Shambhulingaiah C. M, Ravi Simha B. N, Dr. M.Z.Kurian
Security becomes increasingly important for many applications, such as video surveillance, confidential transmission military and medical applications. Data hiding has been used for several years to transmit data without being intercepted by unwanted viewers. The core of the system is two widely used cryptographic algorithm core: Secure Hash Algorithm SHA-256 and Advanced Encryption Standard AES-128. The system design is with hardware’s effectiveness in mind. This cryptographic engine was used as an integral part of security data storage system. Cryptography algorithm is implemented on Software using computer. It has been observed that the performance of the software is not up to the mark. Moreover Security flaws were identified in Secure Hash Algorithm SHA–1, namely that a mathematical weakness exist, that indicating a stronger hash function would be desirable. So SHA-256 is used to overcome this.