
used to mean any method of encryption or
concealment of meaning. However, in cryptography,
code has a more specific meaning; it means the
replacement of a unit of plaintext (i.e., a meaningful
word or phrase) with a code word (for example, apple
pie replaces attack at dawn). Codes are no longer
Introduction
used in serious cryptography—except incidentally for
such things as unit designations (egg: 'Bronco Flight'
or Operation Overlord) —- since properly chosen
Simple versions of either offered little confidentiality
ciphers are both more practical and more secure than
from enterprising opponents, and still don't. An early
even the best codes, and better adapted to computers
substitution cipher was the Caesar cipher, in which
as well.
each letter in the plaintext was replaced by a letter
some fixed number of positions further down the
History
of
cryptography
and
cryptanalysis
alphabet. It was named after Julius Caesar who is
reported to have used it, with a shift of 3, to
communicate with his generals during his military
The Ancient Greek scytale (rhymes with
Italy),
probably
much
like
this
modern
campaigns, just like EXCESS-3 code in boolean
algebra.
reconstruction, may have been one of the earliest
devices used to implement a cipher.
Various physical devices and aids have been
used to assist with ciphers. One of the earliest may
Before the modern era, cryptography was
concerned solely with message confidentiality (i.e.,
encryption) — conversion of messages from a
comprehensible form into an incomprehensible one,
and back again at the other end, rendering it
unreadable by interceptors or eavesdroppers without
secret knowledge (namely, the key needed for
decryption of that message). In recent decades, the
field has expanded beyond confidentiality concerns
to include techniques for message integrity checking,
sender/receiver
signatures,
identity
interactive
authentication,
digital
proofs,
secure
and
computation, amongst others.
have been the scytale of ancient Greece, a rod
supposedly used by the Spartans as an aid for a
transposition cipher. In medieval times, other aids
were invented such as the cipher grille, also used for
a kind of steganography. With the invention of
polyalphabetic ciphers came more sophisticated aids
such as Alberti's own cipher disk, Johannes
Trithemius' tabula recta scheme, and Thomas
Jefferson's multi-cylinder (reinvented independently
by Bazeries around 1900). Several mechanical
encryption/decryption devices were invented early in
the 20th century, and many patented, including rotor
machines — most famously the Enigma machine
The earliest forms of secret writing required
used by Germany in World War II. The ciphers
little more than local pen and paper analogs, as most
implemented by better quality examples of these
people could not read. More literacy, or opponent
designs brought about a substantial increase in
literacy, required actual cryptography. The main
cryptanalytic difficulty after WWI.
classical cipher types are transposition ciphers, which
rearrange the order of letters in a message (e.g. 'help
me' becomes 'help em' in a trivially simple
rearrangement scheme), and substitution ciphers,
which systematically replace letters or groups of
letters with other letters or groups of letters (e.g., 'fly
at once' becomes 'gmz bu podf' by replacing each
letter with the one following it in the alphabet).
The development of digital computers and
electronics after WWII made possible much more
complex ciphers. Furthermore, computers allowed for
the encryption of any kind of data that is represented
by computers in any binary format, unlike classical
ciphers which only encrypted written language texts,
dissolving the utility of a linguistic approach to
cryptanalysis in many cases. Many computer ciphers
patterns. Since then the emphasis has shifted, and
can be characterized by their operation on binary bit
cryptography
sequences (sometimes in groups or blocks), unlike
mathematics, including aspects of information theory,
classical and mechanical schemes, which generally
computational complexity, statistics, combinatorics,
manipulate traditional characters (i.e., letters and
abstract algebra, and number theory. Cryptography is
digits) directly. However, computers have also
also a branch of engineering, but an unusual one as it
assisted cryptanalysis, which has compensated to
deals with active, intelligent, and
some extent for increased cipher complexity.
opposition
Nonetheless, good modern ciphers have stayed ahead
security
of cryptanalysis; it is usually the case that use of a
engineering need deal only with neutral natural
quality cipher is very efficient (i.e., fast and requiring
forces.
now
(see
makes
extensive
cryptographic
engineering);
most
use
malevolent
engineering
other
of
kinds
and
of
few resources), while breaking it requires an effort
many
orders
of
magnitude
larger,
Modern cryptography
making
cryptanalysis so inefficient and impractical as to be
effectively impossible.
The modern field of cryptography can be divided into
several areas of study.
Extensive open academic research into
cryptography is relatively recent — it began only in
the mid-1970s with the public specification of DES
•
Symmetric-key cryptography
Symmetric-key
cryptography
refers
to
(the Data Encryption Standard) by the NBS, the
encryption methods in which both the sender and
Diffie-Hellman paper,and the public release of the
receiver share the same key (and, less commonly, in
RSA algorithm. Since then, cryptography has become
which their keys are different, but related in an easily
a widely used tool in communications, computer
computable way).The modern study of symmetric-
networks, and computer security generally. The
key ciphers relates mainly to the study of block
present security level of many modern cryptographic
ciphers and stream ciphers and to their applications.
techniques is based on the difficulty of certain
A block cipher is, in a sense, a modern embodiment
computational
integer
of Alberti's polyalphabetic cipher: block ciphers take
factorisation problem or the discrete logarithm
as input a block of plaintext and a key, and output a
problem. In many cases, there are proofs that
block of cipher text of the same size. Since messages
cryptographic techniques are secure if a certain
are almost always longer than a single block, some
computational problem cannot be solved efficiently.
method of knitting together successive blocks is
With one notable exception—the one-time pad—
required. Several have been developed, some with
these proofs are contingent, and thus not definitive,
better security in one aspect or another than others.
but are currently the best available for cryptographic
They are the mode of operations and must be
algorithms and protocols.
carefully considered when using a block cipher in a
problems,
such
as
the
cryptosystem.
Essentially, prior to the early 20th century,
cryptography was chiefly concerned with linguistic
The Data Encryption Standard (DES) and
•
Public-key cryptography
the Advanced Encryption Standard (AES) are block
cipher
designs
which
have
been
Symmetric-key cryptosystems typically use
designated
cryptography standards by the US government
(though DES's designation was finally withdrawn
after the AES was adopted).Despite its deprecation as
an official standard, DES (especially its stillapproved and much more secure triple-DES variant)
remains quite popular; it is used across a wide range
of applications, from ATM encryption to e-mail
privacy and secure remote access.Many other block
ciphers have been designed and released, with
considerable variation in quality. Many have been
thoroughly broken. See Category:Block ciphers.
the same key for encryption and decryption, though
this message or group of messages may have a
different key than others. A significant disadvantage
of symmetric ciphers is the key management
necessary to use them securely. Each distinct pair of
communicating parties must, ideally, share a different
key, and perhaps each ciphertext exchanged as well.
The number of keys required increases as the square
of the number of network members, which very
quickly requires complex key management schemes
to keep them all straight and secret. The difficulty of
establishing a secret key between two communicating
Stream ciphers, in contrast to the 'block'
parties, when a secure channel doesn't already exist
type, create an arbitrarily long stream of key material,
between them, also presents a chicken-and-egg
which is combined with the plaintext bit-by-bit or
problem which is a considerable practical obstacle for
character-by-character, somewhat like the one-time
cryptography users in the real world.
pad. In a stream cipher, the output stream is created
based on an internal state which changes as the cipher
Cryptanalysis
operates. That state's change is controlled by the key,
The goal of cryptanalysis is to find some
and, in some stream ciphers, by the plaintext stream
weakness or insecurity in a cryptographic scheme,
as well. RC4 is an example of a well-known stream
thus
cipher; see Category:Stream ciphers.
Cryptanalysis might be undertaken by a malicious
Cryptographic hash functions (often called
message digest functions) do not necessarily use
keys, but are a related and important class of
cryptographic algorithms. They take input data (often
an entire message), and output a short, fixed length
hash, and do so as a one-way function. For good
ones, collisions (two plaintexts which produce the
same hash) are extremely difficult to find.
Message authentication codes (MACs) are
much like cryptographic hash functions, except that a
secret key is used to authenticate the hash value on
receipt.
permitting
its
subversion
or
evasion.
attacker, attempting to subvert a system, or by the
system's designer (or others) attempting to evaluate
whether a system has vulnerabilities, and so it is not
inherently a hostile act. In modern practice, however,
cryptographic algorithms and protocols must be
carefully examined and tested to offer any assurance
of the system's security (at least, under clear — and
hopefully reasonable — assumptions).
It is a commonly held misconception that
every encryption method
can be broken. In
connection with his WWII work at Bell Labs, Claude
Shannon proved that the one-time pad cipher is
unbreakable, provided the key material is truly
"Cryptanalysis" is also used to refer to any
random, never reused, kept secret from all possible
attempt to circumvent the security of other types of
attackers, and of equal or greater length than the
cryptographic algorithms and protocols in general,
message. Most ciphers, apart from the one-time pad,
and not just encryption. However, cryptanalysis
can be broken with enough computational effort by
usually excludes attacks that do not primarily target
brute force attack, but the amount of effort needed
weaknesses in the actual cryptography; methods such
may be exponentially dependent on the key size, as
as bribery, physical coercion, burglary, keystroke
compared to the effort needed to use the cipher. In
logging, and so forth, although these latter types of
such cases, effective security could be achieved if it
attack are an important concern in computer security,
is proven that the effort required (ie, 'work factor' in
and are often more effective than traditional
Shannon's terms) is beyond the ability of any
cryptanalysis.
adversary. This means it must be shown that no
Even though the goal has been the same, the
efficient method (as opposed to the time-consuming
brute force method) can be found to break the cipher.
Since no such showing can be made currently, as of
today,
the
one-time-pad
remains
the
only
methods and techniques of cryptanalysis have
changed
drastically
through
the
history
of
cryptography, adapting to increasing cryptographic
complexity, ranging from the pen-and-paper methods
theoretically unbreakable cipher.
of the past, through machines like Enigma in World
There are a wide variety of cryptanalytic
War II, to the computer-based schemes of the
attacks, and they can be classified in any of several
present. The results of cryptanalysis have also
ways. A common distinction turns on what an
changed — it is no longer possible to have unlimited
attacker knows and what capabilities are available. In
success in code breaking, and there is a hierarchical
a ciphertext-only attack, the cryptanalyst has access
classification of what constitutes a rare practical
only to the ciphertext (good modern cryptosystems
attack. In the mid-1970s, a new class of cryptography
are usually effectively immune to ciphertext-only
was introduced: asymmetric cryptography. Methods
attacks). In a known-plaintext attack, the cryptanalyst
for breaking these cryptosystems are typically
has access to a ciphertext and its corresponding
radically different from before, and usually involve
plaintext (or to many such pairs). In a chosen-
solving carefully-constructed problems in pure
plaintext attack, the cryptanalyst may choose a
mathematics,
plaintext and learn its corresponding ciphertext
factorization.
the
best-known
being
integer
(perhaps many times); an example is gardening, used
by the British during WWII. Finally, in a chosen-
Cryptographic protocols
ciphertext attack, the cryptanalyst may choose
ciphertexts
and
learn
their
corresponding
plaintexts.[7] Also important, often overwhelmingly
so, are mistakes (generally in the design or use of one
of the protocols involved; see Cryptanalysis of the
Enigma for some historical examples of this).
In many cases, cryptographic techniques
involve back and forth communication among two or
more parties in space (eg, between the home office
and
a
branch
office)
or
across
time
(e.g.,
STEGANOGRAPHY
cryptographically protected backup data). The term
cryptographic protocol captures this general idea.
Cryptographic
protocols
have
-The art of being invisible
been
developed for a wide range of problems, including
relatively
simple
ones
like
interactive
proof
systems,zero-knowledge, and much more complex
The word steganography is of Greek origin
ones like electronic cashand secure multiparty
and means "covered, or hidden writing". Its ancient
computation.
origins can be traced back to 440 BC. Herodotus
mentions two
examples
of steganography in.
When the security of a good cryptographic
Demeratus sent a warning about a forthcoming attack
system fails, it is rare that the vulnerability leading to
to Greece by writing it on a wooden panel and
the breach will have been in a quality cryptographic
covering it in wax. Wax tablets were in common use
primitive. Instead, weaknesses are often mistakes in
then as re-usable writing surfaces, sometimes used
the protocol design (often due to inadequate design
for shorthand. Another ancient example is that of
procedures, or less than thoroughly informed
Histiaeus, who shaved the head of his most trusted
designers), in the implementation (e.g., a software
slave and tattooed a message on it. After his hair had
bug), in a failure of the assumptions on which the
grown the message was hidden. The purpose was to
design was based (e.g., proper training of those who
instigate a revolt against the Persians. Later, Johannes
will be using the system), or some other human error.
Trithemius’s book Steganographia is a treatise on
Many cryptographic protocols have been designed
cryptography.
and analyzed using ad hoc methods, but they rarely
have any proof of security. Methods for formally
Generally, a steganographic message will
analyzing the security of protocols, based on
appear to be something else: a picture, an article, a
techniques from mathematical logic (see for example
shopping list, or some other message. This apparent
BAN logic), and more recently from concrete
message is the cover text. For instance, a message
security principles, have been the subject of research
may be hidden by using invisible ink between the
for the past few decades.Unfortunately, to date these
visible lines of innocuous documents.
tools have been cumbersome and are not widely used
for complex designs.
The advantage of steganography over
cryptography alone is that messages do not attract
The study of how best to implement and
integrate cryptography in applications is itself a
distinct field, see: cryptographic engineering and
security engineering.
attention to themselves, to messengers, or to
recipients. An unhidden coded message, no matter
how unbreakable it is, will arouse suspicion and may
in itself be incriminating, as in countries where
encryption is illegal. Often, steganography and
cryptography are used together to ensure security of
the covert message.
Steganography
used
in
electronic
file systems, add random looking padding
communication include steganographic coding inside
bytes at the end of a cipher text so that its
of a transport layer, such as an MP3 file, or a
size cannot be used to figure out the size of
protocol, such as UDP.
the original plaintext. Examples of software
that use this technique include FreeOTFE
Steganographic message (the plaintext) is
and True Crypt.
often first encrypted by some traditional means,

Chaffing and winnowing
producing a cipher text. Then, a cover text is

Invisible ink
modified in some way to contain the cipher text,

Null ciphers
resulting in stegotext. For example, the letter size,

Concealed messages in tampered executable
spacing, typeface, or other characteristics of a cover
files, exploiting redundancy in the i386
text can be manipulated to carry the hidden message;
only the recipient (who must know the technique
instruction set.

used) can recover the message and then decrypt it.
Francis Bacon is known to have suggested such a

material
A new steganographic technique involves
Delays in key presses in some applications
(telnet or remote desktop software) can
mean a delay in packets, and the delays in
the packets can be used to encode data.
Modern Steganography entered the world in
There is no extra processor or network
1985 with the advent of the Personal Computer
steganography
video
sent over the network from the keyboard.
Modern steganographic techniques
classical
in
injecting imperceptible delays to packets
Steganographic techniques
to
pictures
(optionally played at slower or faster speed).
technique to hide messages.
applied
Embedded
activity, so the steganographic technique is
problems.
"invisible" to the user. This kind of
Development following that was slow, but has since
steganography could be included in the
taken off, based upon the number of 'stego' programs
firmware of keyboards, thus making it
available.
invisible to the system. The firmware could


Concealing messages within the lowest bits
then be included in all keyboards, allowing
of noisy images or sound files.
someone to distribute a key logger program
to thousands without their knowledge.
Concealing data within encrypted data. The
data to be concealed is first encrypted before

Content-Aware
Steganography
hides
being used to overwrite part of a much
information in the semantics a human user
larger
assigns a datagram; these systems offer
block of encrypted
data. This
technique works most effectively where the
security
decrypted version of data being overwritten
adversary/warden.
has no special meaning or use: some
cryptosystems, especially those designed for

against
BPCS-Steganography
a
-
non-human
a
very
embedding capacity steganography
large
commonly this is actually done. For example: a 24-
Countermeasures
bit bitmap will have 8 bits representing each of the
The detection of steganographically encoded
three color values (red, green, and blue) at each pixel.
packages is called steganalysis. The simplest method
If we consider just the blue there will be 28 different
to detect modified files, however, is to compare them
values of blue. The difference between 11111111 and
to the originals. To detect information being moved
11111110 in the value for blue intensity is likely to
through the graphics on a website, for example, an
be undetectable by the human eye. Therefore, the
analyst can maintain known-clean copies of these
least significant bit can be used (more or less
materials and compare them against the current
undetectably) for something else other than color
contents of the site. The differences (assuming the
information. If we do it with the green and the red as
carrier is the same) will compose the payload.
well we can get one letter of ASCII text for every
three pixels
In
general,
using
an
extremely
high
compression rate makes steganography difficult, but
For example:
not impossible; while compression errors provide a
good place to hide data, high compression reduces
the amount of data available to hide the payload in,
raising the encoding density and facilitating easier
Here I am hiding a data in the following figure by
using the S-TOOL software:
Before hiding…
detection (in the extreme case, even by casual
observation).
Applications
Usage in modern printers
Steganography is used by some modern
printers, including HP and Xerox brand color laser
printers. Tiny yellow dots are added to each page.
The dots are barely visible and contain encoded
printer serial numbers, as well as date and time
stamps
The larger the cover message is (in data
content terms—number of bits) relative to the hidden
message, the easier it is to hide the latter. For this
reason, digital pictures (which contain large amounts
of data) are used to hide messages on the internet and
on other communication media. It is not clear how
After hiding...
We may have a doubt here that there is no difference
between the above two figures. But we found the
difference when we reveal the second image by using
S-TOOL software we may get the hidden data.
Conclusion:
This paper mainly presents about he cryptography
and also steganography, the usage of those in
different fields to provide the security and the
protocols used in it the modern techniques which are
used to provide the security and the protocols which
are used to provide are also mentioned. So by the
usage of this cryptography it provides the security to
our data transmission without any leakage of the
confidential matter to the intruders or any third party.
This is the main use of this paper.
References:
--Cryptography and network security by William
Stallings
--hack proofing your network by Ryan Russell
--Introduction
Springer
to
cryptography
by
Buchmann,
Download