Professional Documents
Culture Documents
Master of Technology
In
Computer Scienece and Engineering
By
SREEJESH.S
M050207CS
GUIDED BY
Dr. M P SEBASTIAN
Dr. M P Sebastian
Professor,
Head of the Department
Dept. of Computer Engineering.
ACKNOWLEDGEMENT
I have been very fortunate to have Dr .M P Sebastian, Professor and Head of the
Department, Department of computer Engineering, as my guide whose timely guidance,
advice and inspiration helped me in the preparation of this Mini Project. His inspirational
lectures gives me insight to do the project . I express my sincere gratitude for having
guided me through this work. I also thankful to those who helped in my project directly
or indirectly through various comments and suggesting various improvements. Last but
not the least ,i thank the almighty who made this project a reality.
SREEJESH.S
Abstract
In this work titled “ Enigma-SMPS Crypto Engine”, I developed a system that
provides a complete solution to security and protection against hacking by all manually
developed algorithms and techniques, and the best control center for secure data
transportation, and used advanced automatic security concerns. Three components are
there along with this project
The SEE deals with E-mail providing both end-to-end securities. Data encrypted
using DES and username and password encrypted using Public cryptography (RSA) .
SEC providing a secure, tension free Chatting .The SES providing the art of Information
hiding ,that will work with your will. SEE and SEC combined together gives a full proof
protection. With the advance of computer networks Security have become an important
part of modern communications. With the speed and comfort of the medium, the
confidentiality of any data in an open channel is due worth to be considered together with
the question of authentication, or repudiation and integrity of the data being received.
The project has been an intension to develop a software package that provides the
facility to implement a security system by using the various cryptographic techniques in
practice today.
1. Introduction 6
a. Existing system 9
b. Proposed system 9
4. Modules- Cross-Section 9
5 Public Cryptography 11
7 Screen Shots 16
8 Conclusion 20
9 Refrences 21
The art of a strong position is to make the forces holding it practically unassailable
Carl Von Clausewitz
Introduction
Paul De Palma Diffie and Hellman wrote these inspiring words in 1976: “We stand today
on the brink of a revolution in cryptography. “. A little over twenty five years later, then
Deputy Director of the NSA, William Crowell estimated the depth of the revolution: “If
all the personal computers in the world - 260 million computers - were put to work on a
single PGP-encrypted message, it would still take an estimated 12 million times the age
of the universe, on average, to break a single message . Security means life to the net.
Threats appearing over the Internet are challenging to the Cryptographic world. This mini
project handling the security provisions offered by RSA, DES and beautiful mathematics.
Basic objective this project is to provide a secure platform for the users, so that he/she
can concentrate on his duty rather brooming over security headaches. Three components
are there along with this project
The SEE deals with E-mail providing both end-to-end securities. Data encrypted using
DES and username and password encrypted using Public cryptography (RSA). SEC
provides chatting using RSA (128bit key size).
SES giving information hiding techniques, so that along with SEE it gives a full proof
end to end secure channel for any user.
Overview of Information security
a. Confidentiality
b. Data Integrity
c. Authentication
These are achieved and implemented successfully in this project. RSA is the public key
cryptographic method and AES is the counter part in symmetric cryptography
Why you want Enigma CryptoEngine?
Existing System
• There is no software exists which acts as a container of essential utility programs
needed for secure network usage.
• This leads to the usage of more than one software to produce a satisfactory result,
causes extra cost and time.
• Most of the utility programs available in the market are not plat form independent.
Proposed System
• Platform independent
Public key element, which is taking control of the session key encryption and username,
password sending to mail server where database resides .The mail data is encrypted using
DES ,which provides 3 types of keysize. 128 bit,192 bit and 256 bit keys. Depend upon
security level that you want u can switch on to the key size. Any kind of data, like text
file ,doc file , compressed format(zip,rar), presentation formats like ppt ,pps , Picture
formats like JPEG ,GIF,BMP it supports. It also supports video formats and audio
formats.
1,Inbox
2, Compose
,3 ,Delete
4, Logout.
Delete command ,that flush the copy of the mail in server and it detaches the link
in mail information box. Logout end s the session by removing the session key .
Cryptography — the science of writing in secret codes — addresses all of the elements
necessary for secure communication over an insecure channel, namely privacy,
confidentiality, key exchange, authentication, and non-repudiation. But cryptography
does not always provide safe communication.
The following formula provides a very generic description of the pieces of the
steganographic process:
In this context, the cover_medium is the file in which we will hide the hidden_data,
which may also be encrypted using the stego_key. The resultant file is the stego_medium
(which will, of course. be the same type of file as the cover_medium). The
cover_medium (and, thus, the stego_medium) are typically image or audio files. In this
article, I will focus on image files and will, therefore, refer to the cover_image and
stego_image.
Public Crytography
Public key method :RSA
This system can also be used as a means for Bob to be sure a message comes from Alice.
If Alice wants to sign a message, she can encrypt it with her private key. When Bob
receives an encrypted message which purports to be from Alice, he can obtain Alice's
public key and decrypt the message. If a readable message emerges, Bob can have
confidence that the message came from Alice, because Alice's public key would only
properly unlock a message which was locked with her private key (known only to Alice).
M M
E D
Decryption
Cipher text C
Cipher Plain
Plain Text Text
887 mod 187=11 1123 mod 187=88
Text
11 88
88
KU=7,187 KU=23,187
SYSTEM REQUIREMENTS
Hardware Requirements:-