
|
Abstract
INFORMATION SECURITY APPLICATION DEVELOPED USING CRYPTOLOGY AND STEGANOGRAPHY TECHNIQUES
The use of digital platforms popularized as a result of technological developments and reached very high points recently. However, these platforms that are used by many people to meet their needs are open to security vulnerabilities due to the number of uses they get. The need for information security has increased significantly since computer technologies are widely used today. This study aims to contribute to the protection of information security using cryptology and steganography techniques that are closely linked with security issues. In this study, data encryption and data hiding, which are generally thought of as alternatives, are used as supplements of each other. Thus, a new and unique application, which is thought to contribute to increasing information security, was developed using cryptology and steganography techniques. It is observed that with the usage of the new application, the data embedded in a digital image that is hidden to different and randomly selected positions each time can be decrypted successfully to obtain the original data. The application was developed using the C# programming language
Keywords
Information Security, Cryptology, Data Encryption, Steganography, Data Hiding
Kaynakça
Bahçetepe, H.: ” Modüler Çarpma Algoritmalarının İncelenmesi ve Kriptolojide Uygulamaları ”, Yüksek Lisans Tezi, İstanbul Üniversitesi Fen Bilimleri Enstitüsü, İstanbul, Türkiye, (2006).
Başkök, M.: ” AES Şifreleme Algoritmasının Modellenmesi ”, Yüksek Lisans Tezi, Gazi Üniversitesi Fen Bilimleri Enstitüsü, Ankara, Türkiye, (2007).
Buluş, H. N.: ” Temel Şifreleme Algoritmaları ve Kriptanalizlerin İncelenmesi ”, Yüksek Lisans Tezi, Trakya Üniversitesi Fen Bilimleri Enstitüsü, Edirne, Türkiye, (2006).
Çağlar, E., ‘’Açık Anahtarlı Kriptografi ve Ağ Güvenlik Uygulamaları’’, Yüksek Lisans Tezi, Çanakkale Onsekiz Mart Üniveristesi, Fen Bilimleri Enstitüsü,Çanakkale, (2004).
Denton, B. : “ Evaluation of Cryptographic Construction Properties and Security Requirements of Modern Secure Hashing Algorithms”, Master Thesis, The Department of Electrical and Computer Engineering of Alabama University, Huntsville, Alabama, USA (2011).
Kim Y.S., Kim Y.M., Choi J.Y., Baik D.K., “Information Hiding System StegoWaveK for Improving Capacity”, International Symposium, ISPA 2003 Aizu-Wakamatsu, Japan, July 2-4, Proceedings, Springer Berlin/ Heidelberg, ISSN 0302-9743, vol. 2745/2003, 2003.
Rivest, R..; Shamir, A.; Adleman, L.: “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,”, Communications of the ACM, v. 21, n. 2, (Feb, 1978), pp. 120-126.
Sarıtaş, H.: ” Dijital İmza Uygulamasının Eliptik Eğri Şifreleme Yöntemi Kullanılarak Gerçekleştirilmesi ”, Yüksek Lisans Tezi, Marmara Üniversitesi Fen Bilimleri Enstitüsü, İstanbul, Türkiye, (2010).
Şahin, A.’’ Görüntü Steganografi de Kullanılan Yeni Metodlar ve Bu Metodların Güvenilirlikleri’’. Doktora Tezi., Trakya Üniversitesi, Bilgisayar Mühendisliği Anabilim Dalı, Edirne, 2007.
Tsunoo Y.; Tsujihara E.; Minematsu K.; Miyauchi H.:”Cryptanalysis of Block Ciphers Implemented on Computers with Cache”, ISITA, (2002).
Tuncal, T.: ” Bilgisayar Güvenliği Üzerine Bir Araştırma ve Şifreleme- Deşifreleme Üzerine Uygulama ”, Yüksek Lisans Tezi, Maltepe Üniversitesi Fen Bilimleri Enstitüsü, İstanbul, Türkiye, (2008).
Ulutürk, A., ’’ Gelişmiş Şifreleme Standardı’’, Yüksek lisans Tezi, Gazi Üniversitesi Fen Bilimleri Enstitüsü, Ankara, Türkiye (2010).
|
|