Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/3459
Title: A study of some problems in cryptography and image processing
Researcher: Murthy, Dasika Sree Rama Chandra
Guide(s): Sastry, V Umakanta
Durga Bhavani, S
Keywords: Computer Science
Cryptography
Image processing
Upload Date: 19-Apr-2012
University: Jawaharlal Nehru Technological University
Completed Date: July, 2010
Abstract: In this thesis, we have 13 chapters. Chapter 1 deals with the introduction. In this, after making some preliminary remarks about the evolution of the areas cryptography and image processing, we have mentioned the basic concepts related to the areas, and presented a survey of the relevant literature. Further, we have introduced some mathematical techniques applied in the thesis, and then mentioned the outlines of the thesis. In chapter 2, we have developed a block cipher with Feistel structure. In this the plaintext is consisting of 256 bits and the key is containing 128 bits. The process of encryption is carried out by using modular arithmetic and interlacing the plaintext at various rounds of the iterative process. The avalanche effect and the cryptanalysis firmly indicate that the cipher is a strong one and it cannot be broken by any cryptanalytic attack. In chapter 3, we have developed a block cipher wherein the plaintext is represented in the form of a pair of square matrices in which each is of size m. In this, the key is also a square matrix of size m and it is used to multiply one of the plaintext matrices on both the sides. Here, we have followed Feistel iterative process in which number of iterations is n (=16). From the avalanche effect and the cryptanalysis, it is concluded that the cipher is a strong one and it cannot be broken by any cryptanalytic attack. In chapter 4, following Feistel, we have developed a symmetric block cipher wherein the XOR operation in the modified Feistel cipher is replaced by + operation. In this, a portion of the plaintext is multiplied on both the sides by a key matrix and mod operation is utilised. The avalanche effect and the cryptanalysis, carried out in this chapter, clearly indicate that the cipher is a potential one.
Pagination: 257p.
URI: http://hdl.handle.net/10603/3459
Appears in Departments:Faculty of Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File125.25 kBAdobe PDFView/Open
02_certificate.pdf107.01 kBAdobe PDFView/Open
03_acknowledgements.pdf106.52 kBAdobe PDFView/Open
04_abstract.pdf109.93 kBAdobe PDFView/Open
05_table of contents.pdf103.38 kBAdobe PDFView/Open
06_list of tables figures & photographs.pdf81.05 kBAdobe PDFView/Open
07_declaration.pdf115.54 kBAdobe PDFView/Open
08_list of research publications.pdf141.82 kBAdobe PDFView/Open
09_chapter 1.pdf173.75 kBAdobe PDFView/Open
10_chapter 2.pdf229.52 kBAdobe PDFView/Open
11_chapter 3.pdf335.4 kBAdobe PDFView/Open
12_chapter 4.pdf321.17 kBAdobe PDFView/Open
13_chapter 5.pdf279.38 kBAdobe PDFView/Open
14_chapter 6.pdf310.41 kBAdobe PDFView/Open
15_chapter 7.pdf314.45 kBAdobe PDFView/Open
16_chapter 8.pdf339.15 kBAdobe PDFView/Open
17_chapter 9.pdf342.27 kBAdobe PDFView/Open
18_chapter 10.pdf240.23 kBAdobe PDFView/Open
19_chapter 11.pdf312.71 kBAdobe PDFView/Open
20_chapter 12.pdf265.96 kBAdobe PDFView/Open
21_chapter 13.pdf141.02 kBAdobe PDFView/Open
22_references.pdf226.3 kBAdobe PDFView/Open
23_appendix.pdf5.36 MBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.