JEPPIAAR ENGINEERING COLLEGE

IMPLEMENTATION OF ´CRASHµUSING NETWORK SECURITY TECHNIQUES

³SURVEY REVEALS 87%WHEAT AND 94%RICE SIPHONED OFF´ Survey revealed that out of a total of 182 families . 142 families did not receive a single grain of wheat during the month of June. only 595 Kgs had actually been received by the people. Below Poverty Line (BPL) and Antyodaya. 167 families did not receive a single grain of rice. There is little subsidy on rations meant for APL cards.BELIEVE IT OR NOT«! IT·S 94% CORRUPTION«« Government provides food at highly subsidized rates to the poor people. The rest 87% found its way to the black market. Antyodaya cards are issued to the poorest of the poor. . Three types of cards are issued by the government . Out of a total of 4650 Kgs of wheat supposed to have been distributed to the people. Balance 94% was siphoned off.Above Poverty Line (APL). Rations are issued to them at highly subsidized rates. only 110 Kgs was received by the people. Out of a total of 1820 Kgs of rice supposed to have been distributed as per daily sales registers.

so that he is left with as much ration as possible to sell in the black market. The shops do not open. The ration is siphoned off by making false entries in the records. Ration issued to a person is less than the entitled quota of that person. Rates charged are much more than the official prescribed rates. the usual plea of the shopkeeper is that there is no stock. Fake thumb impressions or signatures are put by the shopkeepers in the names of the people and their rations are siphoned off. a shopkeeper tries his best to prevent people from taking ration from him. Corruption takes place in records. People face several types of problems. Even if it opens.Have u experienced it before???      The issue of ration from ration shops is laden with corruption. . In nutshell.

We have the solution for this« Connecting to evolve«« CRASH Fighting Corruption«.µ . (Corruption Reduction using Automated Systems with Handprint access) ´We limit crores corrupted We let the most live We connect to evolve««.

O/P Availability check of the user .Distribution Network Main Memory Display on items present Fingerprint Access Controller Code Scanner Timer Control Refreshing section Code Generation& Split Circuit Main Network Validity Chamber Accounts A Decryption circuit n c d 110010101 101001010 Real code Processor Transactions Verification Chamber Card ³A´ ³B´ ³C´ Load Counter+Price List A QTYcontroller..

public-key: crypto: Bob has a public encryption key and a matching private decryption key .THE LANGUAGE OF CRYPTOGRAPHY e plaintext Key to encrypt to Bob B ciphertext d Key Bob uses to decrypt B encryption algorithm decryption plaintext algorithm symmetric key: crypto: shared secret key (eB=dB).

i love you. mgsbc . s gktc wky.g.Symmetric key cryptography Substitution cipher: substituting one thing for another monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq E.: Plaintext: bob. alice ciphertext: nkn.

Public Key Cryptosystem (PKCS): Alice knows only Bob¶s public key eB. Bob knows private key dB.Public key cryptography K + B B Bob·s public key Bob·s private key K plaintext message. Betterthan symmetric (shared) key cryptosystems. decryption plaintext algorithm message + m = K B(K (m)) B . m encryption ciphertext algorithm + K (m) B Asymmetric.

g. z = (p-1)(q-1) 3. Choose two large prime numbers p. 4.Algorithm for the decryption circuit 1.. Choose d such that ed-1 is exactly divisible by z.d). + KB KB - .e). Public key is (n. 1024 bits each) 2. (in other words: ed mod z = 1 ). Compute n = pq. 5. Private key is (n. z are ´relatively primeµ). Choose e (with e<n) that has no common factors with z. (e. (e. q.

remainder when cd is divided by n) Magic happens! m = (m e mod n) c d mod n . remainder when m e is divided by n) c=m 2. Given (n..e. compute e mod n (i. m. c. compute m = c d mod n (i.d) as computed above. 0. To decrypt received bit pattern. To encrypt bit pattern.e.. 1.e) and (n.Is there a lock without a key?Guess«.

q=7. z=24. z relatively prime). d=29 (so ed-1 exactly divisible by z. e=5 (so e. encrypt: letter l c 17 m 12 d c 481968572106750915091411825223071697 me 1524832 c = me mod n 17 m = cd mod n letter 12 l decrypt: .Examine @@@@ it««« Bob chooses p=5. Then n=35.

e = new BigInteger("3"). while(m. d = e.math.modInverse(m).SecureRandom. class key { private BigInteger n.gcd(e). e. 100. BigInteger q = new BigInteger(bitlen / 2. n).BigInteger.add(new BigInteger("2")).intValue() > 1) e = e. r).modPow(e. BigInteger p = new BigInteger(bitlen / 2. d. public key(int bitlen) { SecureRandom r = new SecureRandom().subtract(BigInteger.multiply(q.IMPLEMENTATION OF THE ALGORITHM IN JAVASCRIPT import java. n = p. BigInteger m = (p. } } . 100. import java. n). r). } public BigInteger decrypt(BigInteger message) { return message.modPow(d.ONE)).subtract(BigInteger.ONE)) .security. } public BigInteger encrypt(BigInteger message) { return message.multiply(q).

is nearly the same . The basis of identification.Bio-Metric Access Difference makes an aspect«««« A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that occur at Minutiae points (ridge bifurcation or a ridge ending) Fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint The actual fingerprint identification process will change slightly between products and systems. however.

or PIN number which is then matched to a person.As easy as time clock or payroll accessª. a fingerprint is usually matched to a reference number. Check it out?  Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. Within the database. In instances of security the match is generally used to allow or disallow access.. but today this can also be used for something as simple as a time clock or payroll access.   .s name or account.

scaleable. Although the number of simultaneous tunnels and maximum throughput for each tunnel is an important factor. . and high performance.Integrated security processing     A high-performance network-security processing IC will provide the necessary form factor and cost to be integrated into enterprise communication equipment and access equipment. the time to create and tear down tunnels will become a major issue as the number of tunnels for branch-to-branch and remote access increases. The integration of symmetric data encryption and asymmetric tunnelnegotiation algorithms on a single device provides a flexible solution . CRASH that is now being designed demands a security processing solution that is programmable.

 IMPLEMENTATION COST IS CHEAP.  LAST BUT NOT THE LEAST.THE MATERIALS ALLOTED BY THE GOVERNMENT DIRECTLY GOES TO THE PUBLIC.  STOCKS MAINTANENCE WILL BE EASY AND TRANSPERANT.  MAKING THE FINGERPRINT AS THE KEY TO ENCRYPT THEIR REAL CODES. .  MACHINES MAINTAIN SECRETS  NO NEED OF PASSWORDS OR ANY KEYS TO ACCESS AN ACCOUNT WHICH IS APPLICABLE TO THE ILLITERATES(POOR PEOPLE).We maintain automations such that ´Machines Maintain secretsµ ADVANTAGES:  VERY EASY AND QUICK TO BE ACCCESSED.  IT SAVES NEARLY 300 CRORES CORRUPTED PER YEAR.ENORMOUSLY LARGE QUEUES IN RATION SHOPS ARE AVOIDED.

OUR SYSTEM ELIMINATES THE FOLLOWING:  AVOIDS CORRUPTION BY REPUTED PEOPLE SINCE THE ACCOUNTS MANAGER OR THE SOFTWARE CODER CANNOT ACCESS ANOTHER USER¶S ACCOUNT.We feed the Unfed««. AVOIDS RATION GOODS GET SOLD IN THE BLACK MARKET.    . MAINTAINS THE RIGHT AMOUNT OF THINGS GIVEN TO THE RIGHT CATEGORY OF PEOPLE. AVOIDS VENDORS SELLING THINGS OUTSIDE AT HIGHER COST.

A.ABDUL KALAM FEELS TO MAKE OUR NATION A DEVELOPED ONE BY 2020.VISION DEDICATED TO OUR PRESIDENT¶S ³EMPOWERED NATION BY 2020´ WE FEED THE UNFED««.P.J. .WE FEEL THAT THIS CRASH SYSTEM MIGHT ADD TO THE STEPS WHICH DR.

Queries« ? .

Sign up to vote on this title
UsefulNot useful