Image Encryption & Decryption Using AES Algorithm
Image Encryption & Decryption Using AES Algorithm
Dept. of Information
Decryption using
AES Algorithm
Table of
Contents
I Introduction
II AES
IV Code
V Output Screenshots
V Conclusion
I Introduction
3
I AES
AES is based on
Key Points
‘substitution–permutation
network’. It comprises of a
outputs (substitutions)
each.
(permutations). AES is
the key length as follows :
widely used today as it is a
128 bit key – 10 rounds
much stronger than DES
192 bit key – 12 rounds
and triple DES despite
256 bit key – 14 rounds
being harder to implement.
4
I Operation of AES
as a matrix.
The number of rounds in AES is
5
I Encryption
round.
The SubBytes does the substitution and ShiftRows
algorithm.
5
I Decryption
follows :
implemented, although they are very
5
CODE
II Output Screenshots
secret.txt
script.py, secret.txt, secret1.txt, cat.jpg.
cat.jpg
secret.txt
7
II Output Screenshots
After running the following code, the data.txt.enc file is created which contains the
password, ‘cyberforensics’
7
II Output Screenshots
Once we run the script.py file again, the code prompts us for the password.
7
II Output Screenshots
7
II Conclusion
being delivered.
8
Thank you
for listening!