The secret key of user is represented by an attribute set and

cipher text is associated with defined access structure by data owner.

Instead of directly encrypting the value of a coefficient, the address of the coefficient is encrypted to get the address of

cipher text.

Symmetric encryption was used to produce a

cipher text C from a seed S.

If a same block is repeated again in the plaintext, in electronic code book (ECB) mode, we get the same

cipher text for the repeated blocks.

Plain text = CF 57 47 10 27 73 65 1A 6E 23 88 18 A2 7C B9 EF Secret Key = 88 5C 36 49 B8 40 D9 E0 06 D0 61 F5 F6 FC 60 46

Cipher Text = 38 B1 4D 2A 56 81 2F 13 FF EE 38 69 FA A4 77 40 TABLE 5.

Therefore, according to the analysis of correlation coefficient, we can draw the conclusion that the effect of image encryption is much better, because the statistical characteristics between pixels of the plaintext image have ceased to exist in the

cipher text image.

Construct the Playfair matrix using the secret key [SK] and then apply traditional Playfair encryption process to get Amino acid of

cipher text [AC].

One-time pad encryption removes bit dependencies in

cipher texts if the key used has its bits independent.

This hidden information can be plain text,

cipher text (unintelligible) or images.

With traditional encryption, when a database or application needs to store sensitive data such as credit card or national insurance numbers, those values are encrypted and then the

cipher text is returned to the original location.

To encrypt plaintext, P, with a key, producing

cipher text, C, simply compute the bitwise exclusive-or of the key and the plaintext:

Finally, Bill receives the message sent by Alice, and decrypts the message by testing the biometric keys in his database against the received

cipher text.