Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Paavni Gaur, Mr. Ajay Kaushik
DOI Link: https://doi.org/10.22214/ijraset.2021.39542
Certificate: View Certificate
An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will further be implemented by me. The paper shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image.
I. INTRODUCTION
A. Need of the Study
In today’s image communication system security of images is essential. It is necessary to protect confidential image data from unauthorized users. To detect and find unauthorized users is a challenging task. Different researchers proposed different techniques for securing image transmission. Today almost all digital services like internet communication, medical and military imaging systems, multimedia system requires reliable security in storage and transmission of digital images. Due to faster growth in multimedia technology, internet and cellphones, there is a need for image encryption techniques in order to hide images from such attacks. In this system we use AES (Advanced Encryption Technique) in order to hide image. Such Encryption Technique helps to avoid intrusion attacks.
B. Problem Definition
Many encryption methods have been proposed in literature, and the most common way to protect large multimedia files is by using conventional encryption techniques, Private key bulk encryption algorithms, such as Triple DES, are not so suitable for transmission of images. Due to complexity of their internal structure, they are not particularly fast in terms of execution speed and cannot be applied for images in the real time scenario Also traditional cryptographic techniques such as DES cannot be applied to images due to intrinsic properties of images such as bulk data capacity, redundancy and high correlation among pixels. Image encryption algorithms can become an integral part of the image delivery process if they aim towards efficiency and at same time preserve the security level.
C. Scope of the Study
Image processing is a mechanism in which an original image will be converted into digital image and after converting in digital form process it to get useful information. It is a type of signal processing in which input is an image and output may be image or characteristics/features associated with that image. .In recent years, the advances in communication technology have seen strong interest in digital image transmission. However, growth of computer processor possessing power and storage illegal access has become easier. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code, scientific community have seen strong interest in image transmission. Information privacy becomes a challenging issue. In order to protect valuable data or image from undesirable readers, data or image encryption / decryption is essential, furthermore. As such in this paper, a scheme based on encryption has been proposed for secure image transmission over channels.
D. Objective of the Study
There appears to be illegal activity taking place at different organization. The suspects are apparently the use of computers and an illegal wireless network by intruders to conduct their activities by access an unsecure file and document without an encrypted password. Therefore this project will deal with the development of encrypting and decryption software for images.
Security is one of the core areas of study in recent days. Encryption of the image is widely known as an effective method for its secure transmission. The objective of any image encryption method is to obtain a top quality hidden image in order to keep information secret.
In this project I will do a thorough research on basics of cryptography, AES algorithm, how AES is implemented, how AES algorithm is modified to be used on images and will at the end of gaining knowledge of cryptography and AES , will implement it to showcase my learnings.
II. LITERATURE REVIEW
A. Cryptography?
Cryptography, or?cryptology?is the practice and study of techniques for?secure communication?in the presence of adversarial behavior.? More generally, cryptography is about constructing and analyzing?protocols ?that prevent third parties or the public from reading private messages;?various aspects in?information security such as data?confidentiality,?data integrity,?authentication?are central to modern cryptography. ?Modern cryptography exists at the intersection of the disciplines of?mathematics,?computer science,?electrical engineering, communication science, and?physics. ?
Applications of cryptography include?electronic commerce, chip-based payment cards,?digital currencies,?military etc.
B. Encryption
Encryption is a way of scrambling data so that only authorized parties can understand the information. In technical terms, it is the process of converting human-readable plaintext to incomprehensible text, also known as ciphertext. In simpler terms, encryption takes readable data and alters it so that it appears random. Encryption requires the use of a?cryptographic key: a set of mathematical values that both the sender and the recipient of an encrypted message agree on. Although encrypted data appears random, encryption proceeds in a logical, predictable way, allowing a party that receives the encrypted data and possesses the right key to decrypt the data, turning it back into plaintext. Truly secure encryption will use keys complex enough that a third party is highly unlikely to decrypt or break the ciphertext by?brute force?— in other words, by guessing the key.
C. Types of Encryption
The two main kinds of encryption are symmetric encryption and?asymmetric encryption.
In symmetric encryption, there is only one key, and all communicating parties use the same (secret) key for both encryption and decryption. In asymmetric, or public key, encryption, there are two keys: one key is used for encryption, and a different key is used for decryption. The decryption key is kept private (hence the "private key" name), while the encryption key is shared publicly, for anyone to use (hence the "public key" name).
D. Data Encryption Reasons
E. Symmetric Encryption
Symmetric encryption?is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. This encryption method differs from asymmetric encryption where a pair of keys, one public and one private, is used to encrypt and decrypt messages.
By using symmetric encryption algorithms, data is converted to a form that cannot be understood by anyone who does not possess the secret key to decrypt it. Once the intended recipient who possesses the key has the message, the algorithm reverses its action so that the message is returned to its original and understandable form.
F. Types of Symmetric Encryption
There are two types of symmetric encryption algorithms:
G. Drawbacks
A significant disadvantage of symmetric ciphers is the?key management?necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different key, and perhaps for each ciphertext exchanged as well. The number of keys required increases as the?square?of the number of network members, which very quickly requires complex key management schemes to keep them all consistent and secret.
III. ADVANCED ENCRYPTION STANDARD (AES)
The Advanced Encryption Standard (AES) is a symmetric?block cipher?chosen by the U.S. government to protect classified information. AES is implemented in software and hardware throughout the world to?encrypt?sensitive data. It is essential for government computer security, cybersecurity and electronic data protection. AES has become the most popular algorithm used in symmetric key cryptography. The transparent selection process established by NIST helped create a high level of confidence in AES among security and cryptography experts.
A. Features of AES
NIST specified the new AES algorithm must be a block cipher capable of handling 128-bit blocks, using keys sized at 128, 192 and 256 bits. Other criteria for being chosen as the next AES algorithm included the following:
Security:?Competing algorithms were to be judged on their ability to resist attack as compared to other submitted ciphers. Security strength was to be considered the most important factor in the competition.
Cost:?Intended to be released on a global, nonexclusive and royalty-free basis, the candidate algorithms were to be evaluated on computational and memory efficiency.
Implementation:?Factors to be considered included the algorithm's flexibility, suitability for hardware or software implementation, and overall simplicity.
B. Attacks on AES Encryption
Research into attacks on AES encryption has continued since the standard was finalized in 2000. Various researchers have published attacks against reduced-round versions of AES.
Researchers have found a few potential ways to attack AES encryption:
In 2009, they discovered a possible related-key attack. This?cryptanalysis?attempted to crack a cipher by studying how it operates using different keys. The related-key attack proved to be a threat only to AES systems that are incorrectly configured.
In 2009, there was a known-key attack against AES-128. A known key was used to discern the structure of the encryption. However, the hack only targeted an eight-round version of AES-128, rather than the standard 10-round version, making the threat relatively minor.
A major risk to AES encryption comes from?side-channel attacks. Rather than attempting a brute-force assault, side-channel attacks are aimed at picking up leaked information from the system. Side-channel attacks, however, may reduce the number of possible combinations required to attack AES with brute force. Side-channel attacks involve collecting information about what a computing device does when it is performing cryptographic operations and using that information to?reverse-engineer?the device's cryptography system. In one case, a side-channel attack was used successfully to deduce AES-128 encryption keys by carefully monitoring the cipher's shared use of the processors' cache tables.
Side-channel attacks can be mitigated by preventing possible ways data can leak. Additionally, using randomization techniques can help eliminate any relationship between data protected by the cipher and any leaked data that could be collected using a side-channel attack.
C. Working of AES Algorithm
AES includes three block?ciphers:
Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128, 192 and 256 bits, respectively.
The sender and the receiver must both know -- and use -- the same secret key. There are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit keys. A round consists of several processing steps that include substitution, transposition and mixing of the input?plaintext?to transform it into the final output of?ciphertext.
D. Detailed Working of AES Algorithm
It is based on ‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treats the 128 bits of a plaintext block as 16 bytes. These 16 bytes are arranged in four columns and four rows for processing as a matri. Each of the rounds uses a different 128-bit round key, which is calculated from the original AES key.
The schematic of AES structure is given in the following illustration −
E. Encryption Process
The encryption phase of AES can be broken into three phases: the initial round, the main rounds, and the final round.
a. SubBytes
b. ShiftRows
c. MixColumns
d. AddRoundKey
4. Final Round
a. SubBytes
b. ShiftRows
c. AddRoundKey
5. Creation of Round Keys: A Key Schedule algorithm is used to calculate all the round keys from the key. So the initial key is used to create many different round keys which will be used in the corresponding round of the encryption.
6. Byte Substitution (SubBytes): The 16 input bytes are substituted by looking up a fixed table (S-box) given in design. The result is in a matrix of four rows and four columns. This step implements the substitution. In this step each byte is substituted by another byte.(Its performed using a lookup table also called the S-box. This substitution is done in a way that a byte is never substituted by itself and also not substituted by another byte which is a compliment of the current byte. The result of this step is a 16 byte (4 x 4 ) matrix like before. The next two steps implement the permutation.
7. Shiftrows
Each of the four rows of the matrix is shifted to the left. Any entries that ‘fall off’ are re-inserted on the right side of row.
a. First row is not shifted.
b. Second row is shifted one (byte) position to the left.
c. Third row is shifted two positions to the left.
d. Fourth row is shifted three positions to the left.
The result is a new matrix consisting of the same 16 bytes but shifted with respect to each other.
8. MixColumns: Each column of four bytes is now transformed using a special mathematical function. This function takes as input the four bytes of one column and outputs four completely new bytes, which replace the original column. The result is another new matrix consisting of 16 new bytes. It should be noted that this step is not performed in the last round. (This multiplication has the property of operating independently over each of the columns of the initial matrix, i.e. the first column when multiplied by the matrix, produces the first column of the resultant matrix.)
9. Addroundkey : The 16 bytes of the matrix are now considered as 128 bits and are XORed to the 128 bits of the round key. If this is the last round then the output is the ciphertext. Otherwise, the resulting 128 bits are interpreted as 16 bytes and we begin another similar round.
F. Decryption Process
The process of decryption of an AES ciphertext is similar to the encryption process in the reverse order. Each round consists of the four processes conducted in the reverse order −
a. AddRoundKey
b. ShiftRows
c. SubBytes
2. Inverse Main Round
a. AddRoundKey
b. MixColumns -This step is similar to the MixColumns step in encryption, but differs in the matrix used to carry out the operation.
c. ShiftRows
d. SubBytes -Inverse S-box is used as a lookup table and using which the bytes are substituted during decryption.
3. Inverse Initial Round
a. AddRoundKey
Since sub-processes in each round are in reverse manner, unlike for a Feistel Cipher, the encryption and decryption algorithms needs to be separately implemented, although they are very closely related.
Of the four operations in AES encryption, only the AddRoundKey operation is its own inverse (since it is an exclusive-or).
To undo AddRoundKey, it is only necessary to expand the entire AES key schedule (identically to encryption) and then use the appropriate key in the exclusive-or. The other three operations require an inverse operation to be defined and used.
The first operation to be undone is ShiftRows. The Inverse ShiftRows operation is identical to the ShiftRows operation except that rotations are made to the right instead of to the left.
The next operation to be undone is the SubBytes operation. The Inverse S-Box is used which is read identically to the S-Box matrix.
The last inverse operation to define is MixColumns. Like MixColumns, Inverse MixColumns can be defined as the matrix multiplication .
IV. RESULTS AND DISCUSSION
Cryptography and its principles have been studied carefully. I read and learned about Cryptography from various materials available on the internet.?Encryption including why data encryption is necessary and types of encryption algorithms were studied. Features and principles of Symmetric key algorithm were studied from various materials available.? ?Image encryption and decryption techniques using Advanced Encryption Standard (AES) algorithm is proposed .The usage of 256 bit cipher key to achieve the high security, because 256 bit cipher key is difficult to break. As a result of this secure transmission of image can be possible.
The goal of this research is to study the application of Advanced Encryption Standard algorithm (AES) for secure and efficient image encryption. The importance of image encryption by AES algorithm processes have been studied. It is also expected that AES algorithm study will have an effective role in strategic applications, because the encryption algorithm applied on hardware is also take a place in strategic communications equipment, it is safe and possible to develop this algorithm in terms of height and speed of time that have approved mainly on logistical aspects not on the technical aspects. It is possible to encrypt and decrypt by AES encryption used in many highly sensitive applications like Image encryption. We have reason to believe that use this method to encrypt the image will have a very good prospect in the future.
V. FUTURE SCOPE
As a future work, I am going to continue this research in order generating more secure key to get the maximum encryption speed in limited implementation area.
I will implement a novel mechanism in which AES algorithm will be apply to encrypt and decrypt images securely for further applications in image communication system. Future scope is, it can be used in various applications like Military communication, Forensics, Intelligent systems etc.
Since image steganography is done using AES, this system provides security from intrusion attacks and the usage of AES technique allows the encryption and decryption process to be more secure and faster. Thus this system provides security in storage and transmission of digital images. The cryptographic methodology proposed in this paper will further be tested on different types of input images with change in size of the image and keys of AES encryption algorithm. The report shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image. The next step in this direction will be system implementation, and then analyzing it for its efficiency, accuracy and reliability.
[1] https://www.iosrjournals.org/ [2] https://www.researchgate.net/ [3] https://citeseerx.ist.psu.edu/ [4] https://www.ijser.org/ [5] https://www.educative.io/edpresso/what-is-the-aes-algorithm [6] https://www.researchgate.net
Copyright © 2022 Paavni Gaur, Mr. Ajay Kaushik . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET39542
Publish Date : 2021-12-20
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here