Top Banner

of 14

Data Integrity in Network Security Without Code

Jul 06, 2018

Download

Documents

ArijeetYadav
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/18/2019 Data Integrity in Network Security Without Code

    1/14

     By ARIJEET KUMAR

      Registration number:-15MCA1025

    Autenti!ation base" on #nger$rint using %ymmetri! an"

    &isua' Cry$togra$y

  • 8/18/2019 Data Integrity in Network Security Without Code

    2/14

    1 . Abstract.

    2 . Introduction.

    3 . Existing System.

    4 . Implementation plan.5 . Modules.

    6 . ools re!uired.

    " . #e$erences.

    % . ime&'ine ()art.

    Contents

  • 8/18/2019 Data Integrity in Network Security Without Code

    3/14

     )e combination o$ symmetric and *isual cryptograp)ytec)ni!ue is used to )a*e secured aut)entication basedon +nger print t)e proposed system consist o$ t,op)ases.

    In t)e +rst p)ase- t)e +gure print image is di*ided into

    t,o s)ares ,it) t)e )elp o$ *isual cryptograp)ytec)ni!ue. inally one encrypted s)are is stored in I/card and anot)er one is stored in /ata 0ase.

     In second p)ase- actual aut)entication process isper$ormed based on t)e )umb Impression ,)ic) is

    gi*en by t)e person. A$ter getting t)e )umbImpression- encrypted s)ares are decrypted and bot)s)ares are staced to generate t)e )umb Impressionare compared. I$ bot) are e!ual t)e person is allo,ed ornot allo,ed.

    Abstra!t

  • 8/18/2019 Data Integrity in Network Security Without Code

    4/14

      Introduction

    1 ybrid encryption is a mode o$ encryption t)at merges t,o or moreencryption systems. It incorporates a combination o$ asymmetric

    and symmetric encryption to bene+t $rom t)e strengt)s o$ eac) $orm

    o$ encryption. )ese strengt)s are respecti*ely de+ned as speed andsecurity.

    2. ybrid encryption is considered a )ig)ly secure type o$ encryptionas long as t)e public and pri*ate eys are $ully secure.

    3.ybrid encryption is ac)ie*ed t)roug) data trans$er using uni!uesession eys along ,it) symmetrical encryption. ublic eyencryption is implemented $or random symmetric ey encryption.

    .

    0#I/ E(#I

  • 8/18/2019 Data Integrity in Network Security Without Code

    5/14

     

    M/5 Is a ,idely used cryptograp)ic $unction ,it) a12%& bit )as) *alue. M/5 )as been employed in a ,ide

    *ariety o$ security applications- and is also commonlyused to c)ec t)e integrity o$ +les .  )e M/5 algorit)m uses 4 state *ariables- eac) o$

    ,)ic) is a 32 bit integer.

     )ese $unctions- using t)e state *ariables and t)emessage as input- are used to trans$orm t)e state*ariables $rom t)eir initial state into ,)at ,ill becomet)e message digest.

      A()*RIT+M ,*R ME%%A)E I)E%T I.M5

  • 8/18/2019 Data Integrity in Network Security Without Code

    6/14

    /AA (MM7I(AIS SE(7#IMEAS7#ES◦ 'imiting net,or access

    i. 7se o$ pass,ords8Is to accessin$ormation

    ii. ire,alls

    iii. istorical 9 statistical logging

    i*. rotecting data during transmission userseit)er public or secret ey cryptograp)y

    E/isting %ystem

  • 8/18/2019 Data Integrity in Network Security Without Code

    7/14

     )ere are t,o type o$ using ey in #SA algorit)m a. public ey b. ri*ate ey

    R%A is an algorit)m used by modern computersto encrypt and decrypt messages It is an asymmetriccryptograp)ic algorit)m. Asymmetric means t)at t)ereare t,o di;erent eys. )is is also called public key

    cryptography - because one o$ t)em can be gi*en toe*eryone. )e ot)er ey must be ept pri*ate. #SAstands $or #on #i*ets- Aid S)amir and 'eonard Adelman

     )e #SA Algorit)m $or (reating #SA ublic and ri*ate

  • 8/18/2019 Data Integrity in Network Security Without Code

    8/14

    Mo"u'es

    Tere are tree ty$e oA'goritm using in +ybri"!ry$tosystem

    R%A A()*RIT+M:- R%A a'goritm using or e!ry$t an" En!ry$t ata

     AE% A()*RIT+M:-Te AE% a'goritms use to be e!ry$te" ata

    M5:-Te M5 are a'so using te Message igest an" it is i"e'yuse" !ry$togra$i! un!tion it 123 bit as 4a'ue

  • 8/18/2019 Data Integrity in Network Security Without Code

    9/14

    E.CR6TI*.

    IE

    et %are" 8ey

    R%AE.CR6TI*.

    ATA

    En!ryata

    M

    Re!ei4er7s ub'i! 8ey

  • 8/18/2019 Data Integrity in Network Security Without Code

    10/14

    R%AECR6TI*.

    AE%ECR6TI*.

    M/5 (#EAI I7/AA

    Re!ei4er7s ri4ate 8ey

    e!ry$te" In$ut

    ata

    e!ry$te" %are"%e!ret Key

    Message igest

    RECEI&ER7% %IE

    e!ry$te" ata

  • 8/18/2019 Data Integrity in Network Security Without Code

    11/14

  • 8/18/2019 Data Integrity in Network Security Without Code

    12/14

  • 8/18/2019 Data Integrity in Network Security Without Code

    13/14

    A77S (0E# (0E# BEM0E#>

    1

    2

    3

    4

    5

    6IM(EME.TATI*.

    IM'EMEAIImplementation  plan

    Proposed worked

     and paper submission

    Final

    implementation

    TIME-(I.E C+ART

    To$i! se!tionan" abstra!t

  • 8/18/2019 Data Integrity in Network Security Without Code

    14/14

     

     A