0% found this document useful (0 votes)
36 views23 pages

NIS..PR..7 To 14

Uploaded by

bsjssbjd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views23 pages

NIS..PR..7 To 14

Uploaded by

bsjssbjd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Paaka No,

TItlei- Use 5ttgancgraphy to encode and decode


the message using an toal ide)

Steghde. is aa gheganasxtgh progom tha


15 ableo ide ota in voniouS linds oh
image - and audio- rles The colo -spbe
Sample - quencies ooe not changed thus
naling he embedding sistant againt
hrst - orderstaicctests.
featunes incude the conpst 55i00_ot the
cnbe dded date, encyhan o tthe enbdded
doba ond automabic inteariby chtcleinge sing
checkGUm The eEG
le tormats oe gupnoLed or
Cover hle , here
the Fomat
5heanideusts a gragh -heonebi
anthing abaut gaFh Aheonge to use gheghiàu
Qamagraph.
techoica details The embeddin algomhm

posiions
oixels in the coVer le is cneated bastd
pseudo -rando number generato Gne ot these commands o u ca
-ialiacd ith the possphase Tthe ser oddiliohal Cguments to the embed ,eabzat
dota Ll be embedded in thee piels at and into commonds.
Dosikiens): ot 4hese nosihians those that The oher commaads o not take any
oot need to be changed Lbecause hey abaod nguments.
conbain the csxrect alue b chance Rmbed,embed
Sorted aut gaph - ttheoelic mathi
Thea a Embed secret datain a Cover hle theYeb
algozihm hods pins ot posihons such tthat
exchanging their values has the ee creahag
extract ,--extract
shego ile
embeddìng the cosMeSponding pot ot the Eatrat secrt data rom
Secrete daa, tt the algoithm cannct had sego ile
nto--into
Gt more such pans all exchanges ane a CoNY or
actually pertomed lhe pixels at he file
Qesiions the osiions that ane not po enaunin encinto
Suh a pair ame also modiied o conbain
the embeddtd dota lbut this is done b isplay
modes Ahot caaoe usLd
OVEYLOTiinge them, not by exthanging them erS\90NNer5io0
oitth other oielshe bat hot (mat o Display short vensian intormaioo
Ahe embsdding is done by exchangi
Nalucs implies Anot the pixel
bnst -rdr sbastishics EMbEOOTNG
ou
10 5hould use he embed comnand
Ahe picne ) is not changed , bo audio les Lon to embed Secrete
he algrithn is the datao Cove
sameexcet thot audia The argumets
Ahe embed
Can be ised Loith

CoMMANOS - embedile fideoame


this sechiso the
an listed Ihe hst conmmands or steahide Speity the kle thot col be embtdded (Ae
ongument must ol Ale Ahat conhainS the stemtbe meSsage ) Note
Athot Athesteghide embeds the aiginc sage tho has bsco. embedded oith
i
alego hle message
steghide use the ertract conmand o
Cao

coill be be used coith the command


Specity he cover le that must -s,-- steqohle laname
enbeddota lhe coVer
Hle be
AU,CMO specity the stego ile (the hle thot contuns
ot theolesaiog oxmats embedded d a t a t his cgument is.
Or AV. omi tled ot lename seghide oll oread
is
leaaneis, stehide coill madA le
fonm skandard input
Hle tonm shandond input skego
-t,-extractile lecam
-s,-stegoile hlname
Create a file coith the nome Aleoame.and
comte he dota haE is embedded 'n he
le o it
oill be czeated
XEXAMPLES
The basic usage is
Specitg eAcphon ponameenshis oghian C:\ steghide embid mct pichnipg -e
5ecmete t
Ahat idenihy on enphion alacthm aad Erkrr passpharase
or mocde passphase
embdding secretitt pichoepe done
Compress davel This command coll embed he hle seretetot
Spacihy the commzMisn leveThe comprehina.
lexel can be anyy Dumbr A...9ohex Ater you have cmbidded syour steret data cy
means best comtMia0 Shoon above you can send the le pict jpg
Ao he perso0 ho shold eeye Hae Secrte
AEXTRACT TNG mesbage he niceivr has to Use seghide in
Ci sbeahi de esract ~s pichj9a
Enker passphna5t
Lonote ertrucked dota tostcot tat",
he supolid passphose is cort the
content s o the oiginal le secttxt
Lill be etracted from Athe stego hle

os Obtaised
ot loache
loocen lotal
Poraieal No.8
Install fieaL

bineoall is e o the mot important


Secuihy sotbont for any computer indo
aginst Maloa ne, Malleious 5obsne and
un2anted orogroms rom ntenet an
Fineu\l col moitor he in coming
ond otaoing connechons indos XP
acludes iest built in i a l l or \indo
OS,iados
and con quse he setiags

) St up sytem and seuny stiags


O from Athe sbart menu , click Conba Pane
Athen click Gyakem and Suaty
QUader indos fineallselect either Che
nuaatt lakus Ao dakey mine chether he
tunned Allo
oa pogrm thnogh indoss Riesoall Ao
alla a blacked osaoram thmough Hhe
Roall
Selet oga featues
he lett side menw excephions or addi ional servises

(oivake) oublic nehoork )Choose Stunb sting


Click Ok to Sav yor change The hkball aukomaticaly blocks accesa to
your computer om ouside aoplicaio hs.
s) Choose iall seltings o ditkat nch asks uou Cihat da do Ether click Alla
locathian hypes Access and folloc) thesbeps belos or bloc
access and click Cancel
Aocaion ou use - Home
Pubic 2) Manualliy allad programa throgh aall
" Click lhat oe nehook ocahions for ougla the
intormakian on nehor pes , open he Control Pane rom the
"Domain nekoork locchions ane ontralled by Gtat meou
yor nehaork admiaistnator aad cant be Slect Sytem nd Secutthen select
changed indos Firevoall
Clik Allo) a rogrom
apalicshion nehook locaions hyoe Cin imoge indos hineuoall
belou both locaions ane selec ke ) the Loindod.
Hhe
Select Nasty me coheo indows fintoal) blats
gm tor each nehok typeit the Alaed groms Laindo.
3Selet he aram. Featune and cohehe
box is nt alyead checked
Cick Ok to save youn changes
Coivate)ublic yox both tor all ratoork
Ciiek Qk to sove yourchonges
Girkuall sethngs 3) Creake omleo enoble services.
Afker i a l coaiauralionthe advanced scings
icsk uchions oide intamalion obout saiag OClek Aduanced soing
OSJect Iabound Rules in he
Select New Rde so the igat side ot the
coindoco
GSeect Por in he WeTabound Acle
Speahy uename
Give this ule Lsee image belo
wizand ond then cick Net an
example)

4) Lnable loagin to wies deaied incomin


caill apol to) Connecions
pot OClick AdoceA
Adwanced Seting on Ahe lelt-hand
numbeY Bo) pot nunbens 0,)
nunbero Sooo 5olo
)heo Paoperties
icl the Pbush
click Net Pokle tob
GCick the Customize tab net o Logging
Customize \ogging scttings
O Slect Aloo he connecions and clk Net
pockeks honge o Yes
S. Cick Ok yclick Apoond ick OK
OSelect coheo Ahis mule anis based oo
gar pokles,
"To leaxo mone about poiles click lian
mare abaut roiles locate o o r Chek Check fioduoull skabhs undtr ndos ineoa
5elect all o thepmoelDomain, Poivate Morks Obtained

rom this pont to alloJ acce thooug


mater cohick ConnecJioo
sing 33
folloroin ar the steps haken PGP o
Titlei- PGe Email Secumy Create secne e-ail ot he sender site
Ihe ermail essage is hoshed b using a
hashing tunchon to ceate a digest
Porcthy Geod Privary Pap) ahidl The igcst is then enroted to to
is invented by hil Zimmer Mann. signed dgest b using the sender's mivau
YG cas doigntd to proidecll four keand then Sigaeddigest is addedto
the oigALnal email messag
aac oon-epuciahoo in the senci ng ot emuil. he orgina message and signed digcat are
digtal signatue La combinalioo
ot hashing and publkc keg encgphion)to Creeted b Hhe sender
ookide inbeqpitouthenicaion and he sexret ke is
necerNer5
encged bg usiny
roxideivacyThoeONe
Both th encngted seoet key and the
that encyoed combiaoian o me ssage and diget
he digial signotune uses one hash unchion, set Angether
one secek key ond t o pivte -public kt
pans * PGe at the Sender 5ite (A)
open Source and rtcy aailable
Sothore pokage for emal secuiy Gmail pl one/Tme
poides autheaticakion hoough the is c mail Signed diqpt
Digitad Signahr Em)
pooides conhdeakially thnough the
symmebic block cocgphiun.
algoothm ond EMATL Compah bi\ sin Digat
Signed
Dt \key
Ahe acdix - 64 encodin Schemne
Eooytdstt
Meto
ove Hhe scps lken to show
Combinahon oh
PaR uses hahing gnd a
Ne he Combinahon A's uble

Cocsaked sct key and messaae digest


is eceived
he eocoted seet keyis deoeked b
Diit
The secxet key is then ustd to decyt
Cambinaien at mesage and digeit
The diait is doyated b sing sad
b urin a hash hunion to ceate a

meenS Atnat all the aspects ot

* GP at the Receivex site (B)


Eacngaked
O

Morks Obkcuead
learhe

Eosyohed elak
3) )Select *
others)
bers Click
sbahian uncion
Sdect
Signahu/PxI Demsnstrakion
hash the SignaheCrsabian
Digial
Signah Sigaahi
Sigaat Canmustbeneed hos deayshosthe
dny Sighatus A
Bigit
ocumerto that digibad
enerate we be to sending
bom
in ond need undrsandper digtal secder
step
click tor the
sianaho) Pauclica No.d0
key menu
to ah
by aherte med epuciahon
decuneat s
qenerate cital sigraht
nerate
slepime
p and
Ok ot geocrated betore all i
deahtyadded
Choose
ToigitaCoy
nah sigoahs the ,onl5enderhe
a to
ithask sepsa gl
MO5or Demonsaiaa digital a
Click value hedacumeat
can
in that.sigaahe sendeyCannot
uaing als

) to) 9) s) ) 6) s) 4)
reation
dcick
mocess huncion too
Sdect
EakirWe|seletSelect
5igning ClickClick Cick cicls And Click
Click 2^15Enktr
dialog
verhcahon
cick PTN name
tirst
Smith
Nome \o
the Generabe Comouter PoroideStore rge
the the Stoe Encot as
oth pimee
PIcita
Signahne
N Digtdocuent Create apor \50
signahr key
codez sigoatune hash hash
cerbicate nubrs as
signahne
igital Cerikcate limit,
btton.
to the
hom capal
vadue vadue
Signakeme Andlo)Y
the document buton mathehahicaand a
ond cick
the liit
ianahe creaked
just
sign PsE
sigh Enter Gentrake
and
Tiele Wte a moaran to implene nt Rail tence
echoique
Giveo a olaio-kert messag aad o Auneric
key ,cipherde-ciphir Ahe giveo est
usin ail Fence algothm
The mail fence cioher lalso called azigzag
cipher is a farm of tanspoaihian cinhtr
H derive its nome Som the coay in which
it is eococled

Encrtion
Arnsposiion
a cpher, the order ot
he alohabeks is me-amranged to obtain
he cipher -tet
In the ral tence cipher he nlain -ent is
cartleo doronands ond Aiagona 5ucces
-ive mails ot an imaginNY fence
"heo (ue cach hne bottom nailwe touese
Lupaands moving diagonaly atter viachin
Ahe Aop_ mil,the dinecion is changed agaia
Th the alphabes ot the meSSase ane
coriteo
Ater each alnhabet nas been cortteothe
indiida roL0s ane combined to obhn he
cipher -text
1

bor exonple he esoge isGreksorGelks


Drepamed henciptr

Hswee 5ee0 eo earliRr


ear\ierhe nunber ot colu
omei
mcul feace cinherc Ôemios equc to he
length o olaio-text mesage
rails
Hence il malix can be consructed
accOrcingy. Oncewe've got he matix
can hgumeout spoxts cohre texts
shold be ploac ed lusinge he 5ame
moving diagonall up ond doan alber nativaly
Thea
Aterling t e toaAYSe the matix
nzgZag anager to obban the orlginal
Encgpion
opt seeksforaecks
Ket
GsGsckek eoe
Decrion
lKey =3
-GsGsekfrek
row-1
else
din-don
dido =oot
clirdon
tenlLed): range in Fari
=0,0 mow,col
didon
toal
se =
t)) range or
in ih-LTIn
Ctezte fnce Raiencyot
l de
message a
Eocnlian Cipher ence Rail 4+
range (len(text)):
tor j in milJC;!=ln' or i in rangelkey
meslt append
For j in range (tenlcighe)
ehusa join (resul) (index < ten lcinhe):
rcil C]1)-cioke, Linde
det decyt Rail fence lcipher , ey index +=

range ltenlcipher)
for
for iin range (tenlcinher)
dirdon = None
roco =0,0
dirdon lrue
tenleighe)): dirdosn = alse
dirdon= True
key -i: rstappend (rol rolco)

didosan

Rlse!
di~ doon

Andex 0
mame
ainklentRailfence(" oltack at one
pitlenot Pailfence Cdeleadthteatials)
3))
Osäntldec Roi eneCate tockaka ne
3))
Pracical No. 12
TRtle Coeate and ety Hashcode

Hashin is a method ot coyotograph tht


Converks any torm ot doka into
hashed,no mater its size or tyeIn
adiional hashin gondleas ot he data's
Size,tpe or lenathhe hash that
dota aoduce) is alayh the same
hash i5 deigned to act as a lengthA
yu can hut data into a hoshingone-ay
alaonthn
ntu

a nehash, u conna deiphtr the


Anput cdata it
ot dota coill alsoays
produce hL 5ame hash
Hash unchons cne
appto in admost all inintgaisn stcunity
appicaions. Papular boshing tunions ane MOE
A hosh nlion ib a mathtanahcad huechion.
that convertso nunmnerico innut into anstho
Compmehid numerice value lhe inot
Ao the harh urchion is at orbitroy leogth

Nalues tned by a hosh hunch'an ar


called mage digesty sinply hash valucs
Mhe follooing picoe illustrotd hash
uncho
IMessage Mlabitray ntel
In Cyp Tel
Lnut- NETWOR TNCORMATION SECURLIY

B0 49 60 ID 3 90 D3 cc BS 98 9£ c3 1¬ C3.
Outnut -
FB_63 18 4q 32, 82 C1 É3 EA fK 04 38
8o
412E 28 0S F3

Anqut
impet jata math Bigsntgn, Standaxdchansta:
imasntjta nis hostt
MessagpDiget,
Aeiby NoSuchAlgorihmExeptin
to calulat SHA hash alu

pultie tatr rgt getstA (Shing inut


thHsus NouchAgorithmEx<ephian
qtThstaCe methad
tatiLwithmethae called is calud
with

shahing SHA
= Melsase Diest qtánstancaDi
MesagL Diqeat ma qetnatanee ('SHA-2s62
qeat.
classMate
Date
Age
dasSate
digest ( methad called
Calaulate mesicge digut ay on iout Gubfor Geie" sLt
Auemut uintlnl"ln"
utunn md digit Cint qit uytea (Standa
ChandetuTE_8));
Stirg S2 -
Atati Jting toteshig Cbyt. hask)
-at
Rnto siqum int
adgoathna mae diqut
BigTntzth
catth (NoSuch
Canvent
Shingbildei hesShing
bsaat diaut inte heeaduu Ayattm Alut qartpHintlnl"
hmfxxephitExuptin
n e)i thrsurn.
lgad with adng zeh9.
thil Chnhig1engh () <32)
Output:
heaShiginnt Ca, la)
Hashcod Genanakd SHA-2S or
Jitun
hanShing to Shing (O,
Gekaforek l2e47650S aabsz46 c02all dfo3
Divê, code helo woxlck: bg4 d27b9s2h d3e08as2didatdalsakeue hx
puttie Atatic Void mdus
Mart obtajned Sat siqnat a
Prauct Totul Teachun
Related(3s) Rdaed(s) (S)
Pradkca No.3
Rkle -Tnplement Caeso cipher algoibhn using

Caesor cipheralso krkao as


cieherCaesa code ox Caesor Sh:lt is
o the simplest and most coidey
nonencyphoo techaiaue, Jo this techaiq
the cinher deters ane aeneraked by shik
plaintext dettrs by the saml dishance
Julius Caesor oas the Qersoo oheist
roposed hemethoHe used a shi
3So the plaintext teers PTi is coaerte
into cinhertezt Aetter CCT) such

to this method for exanple cotth shi


A ald be replaced by 0 old be
geplaced b E and
chort o he caeso cipher
cinher is given belo
Plointk ABc DEEa HI T k LmNoPaRSTUNUXvZ

he apnabets in the olainkent can be shte


posihans
bor example to encynt the coondas5100nd
ig 5
on Meaulaar than click on Synmehic
SOYVZaUGlNfRPSXwHU opened
Coesorot13 Loindo
han sa key ent as
15)Eaer the \alue that geNumbervalue
Adsonbages
) i s eosy to implement escogetiag
eatered cshile
2)Ciahex is qute simgle CAick

Disaduonkagea
)Bzute Faxce Cyatonaynis
eias Saray bagul
2)The algoitm ls haing ang 25
possible

K Sbeps to imglement Cacsor cigher


)ciick on stot and Ooen Caytool
3) Click hle ob on Menubor and select Ne
opened tet box
4) Click Encyat Decrt Menubo
s) Click Sgmmetic CCtassit opion thon cick
on Coe,orRot -13.
6) AHe dicking a odos ciI be ope ned these
Kay eat as Number value tMorksObtalned
8)Thon oe the number to shi leache
1hon click on EncratAlter thot eacyoked
messge coill be displayd thee ot oindo Polated Related
becrgot a menagL click on Eooya
message
Tile -Tmglement Simple Colummax trasposihioa ComeUTER
Iechnique using Cpol

The sbshhisn Aechoique) focus


plain test cahabct cith a Cighex text 2
alphabetlhonsQosihen echaiques diler oon Columas 6
5ubsthhhon tchaique, in he S
do not simpl meplace One alohebet cith
OnstherThey also pertom 5ome permutaliso
ONer the plain ert alnhabets. branmposi tion
Cioher halds thee plain tezk messug by Now decide the order ot columas mandom)
the order ot
without alig Athe oxign \eters in the onder oh these Columns

* 5imple Columnar Trons pasihion The cinher text ls G5TO0RPRmAopCESIU


The sinple columaasr Atsnspo sihian echniques
Oorranges he plao text 5equence o * Steps Ao imlemest Simple Columaa
os ok ied tenth ond that Tronspo sikon using Cnntoo
Caluma b columo raadomty click start ond Open Cayatoal
incudes the follouaing steps. Clic Cile tab on Menubar ond select e
a) Wite the plain text message mo Mtssage in opened tetbox
ntckangle ot a pozdeined
b) Read the ) Cick Encyot Decryot
messaga colwmo
need not be in the onder ot
cam nd t
columos 3) Chck on 5xnmeic (Clanic) apian.
but it can be at click Pemutaliss [Taonsposi hiso anthatt
The messagethus obboined is Ahe cinher tet menuit
6) AFler cliclis acotado coill bg
Permutaion csimple columo rans
-Dosiion ia ke)sethe colwmn value
Coma eg-4 olumns -,2,4
3) Click_on Encyt,Aer clickiag aa pap -up
coindo w oilbe ope ned
hen click Display Cipertext Enoyked
mesaa ll be clianlaged there
1o)To Decrot the meage clich on
or
menubar
)Cick opion then
click Permutaion /Tons Qosi hion oa tht
meulist
a) Alhe oinda ogened ia Vermuatiensimale
columa Anansnusibea in key) set Hhe coluboa
yalue while eACyohg
Sepanabed Comma en-hcolwmns -l,3,24
13) Aek Ayning the columa values click on
Decynt
) lick on Displa Ciphertest
will be cinlged ot pep=
19) Decoked
Saneg baqul
Manks Obhained
eache
Dooduct \otl
Poroces
Polated Qelated

You might also like