22 views

Uploaded by Sreeja Prem

- Empirical Study of a Key Authentication Scheme in Public Key Cryptography
- Security
- Csc112 - Computer Programming 1 Lab Manual 2014
- Hall Chapter 16
- Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor Network
- i 26043047
- encryption
- yadav-2015-ijca-905647
- 1. Information - PKI Technology - Dr. Ali M. Al-Khouri
- Public Key Encryption
- Ch09security (Copy)
- Dynamic Policy Update on Cloud for File Access
- Security Routing in Wireless Sensor Networks
- Curso Sencillo de PGP
- High Speed RSA Implementations
- History of Ciphers
- Project
- An Enhance Color Visual Cryptography Scheme
- Atmel 42141 SAM AT02333 Safe and Secure Bootloader Implementation for SAM3 4 Application Note
- CSCI_620_lecture3.pptx

You are on page 1of 42

ABSTRACT

This encryption algorithm is mainly designed for having a secured file transfer in the low privilege servers and as well as in a secured environment too. This methodology will be implemented in the data centre and other important data transaction sectors of the software will be done by the database administrator or system administrators and his trusted clients will have decoding process of the software.

Introduction

This is mainly designed for having a secured file transfer in the low privilege servers and as well as in a secured environment too This will be implemented in the data centre and other important data transaction sectors of the software by the

Trusted clients will have decoding process of the software. This software will not be circulated to the unauthorised customers.

Terms used

Encryption is the process of transforming information (referred to as plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. Cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. Cipher Text is the result of the encryption process.

Decryption is to make the encrypted information (cipher text) readable again (plain text). Key is a secret parameter (ideally known only to the communicants) for a specific message exchange context.

Cryptography Cryptography is the practice and study hiding information. Cryptography can be classified into two types:

of

Symmetric Key Cryptography Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key. This was the only kind of encryption publicly known until June 1976. Some of the examples of Symmetric-key cryptography categorically are: Block Ciphers Data Encryption Standard (DES), Advanced Encryption Standard (AES).

Public Key Cryptography In a groundbreaking 1976 paper, Whitfield Diffie and Martin Hellman proposed the notion of publickey (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are useda public key and a private key. In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption.

Public-key algorithms are most often based on the computational complexity of "hard" problems, often from number theory. Some of the examples are: DiffieHellman RSA

Existing System

One of the prominent algorithm is RSA. Decryption Key Encryption key. can be deduced from

Proposed System

We need an algorithm that can provide better security with smaller key values. We need to encrypt data that can provide greater security even in low privileged servers This can be achieved easily if simple mathematical operations are employed

Modules

This algorithm mainly comprises of two modules : 1. Encryption 2. Decryption

Encryption

Process of performing various substitutions and transformations on the text in order to secure data from intruders.

Steps in Encryption: 1.RSA 2.Decimal to Binary Conversion 3.4B/5B encoding 4.Binary to Decimal Conversion 5.Logarithmic series

RSA Encryption process RSA algorithm (named after its founders, Ron Rivest, Adi Shamir, and Leonard Adleman) has become almost synonymous with public key cryptography. Steps involved in RSA are: Choose two large prime numbers, p and q.

Compute n = pq and z = (p-1)(q-1). Choose a number, e, less than n, which has no common factors (other than 1) with z. (In this case, e and z are said to be relatively prime). The letter 'e' is used since this value will be used in encryption.

Find a number, d, such that ed -1 is exactly divisible (i.e., with no remainder) by z .The letter d is used because this value will be used in decryption. Put another way, given e, we choose d such that the integer remainder when ed is divided by z is 1. (The integer remainder when an integer x is divided by the integer n, is denoted x mod n).

The public key that is available to the world is the pair of numbers (n,e). The private key is the pair of numbers (n,d).

To encrypt a number, m, such that m < n. The encrypted value, c, of the plaintext message, m is:

c = me mod n

Number Conversion (Decimal to Binary) In this step decimal numbers are converted into binary numbers. The above arrived result through RSA c will be converted into binary number (0s and 1s). . Digital Encoding (4B/5B Encoding) In digital encoding, binary numbers are encoded using 4B/5B encoding. So the binary data is grouped into four bit nibbles and each nibble is encoded into equivalent five bit symbol as per 4B/5B encoding scheme

Number Conversion (Binary to Decimal) The binary number obtained by encoding scheme is converted back into equivalent decimal number, X. This conversion back to binary will be given different encrypted word because of the usage of 4B/5B line encoding. Mathematical Series (Logarithmic Series) The above obtained number X is substituted in the Logarithmic Series. So the final data f that is obtained is the result of log(X).

Decryption

Reverse process of encryption in which various transformations and substitutions on the encrypted data in order to get original data.

employed.

Mathematical Series (Exponential series) Exponential series is applied to the encrypted data obtained after encryption process, f. Exponential series is used because it is the reverse of logarithmic series because data on which logarithmic series is applied is obtained back. Number conversion (Decimal to Binary) In this step decimal numbers are converted into binary numbers. So the resultant value of exponential series is converted into binary .i.e. 0s and 1s.

Number conversion (Binary to decimal) The binary number obtained using number conversion is converted back into decimal number. RSA decryption process Decryption process makes use of decryption key pair (n.d) obtained in RSA encryption process. To decrypt the text c in order to obtained original message m, we employ decryption principle: m = cd mod n

Software Requirements

Hardware Specifications: HDD Capacity 250 512 MB RAM Pentium III

Software Specifications ; The required software products are JDK 1.6 Net Beans 6.8 IDE

SCREENS SHOTS

Conclusion

This methodology will give the security to the files of small sizes. The main complexity it creates for the hackers is in the understanding the type of operations used here. This methodology will definitely be an effective way to

the main goal of project and it has been implemented.

Bibliography

Bhargav Balakrishnan, Three tier encryption algorithm for secure file transfer, IEEE Transactions on computer engineering and applications, Volume 2, pages 259-263, (19-21) March 2010. William Stallings, Cryptography and networks, Fourth Edition.

Thank You ..

- Empirical Study of a Key Authentication Scheme in Public Key CryptographyUploaded byAnonymous 7VPPkWS8O
- SecurityUploaded byTamrat Amare
- Csc112 - Computer Programming 1 Lab Manual 2014Uploaded byRowan Nuguid Elomina
- Hall Chapter 16Uploaded byDaphne
- Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor NetworkUploaded byijdps
- i 26043047Uploaded byAnonymous 7VPPkWS8O
- encryptionUploaded bykantti
- yadav-2015-ijca-905647Uploaded byRavi Ranjan
- 1. Information - PKI Technology - Dr. Ali M. Al-KhouriUploaded byTJPRC Publications
- Public Key EncryptionUploaded byjfdooley3106
- Ch09security (Copy)Uploaded byNagesh Neutron
- Dynamic Policy Update on Cloud for File AccessUploaded byEditor IJRITCC
- Security Routing in Wireless Sensor NetworksUploaded bylavanya_ms
- Curso Sencillo de PGPUploaded byGleidy Ruth Carballo Sanchez
- High Speed RSA ImplementationsUploaded byrodrigofran
- History of CiphersUploaded byWolfgang Dielingen
- ProjectUploaded byAjay Krishna N
- An Enhance Color Visual Cryptography SchemeUploaded byIRJET Journal
- Atmel 42141 SAM AT02333 Safe and Secure Bootloader Implementation for SAM3 4 Application NoteUploaded byRăzvan Popa
- CSCI_620_lecture3.pptxUploaded byPruthvi Royal
- ssl-tls-hood-34297.pdfUploaded byKeraunos Thundebolt
- Himanshu-CVUploaded byengineeringwatch
- Security Technology in Information SecurityUploaded byEswin Angel
- Midterm Tit 704Uploaded bymm8871
- 43.pdfUploaded byInternational Journal of Scientific Research in Science, Engineering and Technology ( IJSRSET )
- isw99Uploaded bypostscript
- Design of Dual Cryptography EncoderUploaded byseventhsensegroup
- Coursera1.2.pdfUploaded bySalif Ndiaye
- collection wiki cybernetic bookUploaded byDrabrajib Hazarika
- 15_securitybasicsUploaded byAshika Mooruth

- PKCS V2.1 RSA Cryptography StandardUploaded byManikandan K Krishnankutty
- NET c sharpUploaded byarmadillo27
- A Novel Mechanism for Searching Keyword in Cloud by Using Dual-Server Public-Key EncryptionUploaded byLOGIC SYSTEMS
- Rsa MaterialUploaded byShubham Mathur
- Applications of MathematicsUploaded byRamdas Sonawane
- Comparison between RSA and Triple DES in Cloud EnvironmentUploaded byEditor IJRITCC
- 22. Comp Sci - A New Modulo - A. Uma MaheswariUploaded byTJPRC Publications
- Cn-lab Manual 2010Uploaded bypuneetugru
- Foundations of BlockchainUploaded byAnonymous WKNPkR
- Rfc 3447Uploaded bychetan666123
- Faulty RSA EncryptionUploaded byΟλυμπίδης Ιωάννης
- WEb securityUploaded bybhasker7
- CN Lab ProgramsUploaded byKavitha SA
- Branch PredictionUploaded byMadz Asmala
- mobile voting systemUploaded bysanam
- Public KeyUploaded bywpermadi
- Naiara Sanchez - Rabin Cryptosystem (1)Uploaded byMihaela Diminet
- Trust Service Principles and Criteria for Certification AuthoritiesUploaded byAries Syamsuddin
- CiberseguridadUploaded bydhfnx
- Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 AlgorithmUploaded byEighthSenseGroup
- Security BasicsUploaded byleonardo calderon
- tutorialUploaded byJonathas Valeriano
- pptUploaded bysanketh99
- A Seminar ReportUploaded bySalmaMubarakJ
- Security-Aware Packet Scheduling Scheme with Multi-Level Queuing and RSAUploaded byInternational Organization of Scientific Research (IOSR)
- Data ProtecManager 3 2 FUploaded bySaravana Kumar
- RSA and ECC Thesis.pdfUploaded byHarpreet Singh
- Good NotesUploaded byRajneesh Pal
- Cyber Law and ForensicUploaded byAvani Dubey
- FINAL1Uploaded byAnish Kumar