Skip to main content

Techniques for Secure Data Transfer

  • Conference paper
  • First Online:
  • 3149 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 558))

Abstract

The Advanced Encryption Standard better known as the AES algorithm is a symmetric (uses the same key to encrypt and decrypt) cryptographic technique used in most of today’s classified and unclassified data transfers. The AES algorithm provides data transfers with layers of security through its mathematical complexity. Alongside this technique of encryption, the act of concealing data within different objects is now becoming an essential component in the art of secure data transfer. This method of hiding secret messages within a file type is known as Steganography. Even though these two elements of secure data transfer differ, they both share the same objective namely to protect the integrity of the data. This paper provides an explanation of Steganography and AES algorithm and how they can be used together to enhance the security of data. The experiments that this paper demonstrates used the AES-256 algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Daemen, J., Rijmen, V. (1999). AES proposal: Rijndael, AES algorithm submission. September 3. http://www.nist.gov/CryptoToolkit.

  2. Bogdanov, A., Khovratovich, D., & Rechberger, C. (2011). Biclique cryptanalysis of the full AES, Lecture notes in computer science (Vol. 7073, pp. 344–371). Berlin/New York: Springer.

    MATH  Google Scholar 

  3. Paar, C., & Pelzl, J. (2010). Understanding cryptography. Berlin: Springer.

    Book  MATH  Google Scholar 

  4. Channalli, S., & Jadhav, A. (2009). Steganography an art of hiding data. International Journal on Computer Science and Engineering, 1(3), 137–141.

    Google Scholar 

  5. Buchmann, J. (2001). “5 DES”, Introduction to cryptography (pp. 119–120). New York: Springer.

    Book  Google Scholar 

  6. Canright, D. (2005). A very compact S-Box for AES, Lecture notes in computer science (Vol. 3659, pp. 441–455). Berlin/New York: Springer.

    MATH  Google Scholar 

  7. Gowtham, M., et al. (2013). AES based steganography. IJAIEM, 2(1), 382–389.

    Google Scholar 

  8. Ramaiya, M., et al. (2013). Secured steganography approach using AES. IJCSEITR, 3(3), 185–192.

    Google Scholar 

  9. Kumthe, A., et al. (2016). Steganography based on AES algorithm and BPCS technique for a securing image. IJARCSSE, 6(3), 116–119.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeffery Gardner Jr. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Gardner, J. (2018). Techniques for Secure Data Transfer. In: Latifi, S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558. Springer, Cham. https://doi.org/10.1007/978-3-319-54978-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54978-1_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54977-4

  • Online ISBN: 978-3-319-54978-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics