Академический Документы
Профессиональный Документы
Культура Документы
Batch : 2018-21
Students Details :
Broad Subject Area: Data Security Using Extended ECS (Encryption, Compression, Steganography).
Signature of Supervisor
1. Abstract:-
In today’s scenario where everything is internet 3. Introduction (Motivation):
based, data security is on high demand. Data is Data security is the act of protecting data from
considered as a crucial asset and is required to be uncertified access. Any type of information
protected. Data Security includes data transferred over the internet has a possibility of
confidentiality, integrity, authenticity and much being misused. Hence various techniques such
more. Despite of several approaches to data as cryptography, compression, steganography
security such as encryption, compression, is used to safeguard data from threat while
steganography, data is still prone to potential sharing it over Internet. Cryptography is a
security threats. The major reason identified is the technique that make use of mathematics for
shortcomings of these individual techniques when data security. It works by jumbling plaintext
certain factors are taken into account. into cipher text, then back again. To encrypt
Cryptography ensures security but it comes at cost data, two keys either symmetric (encryption
in terms of time and space. Compression and decryption is done using same key) and
techniques encrypts data and saves disk space but asymmetric (encryption and decryption is done
these compressed files can easily be uncompressed using public and private key respectively) key
by attackers. Steganography a technique which algorithms Steganography is a method that
hides data instead of encrypting it with its merits conceals the message in a way it cannot be
and demerits. In this report, approaches for data seen by a unauthorized person. It hides the fact
security (Encryption, Compression, that a secret message is being transmitted
Steganography) and their potential advantages and Compression is a method that reduces the
disadvantages are studied in detail. A comparison number of bits occupied. It works by
of these approaches have been surveyed. And eliminating redundancy in data. It ensures
Proposal is given to use these 3 approaches lesser storage, minimum cost and requires less
collectively as ECS Data Security System with amount of time to transfer a file over network.
taking good features of approaches, Evaluating
Cryptography provides number of security goals to
ECS and extending ECS.
ensure of privacy of data, on-alteration of data and
so on. The idea of encryption and encryption
2. Keywords:- algorithm by which we can encode our data in
Data Security, Compression, secret code and not to be able readable by hackers
strategy.
4. Endpoints: Security solutions that 8.Current Status and development
draw logs from endpoints will need to Completed the encryption and decryption of
validate the authenticity of those a file using Play fair encryption technique,
RSA asymmetric encryption technique,
endpoints, or the analysis isn’t going to do
compression using RLE compression
much good. techniques.
Table2: RSA vs ECC vs ELGAMAL
Comparisons:
Table 4: Comparison & Conclusion on
Cryptography Features MD5 SHA 1
Output 128 bits 160 bits
length
Featur Hashing Symmetric Asymmetr
Required 264 operations (4 280 operations (4
es function ic
attempts rounds * 16 steps) rounds * 20
Requir 0 1 2 to try steps)
ed No. and find
of keys two
Approv 256 bits 128 bits 2048 bits messages
ed key providin
length g the
by same
NIST output
Often SHA AES RSA value
used
Key N/A Pose Secured Required 2128 operations 2160 operations
sharin problems and easy attempts
g to try
Effect N/A Sender and Loss is and find
of key receiver only for original
compro both bears owner of message
mise lose asymmetri correspo
c key nding to
Speed Fast Fast Slow output
Compl Medium Medium High Speed Faster Slower
exity Chain 4 (a-d) 5 (a-e)
Examp Sha 224, AES, DES RSA, variables
les Sha 256, Elgamal, Mathem a = b + ((a + Process a= (e + Process
ECC atical p (b, c, d) +M[i] P +S5 (a) + W
expressio +T[k]) <<<s), b=b, [t] + K[t]), b= a,
n in each c=c c= s 30 (b), d=c,
round d=d e= d
Attacks Collision attack SHAttered
attack
[3] Rajani.T., Importance of Cryptography in [12] Workshops, C., Hiding, I., Pfitzmann, A.,
Network Security. In International Conference Information Hiding, P., Science, L.,
on Communication Systems and Network Mittelholzer, T., Watermarking., A., Shin, N.,
Technologies, pp 462-467(2013). Steganography., O., Franz, E., Pfitzmann, A.,
Cover-Stego-Attacks., S., Fridrich, J., Du, R.,
[4] Agoyi, M: Sms Security: An Asymmetric Images., S., Westfeld, A., Pfitzmann, A.,
Encryption Approach. In Sixth International Systems., A., Smith, J., Dodge, C.,
Conference on Wireless and Mobile Steganography., D., Furon, T., Duhamel, P.,
Communications, pp 448-452(2010) Technique., A., Craver, S., Detection., Z.,
[5] Gaba, J., Sharma, M.k.: A Review Based Adelsbach, A., Pfitzmann, B., Sadeghi, A.,
Study of Hybrid Security Schemes Based on Content., P., Guth, H., Pfitzmann, B. and Data.,
Compression, Encryption and Steganography. E. (2019). dblp: 3. Information Hiding 1999:
In: International Journal of Engineering Trends Dresden, Germany. [online] Dblp.uni-trier.de.
and Technology, vol. 4(7), pp. 3243-3246 Available at: https://dblp.uni-
(2013) trier.de/db/conf/ih/ih99 [Accessed 25 Mar.
2019].
[6] Ibrahim, A.M.A., Mustafa, M.E. :
Comparison Between (RLE And Huffman) [13] En.wikibooks.org.
Algorithmsfor Lossless Data Compression. In: (2019). Steganography/Covers - Wikibooks,
International Journal of Innovative Technology open books for an open world. [online]
and Research, vol. 3(1), pp. 1808-1812(2015) Available at:
https://en.wikibooks.org/wiki/Steganography/C
[7] Maan, A.J. :Analysis and Comparison of overs#Audio [Accessed 25 Mar. 2019].
Algorithms for Lossless Data Compression. In:
International Journal of Information and [14] En.wikibooks.org.
Computation Technology, vol. 3(3), pp. 139- (2019). Steganography/Covers - Wikibooks,
146(2013) open books for an open world. [online]
Available at:
[8] SearchStorage. (2019). What is data https://en.wikibooks.org/wiki/Steganography/C
compression? - Definition from WhatIs.com. overs#Photos [Accessed 25 Mar. 2019].
[online] Available at:
https://searchstorage.techtarget.com/definition/ [15] En.wikibooks.org.
compression [Accessed 25 Mar. 2019]. (2019). Steganography/Covers - Wikibooks,
open books for an open world. [online]
[9]Anon,(2019). Available at:
[online]Available_at:https://www.researchgate. https://en.wikibooks.org/wiki/Steganography/C
net/publication/273011398_A_Secure_Data_C overs#Text [Accessed 25 Mar. 2019].
ommunication_System_Using_Cryptogaphy_A
nd_Steganography [Accessed 24 Mar. 2019].
[10]En.wikipedia.org.(2019). Decoding_metho
ds.
[online]Available_at:https://en.wikipedia.org/w
iki/Decoding_methods [Accessed 25 Mar.
2019].