You are on page 1of 25

File Security And Authentication

Sri M. Sampath Kumar,

Prof. M. S. Prasad Babu,

Associate Professor,

Head of the Department

(Project Guide)

Dept. of CS & SE,

College of Engineering,

College of Engineering,

ANDHRA UNIVERSITY.

ANDHRA UNIVERSITY.

By
A.Vasudeva Rao
Regd. No: 97036204
September 27, 2016

Fle Security And Authentication

ABSTRACT
Aim of Project:
- provides security by providing
Confidentiality,
Authenticity and
integrity for the message to be sent to any system in
Network.
The security is terms of encryption, digital signature.
Confidentiality for the data is obtained by encrypting the data by
Algorithms DES and AES.
The digital signatures are a way of
providing
AuthenticityFleand
integrity to digital documents.
September 27, 2016
Security And Authentication

Overview of Project

In this project there are 2 phases

Phase-1:
Data is encrypted by using DES and AES using secret key
The encrypted data is send to the destination and secret key

is shared between the sender and receiver.


At the destination the received data is decrypted using the
secret key

Phase-2:
The data is to be sent is digitally signed by DSA algorithm

using private key


At the destination the receiver who receives the data and
signature generates a new signature using public key of the
sender.

September 27

Fle Security And Auth

Data Encryption Standard


The 64-bit plain text block is handed over to Initial permutation(IP) function
The IP is performed on plain text
Next, IP produces 2 halves of permuted block; LPT and RPT
Now, each of LPT and RPT go through 16 rounds of encryption process
In the end LPT, and RPT are joined and Finial Permutation is performed on the combined block.
The result of this process produces 64-bit cipher text

September 27

Fle Security And Auth

DES encryption algorithm


56-bit key

64-bit plaintext

Initial permutation

Permuted key
K1

Round 1

Permuted key

Left circular shift

Permuted key

Left circular shift

Permuted key

Left circular shift

K2

Round 2

K16

Round 16
32-bit swap
Inverse permute

64-bit ciphertext
September
27

Fle Security And Auth

Broad level steps in 16 rounds


Key

transformation
Expansion permutation
S-Box Substitution
P-Box Permutation
XOR and Swap

September 27

Fle Security And Auth

Advanced Encryption Standard


(AES)

The Advanced Encryption Standard (AES), previously


known as Rijndael, is a block cipher adopted as an encryption
standard by the U.S. Government.

AES was announced by National Institute of Standards and


Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on
November 26, 2001 after a 5-year standardization process.

It became effective as a standard May 26, 2002.

The Rijndael algorithm is a symmetric block cipher that can


process data blocks of 128 bits, using cipher keys with lengths
of 128, 192, and 256 bits.

September 27

Fle Security And Auth

High level description of AES


(1) Do the following one-time initialization process:
(a) Expand the 16-byte key to get the actual Key
block to be used
(b) Do one time initialization of the 16-byte plain text
block(State)
(c) XOR the state with the key block

September 27

Fle Security And Auth

(2) For each round , do the following


(a) Apply S-Box to each of the plain text bytes
(b) Rotate row k of the plain text block by bytes
(c ) Perform mix columns operation
(d) XOR the state with the key block

September 27

Fle Security And Auth

AES Algorithm Functions


AddRoundKey()
SubBytes()
ShiftRows()
MixColumns()
InvSubBytes()
InvShiftRows()
InvMixColumns()
SubWord()
RotWord()
Rcon[]

September 27

Fle Security And Auth

10

September 27

Fle Security And Auth

11

September 27

Fle Security And Auth

12

Digital Signature Standard

A digital signature is an electronic analogue of a written signature in


that the digital signature can be used in proving to the recipient that
the message was, in fact, signed by the originator. The DSS uses the
Secure Hash Algorithm(SHA)
Digital Signature Algorithm uses the three basic functions:
Key Generation
Signature Generation
Signature Verification

September 27

Fle Security And Auth

13

DSA parameters
The DSA makes use of the following parameters:
1. p = a prime modulus, where 2L-1 < p < 2L for 512 = < L = <1024
and L a
multiple of 64
2. q = a prime divisor of p - 1, where 2159 < q < 2160
3. g = h(p-1)/q mod p, where h is any integer with 1 < h < p - 1 such
that
h(p-1)/q mod p > 1 (g has order q mod p)
4. x = a randomly or pseudo randomly generated integer with 0 < x <
q
5. y = gx mod p
6. k = a randomly or pseudo randomly generated integer with 0 < k <
q

September 27

Fle Security And Auth

14

Signature Generation
The signature of a message M is the pair of
numbers r and s computed according to the
equations below:
r = (gk mod p) mod q and
s = (k-1(SHA(M) + xr)) mod q.

September 27

Fle Security And Auth

15

Signature Verification
w

= (s1)-1 mod q
u1 = ((SHA(M1)w) mod q
u2 = ((r1)w) mod q
v = (((g)ul (y)u2) mod p) mod q.
If v = r the signature is said to be verified.
Otherwise , it is rejected
September 27

Fle Security And Auth

16

Secure Hash Algorithm


Devloped by National Institute of Standards
& Tehcnology(NIST)

September 27

Fle Security And Auth

17

Working of SHA
Padding
Append

Length
Divide the input into 512 blocks
Initializing chaining variables
Process message in clocks
Output
September 27

Fle Security And Auth

18

Software & Hardware


Requirements
Platform
Server
Operating System

JAVA 1.5 with JCE 1.5 Unlimited


Strength Package
: TOMCAT 1.4
: Windows XP

CPU
Processor Speed
RAM
Hard Disk

:
:
:
:

September 27

PENTIUM-IV
2 GHZ
256MB
1 GB and above

Fle Security And Auth

19

Output Screens

September 27

Fle Security And Auth

20

September 27

Fle Security And Auth

21

CONCLUSION
It

provide security for communication on


networks by unapproachable of passive and
active attacks
To meet this project I use AES, DES and
DSA with SHA-1

September 27

Fle Security And Auth

22

AES improves the level of security thereby providing a


more secure way of communication.
The symmetric key algorithm DES can supplement AES
to meet certain restrictions on the client side.
The DSA algorithm which is solely used for generating
digital signature has its advantages like faster key
generation, faster signature generation and lightweight to
the hardware.
AES (128) is the fastest algorithm, followed by AES
(192), then AES (256), and then slowest algorithm is single
DES.

September 27

Fle Security And Auth

23

BIBLOGRAPHY
BIBLOGRAPHY
1.Cryptography and Network Security
-William Stallings ,Third Edition ,
Prentice-Hall.
2.The Laws of Cryptography with JAVA Code
-Neal R.Wagner.
3.The Complete Reference JAVA2
-Herbert Schildt ,Fifth Edition,
TATA McGraw-Hill Edition.
4.Object-Oriented Software Engineering
Timothy C.Lethbridge, Robert Laganiere

TMH Publications
REFERENCES
http://en.wikipedia.org/
http://w3schools.com/
http://www.owasp.org/

September 27

Fle Security And Auth

24

Thanks

September 27

Fle Security And Auth

25

You might also like