Post on 16-Apr-2017
transcript
AN EFFICIENT OPERATOR BASED UNICODE CRYPTOGRAPHY ALGORITHM
FOR TEXT, AUDIO AND VIDEO FILES
CRYPTOGRAPHY In modern times, science of using
mathematics to encrypt and decrypt data
Examples: ATM Cards, Computer passwords, E-Commerce
CONDITIONS TO BE SATISFIED Authentication: verifying the identity of user Privacy: only the intended user reads the
message Integrity: the exact original message
received by user Non-repudiation: proving that the sender
really sent the message
CRYPTOGRAPHIC TECHNIQUES
OPERATORS IN ENCODING Every plain text can be converted into
numeric value irrespective of its magnitude.
Value 1
Value 2
Value X*
PlainText
CipherText
Encoding
WHY UNICODE ? Common standard-65536 characters
available 100,000 code positions allocated to
characters Many code points not yet assigned Many code points are permanent non
characters Hence Unicode mapping (UTF 16) is chosen
DESIGN USING UNICODE
PlainText
Unicode
Cipher Text
Operator F(x)
KEY BINDING METHODS Numeric key is binded Entire Text Binding: - Each character key added
- Inefficient method , hence avoided Feed Back Based Security:
- First character key added- Loop continued till end of the word or
input- Current Char Key depends Previous Char
input -No repetition
Criteria for secret key:- Must be numeric value- Unique value range from 0 to 65536
Serial Digit Secret Key:- Depending on the operator , key is
added to block
- Key range is larger
String Structure Key Bind:-Series of characters instead of numbers-Key can have Unicode equivalent values
CONCLUSION Thus Unicode character set provides better
encoding algorithm Hence it increases complexity of cipher text
& provides better security for all file types