Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Network Security

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 04 Issue: 07 | July -2017

p-ISSN: 2395-0072

www.irjet.net

FAST AND SECURE TRANSMISSION OF IMAGE BY USING BYTE ROTATION ALGORITHM IN NETWORK SECURITY Miss A. P. Waghmare1, Mr. S.S. Kemekar2, Prof. P. R. Lakhe3 1Student

of Suresh Deshmukh College Of Engineering, Selukate, Wardha Instrumentation Engineer in Inox Air Product Ltd. Wardha 3 Assistant Professor of Suresh Deshmukh College of Engineering Selukate Wardha ---------------------------------------------------------------------***--------------------------------------------------------------------2

Abstract - In this paper, we have introduced some inventive advancement to the byte rotation encryption algorithm which is more secure and fast. There has been immense increase in the accumulation and communication of digital computer data in both the private and public sector. The main aim of this study is to increase security in communication by encryption the information using key that is created through using an image. Whatever we want to send file from one location to another location in the network, many unauthorized users are illegally access the information. There are different algorithms like blowfish, DES, AES, RC5 that achieve more security but increases the complexity of the algorithms and also takes more time for encryption and decryption of files. The benefits of this algorithm for security and also reduces time for process of file encryption and decryption.

unreadable form it attracts the attention of hacker. So to make the secret image more protected the idea of steganography is introduced that embed the secret message behind a carrier to make it viewless while communication. The two techniques differ from the fact that cryptography tries to keep the content of message secret whereas the steganography tries to keep the existence of message itself hidden. In steganography of Image, the presence of secret image is made hidden by hiding it behind another image. To provide security to data in network different algorithms are used but each and every algorithm having its own advantages and disadvantages. Secret key is used for encryption in DES algorithm. These algorithms face the problem when key transmission is done over the network. For encryption and decryption process RSA algorithm takes maximum time. AES, DES, Triple DES, RSA are useful algorithm for improve different parameter like security, encryption, and decryption process time and increase complexity. The author S. Bhati proposed Byte Rotation Algorithm (BRA). Using Byte Rotation Algorithm increase security and increase speed of encryption process.

Key Words: Byte Rotation Algorithm (BRA), Advanced Encryption Standard (AES), Network Security, Encryption, Decryption.

1.1 Byte Rotation Algorithm

1.INTRODUCTION

In digital computer programming, a bitwise operation operates on one or more bit patterns or binary numerals at the level of their individual bits. It is a fast, simple action directly supported by the processor, and is used to manipulate values for comparisons and calculations, typically, bitwise operations are substantially faster than division, several times faster than multiplication, and sometimes significantly faster than addition. While modern processors usually perform addition and multiplication just as fast as bitwise operations due to their longer instruction pipelines and other architectural design choices, bitwise operations do commonly use less power because of the reduced use of resources.

In network security different types of attacker, ethical hacker unauthorized user access the secure data. All these types of hacker access illegal data. To provide security for the data authors implemented different algorithm for encryption and decryption of the data. In the present world as more and more information is generated and transferred through network system, the information being transmitted develops more and more important and security of this data becomes a greater issue. This data varies from text to multimedia data, multimedia data includes a major number of images, images are transferred for different applications that include medical image system, personal photographs, military images, and confidential documents that may contain some private or confidential information that is required to be protected from any unauthorized human. The commonly applied approaches are steganography and cryptography to implement image security. Cryptography is a technique that uses various encryption and decryption methods to hold the original message secret. As in cryptography the encrypted image is visual to user and is in Š 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 1997


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.