Sign In to Follow Application
View All Documents & Correspondence

System For Cloud Based Cryptography And Stereography And Method Thereof

Abstract: SYSTEM FOR CLOUD-BASED CRYPTOGRAPHY AND STEREOGRAPHY AND METHOD THEREOF ABSTRACT A system (100) for cloud-based digital cryptography and stereography, comprising: a sending device (102) to be used by a user for generating a plain text to be encrypted; a cloud server (106) comprises characterized in that; a first processing unit (108), configured to: receive the generated plain text from the sending device (102); encrypt the plain text by using cryptographic techniques to generate a cipher text for the corresponding plain text; and transmit the generated cipher text and a corresponding first secret key to a second processing unit (110); the second processing unit (110) configured to: receive the cipher text from the first processing unit (108); decrypt the cipher text using the cryptographic techniques to generate the plain text for the corresponding cipher text; and transmit the generated plain text to a receiving device (104). Claims: 10, Figures: 6 Figure 1 is selected.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
30 September 2022
Publication Number
41/2022
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
patent.ipo@verispire.net
Parent Application

Applicants

SR University
SR University, Ananthasagar, Warangal, Telangana-506371, India (IN)

Inventors

1. Dr. Pappula
SR University, Ananthasagar, Warangal, Telangana-506371, India (IN)
2. Dr. Pappula Praveen
SR University, Ananthasagar, Warangal, Telangana-506371, India (IN)
3. Dr. T. Sampathkumar
SR University, Ananthasagar, Warangal, Telangana-506371, India (IN)

Specification

Description:BACKGROUND
Field of the invention
[001] Embodiments of the present invention generally relate to a system for cryptography and stereography and particularly to a system for cloud-based digital cryptography and stereography and a method thereof.
Description of Related Art
[002] Vocal and verbal communication is the only skill that makes a human different from any other living specie. With passing time as the world went from analog to digital, communication increased manifold connecting about every second person on planet earth. Additionally, for successful digital communication to take place, three basic traits should be preserved in act of communication. The three basic traits are confidentiality, integrity, and availability, commonly known as the CIA triad. Confidentially means transmitting the message to the intended receiver, without exposing the message to any other authority. Integrity means that the message dispatched from the sender end must be received by the intended receiver without any modification. Availability means that the message can be viewed by the receiver as and when required, further the receiver holds the right to delete the received message as and when required. For successful and integral transmission of the message, the CIA triad must be preserved, and if any trait of the CIA triad is dissolved, then the message is considered infected. Additionally, checking infection on the message is not an easy task as the intruder encapsulates the infected message so that it can replicate the intended and genuine message.
[003] Moreover, there are several protocols to preserve the CIA triad, and the most commonly used practices are cryptography and stereography. Cryptography is the art of manipulating data in human unreadable form. In most cases, cryptography is the widely used technique to transmit data all over the internet. Whereas stereography is a method of concealing one type of data into another one, to make the original data unrecognizable for humans. However, carrying out these processes on a local system is not feasible as different local computers vary in their configuration and computational power.
[004] There is thus a need for a system for cloud-based digital cryptography and stereography that can overcome the shortcomings faced by the traditional systems in a more efficient manner.
SUMMARY
[005] Embodiments in accordance with the present invention provide a system for cloud-based digital cryptography and stereography. The system includes a sending device to be used by a user for generating a plain text to be encrypted. The system further includes a cloud server communicatively connected to the sending device. The cloud server includes a first processing unit. The first processing unit is configured to receive the generated plain text from the sending device; encrypt the plain text by using cryptographic techniques to generate a cipher text for the corresponding plain text; and transmit the generated cipher text and a corresponding first secret key to a second processing unit. The cloud server further includes the second processing unit. The second processing unit is configured to receive the cipher text from the first processing unit; decrypt the cipher text using the cryptographic techniques to generate the plain text for the corresponding cipher text; and transmit the generated plain text to a receiving device.
[006] Embodiments in accordance with the present invention further provide a method for cloud-based digital cryptography and stereography. The method comprising steps of: receiving a generated plain text from a sending device; encrypting the plain text by using cryptographic techniques to generate a cipher text for the corresponding plain text; transmitting the generated cipher text and a corresponding first secret key to a second processing unit; receiving the cipher text from the first processing unit; decrypting the cipher text using the cryptographic techniques to generate the plain text for the corresponding cipher text; and transmitting the generated plain text to a receiving device.
[007] Embodiments of the present invention may provide a number of advantages depending on their particular configuration. First, embodiments of the present application provide a system for cloud-based digital cryptography and stereography.
[008] Next, embodiments of the present application may provide a system for cloud-based digital cryptography and stereography that protects data and messages from unintended authorities.
[009] Next, embodiments of the present application may provide a system for cloud-based digital cryptography and stereography that provides security to data and messages.
[0010] Next, embodiments of the present application may provide a system for cloud-based digital cryptography and stereography that allows intended recipients to receive and read shared data and messages.
[0011] Next, embodiments of the present application may provide a system for cloud-based digital cryptography and stereography that can be implemented on any system configuration in any environment.
[0012] Next, embodiments of the present application may provide a system for cloud-based digital cryptography and stereography that is safe and secure.
[0013] These and other advantages will be apparent from the present application of the embodiments described herein.
[0014] The preceding is a simplified summary to provide an understanding of some embodiments of the present invention. This summary is neither an extensive nor exhaustive overview of the present invention and its various embodiments. The summary presents selected concepts of the embodiments of the present invention in a simplified form as an introduction to the more detailed description presented below. As will be appreciated, other embodiments of the present invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
BRIEF DESCRIPTION OF THE DRAWINGS
[0015] The above and still further features and advantages of embodiments of the present invention will become apparent upon consideration of the following detailed description of embodiments thereof, especially when taken in conjunction with the accompanying drawings, and wherein:
[0016] FIG. 1 illustrates a block diagram depicting a system for cloud-based digital cryptography and stereography, according to an embodiment of the present invention;
[0017] FIG. 2 illustrates a first processing unit of the system for cloud-based digital cryptography and stereography, according to an embodiment of the present invention;
[0018] FIG. 3 illustrates a second processing unit of the system for cloud-based digital cryptography and stereography, according to an embodiment of the present invention;
[0019] FIG. 4 illustrates a comparative study graph, according to an embodiment of the present invention;
[0020] FIG. 5 depicts a flowchart of a method for cloud-based digital cryptography, according to an embodiment of the present invention; and
[0021] FIG. 6 depicts a flowchart of a method for cloud-based digital stereography, according to an embodiment of the present invention.
[0022] The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word "may" is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including but not limited to. To facilitate understanding, like reference numerals have been used, where possible, to designate like elements common to the figures. Optional portions of the figures may be illustrated using dashed or dotted lines, unless the context of usage indicates otherwise.
DETAILED DESCRIPTION
[0023] The following description includes the preferred best mode of one embodiment of the present invention. It will be clear from this description of the invention that the invention is not limited to these illustrated embodiments but that the invention also includes a variety of modifications and embodiments thereto. Therefore, the present description should be seen as illustrative and not limiting. While the invention is susceptible to various modifications and alternative constructions, it should be understood, that there is no intention to limit the invention to the specific form disclosed, but, on the contrary, the invention is to cover all modifications, alternative constructions, and equivalents falling within the scope of the invention as defined in the claims.
[0024] In any embodiment described herein, the open-ended terms "comprising", "comprises”, and the like (which are synonymous with "including", "having” and "characterized by") may be replaced by the respective partially closed phrases "consisting essentially of", “consists essentially of", and the like or the respective closed phrases "consisting of", "consists of”, the like.
[0025] As used herein, the singular forms “a”, “an”, and “the” designate both the singular and the plural, unless expressly stated to designate the singular only.
[0026] FIG. 1 illustrates a block diagram depicting a system 100 (hereinafter referred to as the system 100) for cloud-based digital cryptography and stereography, according to an embodiment of the present invention. In an embodiment of the present invention, the system 100 may receive a plain text which may further be encrypted to a cipher text using cryptographic techniques. The system 100 may further be configured to decrypt the cipher text to the plain text for intended user/system reading, in an embodiment of the present invention. In an embodiment of the present invention, the system 100 may further generate and transmit a first secret key for a successful and accurate decryption of the cipher text to the plain text.
[0027] Further, the system 100 may be configured to receive a secret message and a cover image which may further be encrypted to a stenography image using stenography techniques. The system 100 may further be configured to decrypt the stenography image to the secret message for intended user/system reading, in an embodiment of the present invention. In an embodiment of the present invention, the system 100 may further generate and transmit a second secret key for a successful and accurate decryption of the stenography image to the secret message. The system 100 may be implemented in a remote location, in an embodiment of the present invention.
[0028] According to an embodiment of the present invention, the system 100 may comprise a sending device 102, a receiving device 104, and a cloud server 106. The cloud server 106 may further comprise a first processing unit 108 and a second processing unit 110. The sending device 102, the receiving device 104, and the cloud server 106 may be connected using a communication network 112.
[0029] In an embodiment of the present invention, the sending device 102 may be a device used by a user for generating the plain text. The plain text generated by the user on the sending device 102 may be encrypted to the cipher text by the system 100, in an embodiment of the present invention. According to embodiments of the present invention, the plain text generated by the user on the sending device 102 may be, but not limited to, a binary character string, an alphabetical character string, a numerical character string, a special character string, an image file, a video file, an audio file, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the plain text generated by the user on the sending device 102, including known, related art, and/or later developed technologies.
[0030] In another embodiment of the present invention, the sending device 102 may be the device used by the user for generating the secret message and the cover image. The secret message generated by the user on the sending device 102 may be encrypted with the cover image by the system 100 to generate the stenography image, in an embodiment of the present invention. According to embodiments of the present invention, the secret message and the cover image generated by the user on the sending device 102 may be, but not limited to, the binary character string, the alphabetical character string, the numerical character string, the special character string, the image file, the video file, the audio file, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the secret message and the cover image generated by the user on the sending device 102, including known, related art, and/or later developed technologies.
[0031] The sending device 102 may be, but not limited to, a personal computer, a consumer device, and alike. Embodiments of the present invention are intended to include or otherwise cover any type of the sending device 102 including known, related art, and/or later developed technologies. In an embodiment of the present invention, the personal computer may be, but not limited to, a desktop, a server, a laptop, and alike. Embodiments of the present invention are intended to include or otherwise cover any type of the personal computer including known, related art, and/or later developed technologies.
[0032] Further, in an embodiment of the present invention, the consumer device may be, but not limited to, a tablet, a mobile phone, a notebook, a netbook, a smartphone, a wearable device, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the consumer device including known, related art, and/or later developed technologies. Embodiments of the present invention are intended to include or otherwise cover any type of the consumer device including known, related art, and/or later developed technologies.
[0033] In an embodiment of the present invention, the receiving device 104 may be the device used by the user for receiving the plain text. The plain text received by the user on the receiving device 104 may be decrypted by the system 100, in an embodiment of the present invention. According to embodiments of the present invention, the plain text received by the user on the receiving device 104 may be, but not limited to, the binary character string, the alphabetical character string, the numerical character string, the special character string, the image file, the video file, the audio file, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the plain text received by the user on the receiving device 104, including known, related art, and/or later developed technologies.
[0034] In another embodiment of the present invention, the receiving device 104 may be the device used by the user for receiving the secret message. The secret message received by the user on the receiving device 104 may be decrypted from the stenography image by the system 100, in an embodiment of the present invention. According to embodiments of the present invention, the secret message received by the user on the receiving device 104 may be, but not limited to, the binary character string, the alphabetical character string, the numerical character string, the special character string, the image file, the video file, the audio file, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the secret message received by the user on the receiving device 104, including known, related art, and/or later developed technologies.
[0035] The receiving device 104 may be, but not limited to, the personal computer, the consumer device, and alike. Embodiments of the present invention are intended to include or otherwise cover any type of the receiving device 104 including known, related art, and/or later developed technologies. In an embodiment of the present invention, the personal computer may be, but not limited to, the desktop, the server, the laptop, and alike. Embodiments of the present invention are intended to include or otherwise cover any type of the personal computer including known, related art, and/or later developed technologies.
[0036] Further, in an embodiment of the present invention, the consumer device may be, but not limited to, the tablet, the mobile phone, the notebook, the netbook, the smartphone, the wearable device, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the consumer device including known, related art, and/or later developed technologies. Embodiments of the present invention are intended to include or otherwise cover any type of the consumer device including known, related art, and/or later developed technologies.
[0037] In an embodiment of the present invention, the cloud server 106 may be communicatively connected to the sending device 102. The cloud server 106 may further be communicatively connected to the receiving device 104, in an embodiment of the present invention. In an embodiment of the present invention, the system 100 may be implemented onto the cloud server 106. The cloud server 106 may have a predefined structure and architecture, in an embodiment of the present invention. According to embodiments of the present invention, the predefined structure and architecture of the cloud server 106 may be, but not limited to, a Software as a Service (SaaS) architecture, a Platform as a Service (PaaS) architecture, or an Infrastructure as a Service (IaaS). Embodiments of the present invention are intended to include or otherwise cover any structure and architecture of the cloud server 106, including known, related art, and/or later developed technologies.
[0038] In an embodiment of the present invention, the cloud server 106 may be remotely located. In an exemplary embodiment of the present invention, the cloud server 106 may be a public cloud server. In another exemplary embodiment of the present invention, the cloud server 106 may be a private cloud server. In yet another embodiment of the present invention, the cloud server 106 may be a dedicated cloud server. According to embodiments of the present invention, the cloud server 106 may be, but not limited to, a Microsoft Azure cloud server, an Amazon AWS cloud server, a Google Compute Engine (GEC) cloud server, an Amazon Elastic Compute Cloud (EC2) cloud server, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the cloud server 106 including known, related art, and/or later developed technologies.
[0039] In an embodiment of the present invention, the first processing unit 108 may be installed in the cloud server 106. The first processing unit 108 may further be configured to encrypt the plain text. The first processing unit 108 may be configured to execute computer-executable instructions stored in a memory unit (not shown) to generate an output relating to the system 100. The computer-executable instructions stored in the memory unit may be cryptographic algorithms for encrypting the plain text. According to embodiments of the present invention, the cryptographic algorithms may be, but not limited to, a Data Encryption Standard (DES) algorithm, a Triple Data Encryption Standard (3DES) algorithm, an Advanced Encryption Standard (AES) algorithm, a Blowfish algorithm, and so forth. Embodiments of the present invention are intended to include or otherwise cover any cryptographic algorithms stored in the memory unit, including known, related art, and/or later developed technologies. According to embodiments of the present invention, the first processing unit 108 may be, but not limited to, a Programmable Logic Control (PLC) unit, a microprocessor, a development board, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the first processing unit 108 including known, related art, and/or later developed technologies. In an embodiment of the present invention, components of the first processing unit 108 may be explained in conjunction with FIG. 2.
[0040] According to embodiments of the present invention, the memory unit may be, but not limited to, a Random-Access Memory (RAM), a Static Random-Access Memory (SRAM), a Dynamic Random-Access Memory (DRAM), a Read-Only Memory (ROM), an Erasable Programmable Read-only Memory (EPROM), an Electrically Erasable Programmable Read-only Memory (EEPROM), a NAND Flash, a Secure Digital (SD) memory, a cache memory, a Hard Disk Drive (HDD), a Solid-State Drive (SSD), and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the memory unit, including known, related art, and/or later developed technologies.
[0041] In an embodiment of the present invention, the second processing unit 110 may be installed in the cloud server 106. The second processing unit 110 may further be configured to decrypt the cipher text. The second processing unit 110 may be configured to execute computer-executable instructions stored in the memory unit (not shown) to generate an output relating to the system 100. The computer-executable instructions stored in the memory unit may be the cryptographic algorithms for decrypting the cipher text. According to embodiments of the present invention, the cryptographic algorithms may be, but not limited to, the Data Encryption Standard (DES) algorithm, the Triple Data Encryption Standard (3DES) algorithm, the Advanced Encryption Standard (AES) algorithm, the Blowfish algorithm, and so forth. Embodiments of the present invention are intended to include or otherwise cover any cryptographic algorithms stored in the memory unit, including known, related art, and/or later developed technologies. According to embodiments of the present invention, the second processing unit 110 may be, but not limited to, a Programmable Logic Control (PLC) unit, a microprocessor, a development board, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the second processing unit 110 including known, related art, and/or later developed technologies. In an embodiment of the present invention, components of the second processing unit 110 may be explained in conjunction with FIG. 3.
[0042] In an embodiment of the present invention, the sending device 102, receiving device 104, and the cloud server 106 may be configured to communicate with each other by communication mediums (not shown) connected to the communication network 112. The communication mediums may be for example, but not limited to, a coaxial cable, a copper wire, a fiber optic, a wireless medium, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the communication mediums, including known, related art, and/or later developed technologies. Embodiments of the present invention are intended to include or otherwise cover any type of the communication network 112, including known, related art, and/or later developed technologies.
[0043] According to an embodiment of the present invention, the communication network 112 may be a data network such as, but not limited to, the Internet, a Local Area Network (LAN), a Wide Area Network (WAN), a Metropolitan Area Network (MAN), and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the data network, including known, related art, and/or later developed technologies. In another embodiment of the present invention, the communication network 112 may be a wireless network, such as, but not limited to, a cellular network, and may employ various technologies including an Enhanced Data Rates for Global Evolution (EDGE), a General Packet Radio Service (GPRS), and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the wireless network, including known, related art, and/or later developed technologies.
[0044] FIG. 2 illustrates the first processing unit 108 of the system 100, according to an embodiment of the present invention. The first processing unit 108 may comprise programming instructions in form of programming modules such as a first data receiving module 200, a data encryption module 202, and a first data transmitting module 204.
[0045] In an embodiment of the present invention, the first data receiving module 200 may be configured to receive the generated plain text from the sending device 102. The first data receiving module 200 may further be configured to receive the generated secret message and the cover image from the sending device 102, in an embodiment of the present invention. In an embodiment of the present invention, the first data receiving module 200 may further be configured to transmit the received plain text or the secret message and the cover image to the data encryption module 202.
[0046] In an embodiment of the present invention, the data encryption module 202 may be configured to encrypt the received plain text to generate the cipher text for the corresponding plain text. The cipher text for the corresponding plain text may be generated by using cryptographic techniques, in an embodiment of the present invention. According to embodiments of the present invention, the cryptographic techniques may be in form of cryptographic algorithms such as, but not limited to, the Data Encryption Standard (DES) algorithm, the Triple Data Encryption Standard (3DES) algorithm, the Advanced Encryption Standard (AES) algorithm, the Blowfish algorithm, and so forth. Embodiments of the present invention are intended to include or otherwise cover any cryptographic algorithms for generating the cipher text for the corresponding plain text, including known, related art, and/or later developed technologies.
[0047] In an embodiment of the present invention, the data encryption module 202 may further generate the first secret key corresponding to the cipher text generated. The first secret key may be configured for providing an identity for decryption of the cipher text, and authorizing a transaction for ensuring that the cipher text is being decrypted to the plain text by the intended receiving device 104 only, in an embodiment of the present invention. According to embodiments of the present invention, the first secret key may be, but not limited to, a receiver public key, a receiver private key, or a shared secret key. Embodiments of the present invention are intended to include or otherwise cover any first secret key for decrypting the cipher text to the corresponding plain text, including known, related art, and/or later developed technologies. In an embodiment of the present invention, the data encryption module 202 may further transmit the generated cipher text and the first secret key corresponding to the generated cipher text to the first data transmitting module 204.
[0048] In another embodiment of the present invention, the data encryption module 202 may further be configured to encrypt the received secret message and the cover image to generate the stenography image for the corresponding secret message. The stenography image for the corresponding secret message may be generated by using stenography techniques, in an embodiment of the present invention. According to embodiments of the present invention, the stenography techniques may be, but not limited to, a binary file technique, a text technique, an image hiding technique, and so forth. Embodiments of the present invention are intended to include or otherwise cover any stenography techniques for generating the stenography image for the corresponding secret message and the cover image, including known, related art, and/or later developed technologies.
[0049] In an embodiment of the present invention, the data encryption module 202 may further generate the second secret key corresponding to the stenography image generated. The second secret key may be configured to provide the identity for decryption of the stenography image, and authorizing the transaction for ensuring that the stenography image is being decrypted to the secret message by the intended receiving device 104 only, in an embodiment of the present invention. According to embodiments of the present invention, the second secret key may be, but not limited to, the receiver public key, the receiver private key, or the shared secret key. Embodiments of the present invention are intended to include or otherwise cover any second secret key for decrypting the stenography image to the corresponding secret message, including known, related art, and/or later developed technologies. In an embodiment of the present invention, the data encryption module 202 may further transmit the generated stenography image and the second secret key corresponding to the generated stenography image to the first data transmitting module 204.
[0050] In an embodiment of the present invention, the first data transmitting module 204 may be configured to transmit the generated cipher text and the corresponding first secret key to the second processing unit 110. The first data transmitting module 204 may further be configured to transmit the generated stenography image and the corresponding second secret key to the second processing unit 110, in an embodiment of the present invention.
[0051] FIG. 3 illustrates the second processing unit 110 of the system 100, according to an embodiment of the present invention. The second processing unit 110 may comprise programming instructions in form of programming modules such as a second data receiving module 300, a data decryption module 302, and a second data transmitting module 304.
[0052] In an embodiment of the present invention, the second data receiving module 300 may be configured to receive the generated cipher text and the corresponding first secret key from the first processing unit 108. The second data receiving module 300 may further be configured to receive the generated stenography image and the corresponding second secret key from the first processing unit 108, in an embodiment of the present invention.
[0053] In an embodiment of the present invention, the data decryption module 302 may be configured to access the first secret key corresponding to the cipher text received. According to embodiments of the present invention, the first secret key may be, but not limited to, the receiver public key, the receiver private key, or the shared secret key. Embodiments of the present invention are intended to include or otherwise cover any first secret key for decrypting the cipher text to the corresponding plain text, including known, related art, and/or later developed technologies.
[0054] In an embodiment of the present invention, the data decryption module 302 may be configured to decrypt the received cipher text to generate the plain text for the corresponding cipher text using the first secret key. The plain text for the corresponding cipher text may be generated by using cryptographic techniques, in an embodiment of the present invention. According to embodiments of the present invention, the cryptographic techniques may be, but not limited to, the Data Encryption Standard (DES) algorithm, the Triple Data Encryption Standard (3DES) algorithm, the Advanced Encryption Standard (AES) algorithm, the Blowfish algorithm, and so forth. Embodiments of the present invention are intended to include or otherwise cover any cryptographic techniques for generating the plain text for the corresponding cipher text, including known, related art, and/or later developed technologies. In an embodiment of the present invention, the data decryption module 302 may further transmit the generated plain text to the second data transmitting module 304.
[0055] In another embodiment of the present invention, the data decryption module 302 may be configured to access the second secret key corresponding to the stenography image received. According to embodiments of the present invention, the second secret key may be, but not limited to, the receiver public key, the receiver private key, or the shared secret key. Embodiments of the present invention are intended to include or otherwise cover any second secret key for decrypting the stenography image to the corresponding secret message, including known, related art, and/or later developed technologies.
[0056] In another embodiment of the present invention, the data decryption module 302 may further be configured to decrypt the stenography image to generate the secret message for the corresponding stenography image using the second secret key. The secret message for the corresponding stenography image may be generated by using stenography techniques, in an embodiment of the present invention. According to embodiments of the present invention, the stenography techniques may be, but not limited to, the binary file technique, the text technique, the image hiding technique, and so forth. Embodiments of the present invention are intended to include or otherwise cover any stenography techniques for generating the secret message for the corresponding stenography image, including known, related art, and/or later developed technologies. In an embodiment of the present invention, the data decryption module 302 may further transmit the generated secret message to the second data transmitting module 304.
[0057] In an embodiment of the present invention, the second data transmitting module 304 may be configured to transmit the generated plain text from the cipher text to the receiving device 104. The second data transmitting module 304 may further be configured to transmit the generated secret message from the stenography image to the receiving device 104.
[0058] FIG. 4 illustrates a comparative study graph 400 (hereinafter referred to as the graph 400), according to an embodiment of the present invention. In an embodiment of the present invention, the graph 400 may compare a key size and a block size of various cryptographic encryption and decryption techniques. The various cryptographic encryption and decryption techniques may be selected from the Data Encryption Standard (DES) algorithm (invented by IBM), the Triple Data Encryption Standard (3DES) algorithm (invented by IBM), the Advanced Encryption Standard (AES) algorithm (invented by Joan Daemen & Vincent Rijmen in 1998), and the Blowfish algorithm (invented by Bruce Schneier in 1993).
[0059] Further, the key size and the block size for every cryptographic encryption and decryption technique may be measured in a unit of bytes. In an embodiment of the present invention, the key size and the block size of the Data Encryption Standard (DES) algorithm may be 56 bytes and 64 bytes respectively. In another embodiment of the present invention, the key size and the block size of the Triple Data Encryption Standard (3DES) algorithm may be 168 bytes and 64 bytes respectively. In yet another embodiment of the present invention, the key size and the block size of the Advanced Encryption Standard (AES) algorithm may be 256 bytes and 128 bytes respectively. In a further embodiment of the present invention, the key size and the block size of the Blowfish algorithm may be 448 bytes and 64 bytes respectively.
[0060] FIG. 5 depicts a flowchart of a method 500 for cloud-based digital cryptography, according to an embodiment of the present invention.
[0061] At step 502, the system 100 may receive the generated plain text from the sending device 102.
[0062] At step 504, the system 100 may encrypt the plain text by using the cryptographic techniques to generate the cipher text for the corresponding plain text.
[0063] At step 506, the system 100 may transmit the generated cipher text and the corresponding first secret key to the second processing unit 110.
[0064] At step 508, the system 100 may receive the cipher text from the first processing unit 108.
[0065] At step 510, the system 100 may decrypt the cipher text using the cryptographic techniques to generate the plain text for the corresponding cipher text.
[0066] At step 512, the system 100 may transmit the generated plain text to the receiving device 104.
[0067] FIG. 6 depicts a flowchart of a method 600 for cloud-based digital stereography, according to an embodiment of the present invention.
[0068] At step 602, the system 100 may receive the generated secret message from the sending device 102.
[0069] At step 604, the system 100 may generate the stenography image form the secret message and the cover image for the corresponding secret message.
[0070] At step 606, the system 100 may transmit the generated stenography image and the corresponding second secret key to the second processing unit 110.
[0071] At step 608, the system 100 may receive the stenography image from the first processing unit 108.
[0072] At step 610, the system 100 may decode the stenography image using the stenography techniques to generate the secret message for the corresponding stenography image.
[0073] At step 612, the system 100 may transmit the generated secret message to the receiving device 104.
[0074] While the invention has been described in connection with what is presently considered to be the most practical and various embodiments, it is to be understood that the invention is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims. , Claims:CLAIMS
I/We Claim:
1. A system (100) for cloud-based digital cryptography and stereography, the system (100) comprising:
a sending device (102) to be used by a user for generating a plain text to be encrypted;
a cloud server (106) communicatively connected to the sending device (102), wherein the cloud server (106) comprises characterized in that:
a first processing unit (108), configured to:
receive the generated plain text from the sending device (102);
encrypt the plain text by using cryptographic techniques to generate a cipher text for the corresponding plain text; and
transmit the generated cipher text and a corresponding first secret key to a second processing unit (110);
the second processing unit (110) configured to:
receive the cipher text from the first processing unit (108);
decrypt the cipher text using the cryptographic techniques to generate the plain text for the corresponding cipher text; and
transmit the generated plain text to a receiving device (104).
2. The system (100) as claimed in claim 1, wherein the first secret key is configured to provide an identity for decryption of the cipher text.
3. The system (100) as claimed in claim 2, wherein the first secret key is selected from a receiver public key, a receiver private key, or a shared secret key.
4. The system (100) as claimed in claim 1, wherein the first processing unit (108) is configured to generate a stenography image from a secret message and a cover image received from the sending device (102) by using stenography techniques.
5. The system (100) as claimed in claim 4, wherein the first processing unit (108) is configured to transmit the stenography image along with a second secret key to the second processing unit (110).
6. The system (100) as claimed in claim 4, wherein the second processing unit (110) is configured to decode the secret message from the stenography image generated by the first processing unit (108).
7. A method for cloud-based digital cryptography and stereography, the method comprising steps of:
receiving a generated plain text from a sending device (102);
encrypting the plain text by using cryptographic techniques to generate a cipher text for the corresponding plain text;
transmitting the generated cipher text and a corresponding first secret key to a second processing unit (110);
receiving the cipher text from a first processing unit (108);
decrypting the cipher text using the cryptographic techniques to generate the plain text for the corresponding cipher text; and
transmitting the generated plain text to a receiving device (104).
8. The method as claimed in claim 7, comprising a step of generating a stenography image from a secret message and a cover image received from the sending device (102) by using stenography techniques.
9. The method as claimed in claim 8, comprising a step of transmitting the stenography image along with a second secret key to the second processing unit (110).
10. The method as claimed in claim 8, comprising a step of decoding the secret message from the stenography image generated by the first processing unit (108).
Date: September 28, 2022
Place: Noida

Nainsi Rastogi
Patent Agent (IN/PA-2372)
Agent for the Applicant

Documents

Application Documents

# Name Date
1 202241056246-COMPLETE SPECIFICATION [30-09-2022(online)].pdf 2022-09-30
1 202241056246-FORM 13 [15-02-2025(online)].pdf 2025-02-15
1 202241056246-STATEMENT OF UNDERTAKING (FORM 3) [30-09-2022(online)].pdf 2022-09-30
2 202241056246-REQUEST FOR EARLY PUBLICATION(FORM-9) [30-09-2022(online)].pdf 2022-09-30
2 202241056246-FORM 18 [15-02-2025(online)].pdf 2025-02-15
2 202241056246-DECLARATION OF INVENTORSHIP (FORM 5) [30-09-2022(online)].pdf 2022-09-30
3 202241056246-POWER OF AUTHORITY [30-09-2022(online)].pdf 2022-09-30
3 202241056246-POA [15-02-2025(online)].pdf 2025-02-15
3 202241056246-DRAWINGS [30-09-2022(online)].pdf 2022-09-30
4 202241056246-EDUCATIONAL INSTITUTION(S) [30-09-2022(online)].pdf 2022-09-30
4 202241056246-OTHERS [30-09-2022(online)].pdf 2022-09-30
4 202241056246-RELEVANT DOCUMENTS [15-02-2025(online)].pdf 2025-02-15
5 202241056246-COMPLETE SPECIFICATION [30-09-2022(online)].pdf 2022-09-30
5 202241056246-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-09-2022(online)].pdf 2022-09-30
5 202241056246-FORM-9 [30-09-2022(online)].pdf 2022-09-30
6 202241056246-DECLARATION OF INVENTORSHIP (FORM 5) [30-09-2022(online)].pdf 2022-09-30
6 202241056246-FORM 1 [30-09-2022(online)].pdf 2022-09-30
6 202241056246-FORM FOR SMALL ENTITY(FORM-28) [30-09-2022(online)].pdf 2022-09-30
7 202241056246-DRAWINGS [30-09-2022(online)].pdf 2022-09-30
7 202241056246-FORM 1 [30-09-2022(online)].pdf 2022-09-30
7 202241056246-FORM FOR SMALL ENTITY(FORM-28) [30-09-2022(online)].pdf 2022-09-30
8 202241056246-EDUCATIONAL INSTITUTION(S) [30-09-2022(online)].pdf 2022-09-30
8 202241056246-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-09-2022(online)].pdf 2022-09-30
8 202241056246-FORM-9 [30-09-2022(online)].pdf 2022-09-30
9 202241056246-EDUCATIONAL INSTITUTION(S) [30-09-2022(online)].pdf 2022-09-30
9 202241056246-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-09-2022(online)].pdf 2022-09-30
9 202241056246-OTHERS [30-09-2022(online)].pdf 2022-09-30
10 202241056246-DRAWINGS [30-09-2022(online)].pdf 2022-09-30
10 202241056246-FORM 1 [30-09-2022(online)].pdf 2022-09-30
10 202241056246-POWER OF AUTHORITY [30-09-2022(online)].pdf 2022-09-30
11 202241056246-DECLARATION OF INVENTORSHIP (FORM 5) [30-09-2022(online)].pdf 2022-09-30
11 202241056246-FORM FOR SMALL ENTITY(FORM-28) [30-09-2022(online)].pdf 2022-09-30
11 202241056246-REQUEST FOR EARLY PUBLICATION(FORM-9) [30-09-2022(online)].pdf 2022-09-30
12 202241056246-STATEMENT OF UNDERTAKING (FORM 3) [30-09-2022(online)].pdf 2022-09-30
12 202241056246-FORM-9 [30-09-2022(online)].pdf 2022-09-30
12 202241056246-COMPLETE SPECIFICATION [30-09-2022(online)].pdf 2022-09-30
13 202241056246-RELEVANT DOCUMENTS [15-02-2025(online)].pdf 2025-02-15
13 202241056246-OTHERS [30-09-2022(online)].pdf 2022-09-30
14 202241056246-POWER OF AUTHORITY [30-09-2022(online)].pdf 2022-09-30
14 202241056246-POA [15-02-2025(online)].pdf 2025-02-15
15 202241056246-FORM 18 [15-02-2025(online)].pdf 2025-02-15
15 202241056246-REQUEST FOR EARLY PUBLICATION(FORM-9) [30-09-2022(online)].pdf 2022-09-30
16 202241056246-FORM 13 [15-02-2025(online)].pdf 2025-02-15
16 202241056246-STATEMENT OF UNDERTAKING (FORM 3) [30-09-2022(online)].pdf 2022-09-30