Dear Guest, Please Register to Download Free Seminar Reports and PPT of each topic. The Download link will be visible only after the registration.Please search the topic before posting.

Please click the Facebook Like Button if you are satisfied

 Subscribe To Get Latest Seminar Reports and PPT

Receive all seminar updates via Facebook. Just Click the Like Button Below


metamorphic cryptography

Huge Collection of Electronics Seminar Topics, Reports and PPT.

metamorphic cryptography

Postby Deepthi » Mon Feb 20, 2012 1:50 pm


Can i please get a report on metamorphic cryptography.
Its a technique where data is secured using cryptography and steganography.

Active User
Posts: 3
Joined: Mon Aug 22, 2011 3:10 pm

Re: metamorphic cryptography

Postby Prasanth » Mon Feb 20, 2012 2:34 pm

The Stone Cipher-192 is a metamorphic cipher that utilizes a variable word size and variable-size user’s key. In the preprocessing stage, the user key is extended into a larger table or bit-level S-box using a specially developed one-way function. However for added security, the user key is first encrypted using the cipher encryption function with agreed-upon initial values. The generated table is used in a special configuration to considerably increase the substitution addressing space. Accordingly, we call
this table the S-orb. Four bit-balanced operations are pseudorandomly selected to generate the sequence of operations constituting the cipher. These operations are: XOR, INV, ROR, NOP for bitwise xor, invert, rotate right and no operation respectively. The resulting key stream is used to generate the bits required to select these operations. We show that the proposed cipher furnishes concepts of key-dependent pseudo random sequence of operations that even the cipher designer cannot predict in advance. In this approach, the sub-keys act as program instructions not merely as a data source. Moreover, the parameters used to generate the different S-orb words are likewise
key-dependent. We establish that the self-modifying proposed cipher, based on the aforementioned key-dependencies, provides an algorithm metamorphism and adequate security with a simple parallelizable structure. The ideas incorporated in the development of this cipher may pave the way for key-driven encryption rather than merely using the key for sub-key generation. The cipher is adaptable to both hardware and software implementations. Potential applications include voice and image encryption.

Keywords: metamorphic, polymorphic, cipher, cryptography, filters, hash.

Full report available at
User avatar
Site Admin
Posts: 488
Joined: Sat May 28, 2011 6:29 pm

Return to Electronics Engineering Seminar Topics