Image Encryption: Security and Its Problems
Image Encryption: Security and Its Problems
Security and its problems security is automated tool for protecting files and other information stored on the computer. The major thing of the tools designed is to keep away the hackers is the computer security and internet security. How to overcome? Physical methods in earlier days Modern algorithms(DES and AES etc).
Introduction to AES
AES acronym of advanced encryption
standard It was introduced in 2001 to increase the capacity of the keys by Rijndael Its an iterated process contents of AES Plain text Keys Cipher text(plain text+keys).
Plain text
Encryptio n algorithm
Decryption algorithm
Plain text
input output
AES evaluation
Security Cost Algorithm and implementation charecteristics
AlgorithmDetails
1.ADD ROUND KEY
each of the 16 bytes of the expanded key. The expanded key bytes are never reused . The next time add round key is called for the bytes 17 to 32.
The xored data in the first step is
replaced by the bytes from the look up table. EXAMPLE: Let XORed data be EA(hex). This data is replaced by 87 from the look up table.This applies for all 4x4 matrix
3.SHIFT ROWS
The state is arranged in 4x4 matrix
From: 1 5 9
To:
no change
13 1 5 9 13 2 6 10 14 14 2 6 10 3 7 11 15 11 15 3 7
1 left shift
2 left shift
.
S0,j=(2*s0,j)xor(3*s1,j)xor(s2,j)xor(s3,j) S1,j=(s0,j)xor(2*s1,j)xor(3*s2,j)xor(s3,j) \This rule applies to all the rows and coloums
KEY EXPANSION
There are 4 steps in key 1.Rot word 2.Sub word 3.Rcon generator. 4.EK
expansion:
KEY EXPANSION
The user supplied 16bytes long key are arranged in 4*4
matrix. Sub word is a function that takes a 4-byte input word and applies the s-box to produce an 4-byte output word. Rot word takes word from the input, performs a cyclic permutations and return the word. Rcon gen: This function return a 4-byte value based on the Rcon generator table. EK: This function will return 4-byte of the expanded key of the specified output.
DECRYPTION
1. INVERSE ADD ROUND KEY:
The inverse add round key transformation is identical to the forward add round key transformation, because the xor operation is its own inverse. 2.INVERSE S-BOX TRANSFORMATION: The inverse substitute byte transformation make use of the inverse s-box as shown in the table below. The inverse s-box is constructed by applying the inverse of the transformation is bi=b(i+2) mod8 xor b(i+5) mod8 xor b(i+7) mod8 xor di
DECRYPTION
b0 |0 0 1 0 0 1 0 1 | b1 |1 0 0 1 0 0 1 0 | b2 |0 1 0 0 1 0 0 1 | b3 |1 0 1 0 0 1 0 0 | b4= |0 1 0 1 0 0 1 0 | b5 |0 0 1 0 1 0 0 1 | b6 |1 0 0 1 0 1 0 0 | b7 |0 1 0 0 1 0 1 0 | | bo | |1| | b1 | |0| | b2 | |1| | b3 | |0| | b4 | + |0| | b5 | |0| | b6 | |0| | b7 | |0|
DECRYPTION
During decryption each value of the state is replaced by the value in the inverse s-box.
DECRYPTION
3.INVERSE SHIFT ROW TRANSFORMATION The inverse shift row transformation performs the circular shift in the opposite direction for each of the last three rows with one byte circular right shift for the second row and so on.
DECRYPTION
4.INVERSE MIX COLUMN: The inverse mix column transformation can be defined by the following matrix multiplication on the state:
0E 0B 0D 09
09 0E 0B 0D
0D 09 0E 0B 0B 0D 09 0E
approximately 23 times cipher implemented in software. The key expansion function implementing in hardware is executed 1.88 times slower than the key expansion implementation in software. The inverse cipher implementing in hardware is executed 29 times faster than inverse cipher implementing in software. The DMA(direct memory access)which is used to