Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Thesis

IMAGE ENCRYPTION USING AES ALGORITHM REPORT

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
09-04-2022
Written in
2021/2022

This report proposes an AES (Advance Encryption Standard) based image encryption algorithm. Due to the rising use of images in a range of fields, it is essential to safeguard sensitive picture data from unauthorized disclosure. With a block size of 128 bits and a key size of 256 bits, the design is iterative. The number of rounds for a 256-bit key is 14. The complexity and security of cryptography algorithms increases as the secret key expands. The image is being used as an input to AES Encryption to generate the encrypted image, and the encrypted image is being used as an input to AES Decryption to produce the original image.

Show more Read less
Institution
Course

Content preview

INTRODUCTION TO CRYPTOGRAPHY

INNOVATIVE CRYPTOGRAPHY PROJECT
IMAGE ENCRYPTION USING AES ALGORITHM REPORT

, CONTENTS



DESCRIPTION PAGE NUMBER
1. EXECUTIVE SUMMARY 3
2. INTRODUCTION TO CRYPTOGRAPHY 4
3. INTRODUCTION TO ADVANCED ENCRYPTION STANDARD (AES) 5-8
ALGORITHM

3.1 What is Encryption
3.2 What is an Encryption Algorithm
3.3 Common Symmetric Encryption Algorithms
3.4 What is AES Algorithm
3.5 Why was AES Developed
3.6 Attacks on AES Encryption

4. INTRODUCTION TO IMAGE ENCRYPTION USING AES ALGORITHM 9 - 14
4.1 What is an Image Encryption
4.2 Importance of Image Encryption
4.3 AES Image Encryption Algorithm
4.4 Advantages and Disadvantages
4.5 The Encryption Process for An Image
4.6 The Result of An Encrypted Image
5. APPLICATION FOR IMAGE ENCRYPTION USING AES ALGORITHM 15 - 16
6. CONCLUSION 17
7. REFERENCES 18




2

, 1. EXECUTIVE SUMMARY




This report proposes an AES (Advance Encryption Standard) based image
encryption algorithm. Due to the rising use of images in a range of fields, it is essential to
safeguard sensitive picture data from unauthorized disclosure. With a block size of 128
bits and a key size of 256 bits, the design is iterative. The number of rounds for a 256-bit
key is 14. The complexity and security of cryptography algorithms increases as the secret
key expands. The image is being used as an input to AES Encryption to generate the
encrypted image, and the encrypted image is being used as an input to AES Decryption
to produce the original image.




3

Written for

Institution
Course

Document information

Uploaded on
April 9, 2022
Number of pages
19
Written in
2021/2022
Type
THESIS
Supervisor(s)
Leena
Year
Unknown

Subjects

$20.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
lenagmb

Get to know the seller

Seller avatar
lenagmb SCET
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
4 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions