Skip to content

Latest commit

 

History

History
40 lines (23 loc) · 4.41 KB

README.md

File metadata and controls

40 lines (23 loc) · 4.41 KB

Abstarct

Nowadays the use of devices such as computers, mobile and many other devices for communication as well as for data storage and transmission has increased. As a result, there is an increase in the number of users. Along with these users, there is also an increase in the number of unauthorized users who are trying to access the data by unfair means. This raises the problem of data security. Images are sent over an insecure transmission channel from different sources, some image data contains secret data, some images itself are highly confidential hence, securing them from any attack is essentially required.

Introduction

Advanced encryption standard (AES) is one of the widely used symmetric encryption algorithms. It is an encryption standard adopted by the US government .Every password manager uses an algorithm for encryption and decryption. The algorithm has to be carefully chosen to satisfy the application needs. AES uses 128 bit block size at once and uses a key of length 128,192 or 256 bits to attain security. Images are sent over an insecure transmission channel from different sources, some image data contains secret data, some images itself are highly confidential hence, securing them from any attack is essentially required. Here, we will be working on encrypting images with the AES algorithm to enhance security over non-secure networks .

System Design

We will implement this project in python, including the frontend. The app will ask for an image that has to be encrypted with the key. Once it's encrypted it can be sent to the client which can be unlocked by them. The image encrypted will have less loss in quality. There are two modules in this paper, i.e., Encryption and Decryption. First, we will look into the AES algorithm for encrypting and decrypting the image:

image

the AES algorithm while encryption, takes the in the plaintext, which in this case will be the byte array of the image that will be encrypted and a key. Following that are the rounds of encryption where there are different functions and the blocks are transformed. A similar process is done in the decryption phase where the cipher text is taken along with the key to perform the decryption process where the functions in the blocks are inverse.

Encryption

First, the image will be received from the user. Now, we can convert the image into a byte array so that we can work on it using AES. Once the user inputs the password, it will be hashed using sha256 to get a digest size of 32 bits and the key length 256 bits. Now, we can use this information for the AES encryption.

image

Decryption

Once encrypted, the output will be generated into a text file. We use this file and use the key which is again hashed using sha256 for obtaining the key size of 256 bits, from the user to perform the AES decryption to get the byte array. Now this byte array is converted back to an image.

image

Resullts and Analysis

image

image

image

image

image

image

Conclusion

After successfully encrypting and decrypting an image using AES algorithm, we learnt and understood how important it is to secure our data especially since we have a lot of online presence these days. The security can be enhanced by using hash functions for the passwords so that it is harder for a hacker to crack and get personal details. AES encryption of images is lossless as we found out from the above metrics that we get the exact same image as the output. Hence, this could be adopted in a lot more applications for enhancing security of data for users.