
Please use this identifier to cite or link to this item:
http://hdl.handle.net/123456789/4784
Title: | NOVEL DESIGNS OF NONLINEAR COMPONENT FOR BLOCK CIPHERS AND ITS APPLICATIONS IN DIVERSE SECURITY SYSTEMS |
Authors: | Naqvi, Syeda Iram Batool |
Keywords: | Mathematics |
Issue Date: | 2018 |
Publisher: | Quaid-i-Azam University |
Series/Report no.: | Faculy of Natural Sciences; |
Abstract: | ized data through di⁄erent systems, the data incorporate content, advanced pictures and sight and sound data, and so on. Due to the extensive scale use of sight and sound innovation, advanced pictures turn into a critical method for correspondence. It is frequently evident that an expansive piece of this data is either classied or private. Therefore, extraordinary security procedures have been utilized to give the required insurance. With the headways of media and systems advances, an immense number of computerized pictures now transmitted over the Internet and through remote systems for advantageous getting to and sharing. Sight and sound security, as a rule, is given by a technique or an arrangement of strategies used to ensure the interactive media content. These days, we are living in a time where data is the extremely signicant asset to us. Subsequently securing the data turns into all the more important. The correspondence media through which we send information does not give information security, so di⁄erent techniques for securing information are required. Data hiding/stowing away assumes an exceptionally critical part today. It gave techniques to encoding the data with the goal that it winds up muddled for any unintended client. There are three noteworthy data concealing methods to be specic watermarking, cryptography and steganography. Crypt means hidden or secret and graphein means writing. The term has been gotten from Greek dialect. Cryptography is a craft of changing information into a mixed up arrange called ciphertext. The recipient at another side, interprets or unscramble the message into plain content. Cryptography gives information secrecy, information uprightness, validation, and non-denial. Secrecy is constraining access or setting the connement on specic sorts of data. Honesty is keeping up and guaranteeing the exactness of information being conveyed, i.e, the data contains no adjustment, erasure and so forth. Verication guarantees the character of sender and beneciary of the data. Non-disavowal is the capacity to guarantee that the sender or beneciary cant preclude the legitimacy from securing their mark on the sending data that they started. A watermark is a conspicuous picture or example that is inspired onto paper, which gives conrmation of its validness. Watermark shows up as di⁄erent shades of softness/obscurity when seen in transmitted light. Watermarks are regularly observed as security highlights to 1 banknotes, identications, postage stamps and other security papers. Computerized watermarking is an augmentation of this idea in the advanced world. Today there have been such a large amount of information over the web that it has constrained us to utilize systems that can secure responsibility for media. Robbery of computerized data is exceptionally normal, be it pictures, content, sound or video. These can be delivered and circulated e⁄ectively. Along these lines, it turns out to be critical to discover who is the proprietor of the report. Computerized watermarking is a standout amongst other answers for avoid illicit duplicating, altering and redistributing mixed media information. Encryption of sight and sound items keeps an interloper from getting to the substance without a legitimate unscrambling key. Yet, once the information is unscrambled, it can be copied and dispersed illicitly. Copyright insurance, information verication, secretive correspondence and substance ID can be accomplished by advanced watermarking. Computerized watermarking is a system to implant copyright or other data into the fundamental information. The implanted information ought to keep up the nature of the host ag. An advanced watermark is an example of bits embedded into a computerized picture, sound and video record that recognizes the documents copyright data. Watermarking procedures is to give a proof of responsibility for information by inserting copyright articulations into a video or into a computerized picture. Watermarking convey an assortment of procedures how to stow away critical data, in an imperceptible as well as irremovable route, in a picture sound and video information. Watermarking are principle parts of the quick creating region of data covering up. Watermarking is an entirely unexpected method from cryptography. Cryptography just gives security by encryption and unscrambling. Dissimilar to Cryptography, watermarks can ensure content even after they are decoded. Computerized watermarking has gotten signicant consideration as a supplement to cryptography for the security of advanced substance, for example, music, video, and pictures. Cryptography gives a way to secure conveyance of substance to the buyer. True blue shoppers are expressly or certainly given a key to unscramble the substance so as to view or hear it out. Strikingly, steganography receives a substitute methodology disconnected from everything the evidence that even a correspondence is happening. Steganography is changing the photo in a way that selects the sender and the proposed recipient can perceive the message sent through it. It is imperceptible, and in this way, the revelation isnt basic. It is a prevalent technique for sending secret messages than encoded messages or cryptography as it doesnt pull in respect for itself. The information concealed by a watermarking structure is always identied with the propelled question be guaranteed or to its proprietor while steganographic systems basically cover any information. The quality criteria are similarly extraordinary since steganography is generally stressed over the revelation of the covered message while watermarking concerns potential ejection by a privateer. The steganographic exchanges are ordinarily point-to-point (among sender and beneciary) while watermarking techniques are regularly one-to-many. This thesis mainly concern about cryptography, watermarking and steganographic techniques. The construction of di⁄erent techniques in cryptography, watermarking and steganography is always been open task. Theses construction involves various mathematical structures which includes Boolean functions, nite Galois eld and Galois ring. The construction of an important nonlinear component of block cipher namely substitution boxes are based on Boolean functions. The nonlinear component simply provides confusion capability in any information hiding techniques which is a fundamental component while constructing strong block cipher according to the Shannon theory of confusion and di⁄usion. Our main concern here is to pro 2 pose new algorithms for the construction of nonlinear component and utilize these in diverse multimedia applications. The basic cryptographic properties of S-boxes are discussed in chapter 1. The construction of new small S-boxes based watermarking and steganographic schemes were designed in chapters 2, 3 and 4 respectively. The cryptographic algebraic analyses play a vital role in order to test the validity of any component of block cipher specically S-boxes. Moreover, there are several cryptographically strong algebraic analyses were developed in literature. Keeping in view the importance of these analyses, we have also tried to design a novel and innovative cryptographic analyses to check the strength of any S-boxes in chapter 5. The idea of Galois eld is then replaced with Galois ring for the construction of strong S-boxes. The technique of chapter 6 is an innovative in the area of cryptographic algorithms development. The highly nonlinear Boolean functions observed in this construction which break the existing |
URI: | http://hdl.handle.net/123456789/4784 |
Appears in Collections: | Ph.D |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
MATH 1478.pdf | MAT 1478 | 4.92 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.