Security Using Armstrong Numbers and Authentication using Colors

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
SEC835 Practical aspects of security implementation Part 1.
Cryptography, Authentication and Digital Signatures
Types of Electronic Infection
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public Key Encryption.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Library Management System. Aim : To develop a project titled “LIBRARY MANAGEMENT” and is developed to maintain the operation done in a library. To develop.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
BY S.S.SUDHEER VARMA (13NT1D5816)
Security Protecting information data confidentiality
Basics of Cryptography
Crypto in information security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Network Security.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA
Principles of Encryption
STEGANOGRAPHY.
Cryptography and Security Technologies
Department Of Computer Science Engineering
Cryptography.
IS3230 Access Security Unit 9 PKI and Encryption
Chapter 3:Cryptography (16M)
PART VII Security.
Security in Network Communications
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems.
ONLINE SECURE DATA SERVICE
DISSERTATION ON CRYPTOGRAPHY.
Digital Communications
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Secret-Key Encryption
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Security Using Armstrong Numbers and Authentication using Colors

Abstract We are living in the information age. Hence data security plays an important role. Hackers are becoming more active nowadays. Hence it is increasingly becoming more important to protect our data. There are some techniques used to make data transmission with protection. Cryptography is one of them. This project provides a technique in which Armstrong number is used for encryption of message. Colour is important in authentication process as it acts as password. Using this technique, message is hidden from unauthorized people and accessible to an authorized individual when required.

Introduction In real world, data security is very important where importance is given to the confidentiality, authentication and integrity. Secure data transmission is really difficult because of the hackers. Cryptography is the universal technique for providing security to confidential data. The main goals of cryptography are access control and non- repudiation. It consists of encryption and decryption processes. Encryption and decryption have need of some secret information, usually referred to as a key. The same key might be used for both encryption and decryption depending on the encryption mechanism. While for other mechanisms, the keys used for encryption and decryption might be different.

What is Cryptography ? Cryptography is the art and study of hiding information i.e. technique to convert plain text into cipher text. Cipher text is the message or data in unreadable format. Transformation of plain text into cipher text is done with the help of key it can be secret key or public key. This process is nothing but an encryption process. Decryption is the reverse process of encryption in which cipher text is converted back into plain text (Original message) again with the help of key.

EXISTING SYSTEM There are many algorithms for encryption decryption process like AES, DES, RSA in which encryption is done with the help of substitutions and transformations on the plaintext. It uses prime numbers for encryption process. A. Cryptography using secret key (SKC): Secret key is a value independent of a plaintext and of the algorithm. Single key is used for both encryption and decryption by an algorithm. It includes Data Encryption Standard (DES) and Advanced Encryption Standard (AES). B. Cryptography using Public Key (PKC): Two different keys are used in this. One key is used for encryption and another for decryption. It includes Rivest, Shamir, Adleman (RSA) algorithm. C. Hash Functions: It uses mathematical transformation for encryption which is not recoverable from the cipher text.

PROPOSED SYSTEM In proposed system Armstrong numbers are used for encryption purpose while existing system uses prime number. Color is used for authentication purpose. Basic concept is that unique color is assigned to each receiver. This unique color acts as password. The sender knows required receiver to whom the data has to be sent. There can be N numbers of receivers who can access the encrypted data if they are authorized (N≤224). Firstly, encryption of color is done by adding key values to the original color values at sender’s side. This encrypted color acts as a password. Then data is encrypted using Armstrong numbers. At the receiver’s side when the receiver enters secret key, decryption of color takes place. The decrypted color is then matched with color assigned by sender i.e. original color stored at the sender’s database. Without the secret key, there is no way for user to access the data.

Further a combination, substitution and permutation methods are used with Armstrong number to ensure data security. S For encryption it converts each letter to its ASCII equivalent by substitution method and permutation is done with the help of Armstrong number. Later it convert that data into matrix form. It performs permutation process by using matrices. Receiver will perform in reverse manner.

Modules of the Project Admin Module:- Admin login into the application using username and password . Admin manages employees of the organization. In the upload file module admin select the file which he have to share with the employee. Select the employee username with whom he have to share a file. Allocate the color to each employee during file share Select the Armstrong no which is use for file encryption which is use as a key for file encryption. When admin click on upload button, colors RGB value get send on users email id and file get encrypted using Armstrong number and that encrypted file get loaded on server.(that RGB value is use as a authentication key for the employee).

Continue Employee Module:- Employee login into the application using username and password. Employee can view the name of the file which is share by the admin. Employee click on download hyperlink Then employee have to enter the RGB value into the textbox. If the value of the RGB value get matches then file get decrypted by using Armstrong no and get download into the system. Else it will show invalid user key error message. Employee can change the password if required.

Block Diagram

Hardware Software Requirement Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. • Keyboard : 101 Keyboard.   Software Requirements: • Operating system : Windows XP. • Coding Language : ASP.Net with C# • Data Base : SQL Server 2008.

CONCLUSION Thus we addressed the problem of security of secret message. Hence a technique is proposed in which Armstrong numbers are used instead of prime numbers to provide more security. The confidential areas like military, governments are targeted by the system where data security is given more importance. Colors, key values and Armstrong numbers which are three set of keys in this technique makes sure that there is secured message or data transmission and is available to authorized person.

REFERENCES [1] Atul Kahate, “Cryptography and Network Security “, Tata McGraw Hill Publications [2] http://aix1.uottawa.ca/~jkhoury/cryptography.htm [3]http://www.scribd.com/doc/29422982/Data- Compression-and-Encoding-Using-Col