+ All Categories
Home > Documents > Data Integrity in Network Security Without Code

Data Integrity in Network Security Without Code

Date post: 06-Jul-2018
Category:
Upload: arijeetyadav
View: 226 times
Download: 0 times
Share this document with a friend

of 14

Transcript
  • 8/18/2019 Data Integrity in Network Security Without Code

    1/14

     By ARIJEET KUMAR

      Registration number:-15MCA1025

    Autenti!ation base" on #nger$rint using %ymmetri! an"

    &isua' Cry$togra$y

  • 8/18/2019 Data Integrity in Network Security Without Code

    2/14

    1 . Abstract.

    2 . Introduction.

    3 . Existing System.

    4 . Implementation plan.5 . Modules.

    6 . ools re!uired.

    " . #e$erences.

    % . ime&'ine ()art.

    Contents

  • 8/18/2019 Data Integrity in Network Security Without Code

    3/14

     )e combination o$ symmetric and *isual cryptograp)ytec)ni!ue is used to )a*e secured aut)entication basedon +nger print t)e proposed system consist o$ t,op)ases.

    In t)e +rst p)ase- t)e +gure print image is di*ided into

    t,o s)ares ,it) t)e )elp o$ *isual cryptograp)ytec)ni!ue. inally one encrypted s)are is stored in I/card and anot)er one is stored in /ata 0ase.

     In second p)ase- actual aut)entication process isper$ormed based on t)e )umb Impression ,)ic) is

    gi*en by t)e person. A$ter getting t)e )umbImpression- encrypted s)ares are decrypted and bot)s)ares are staced to generate t)e )umb Impressionare compared. I$ bot) are e!ual t)e person is allo,ed ornot allo,ed.

    Abstra!t

  • 8/18/2019 Data Integrity in Network Security Without Code

    4/14

      Introduction

    1 ybrid encryption is a mode o$ encryption t)at merges t,o or moreencryption systems. It incorporates a combination o$ asymmetric

    and symmetric encryption to bene+t $rom t)e strengt)s o$ eac) $orm

    o$ encryption. )ese strengt)s are respecti*ely de+ned as speed andsecurity.

    2. ybrid encryption is considered a )ig)ly secure type o$ encryptionas long as t)e public and pri*ate eys are $ully secure.

    3.ybrid encryption is ac)ie*ed t)roug) data trans$er using uni!uesession eys along ,it) symmetrical encryption. ublic eyencryption is implemented $or random symmetric ey encryption.

    .

    0#I/ E(#I

  • 8/18/2019 Data Integrity in Network Security Without Code

    5/14

     

    M/5 Is a ,idely used cryptograp)ic $unction ,it) a12%& bit )as) *alue. M/5 )as been employed in a ,ide

    *ariety o$ security applications- and is also commonlyused to c)ec t)e integrity o$ +les .  )e M/5 algorit)m uses 4 state *ariables- eac) o$

    ,)ic) is a 32 bit integer.

     )ese $unctions- using t)e state *ariables and t)emessage as input- are used to trans$orm t)e state*ariables $rom t)eir initial state into ,)at ,ill becomet)e message digest.

      A()*RIT+M ,*R ME%%A)E I)E%T I.M5

  • 8/18/2019 Data Integrity in Network Security Without Code

    6/14

    /AA (MM7I(AIS SE(7#IMEAS7#ES◦ 'imiting net,or access

    i. 7se o$ pass,ords8Is to accessin$ormation

    ii. ire,alls

    iii. istorical 9 statistical logging

    i*. rotecting data during transmission userseit)er public or secret ey cryptograp)y

    E/isting %ystem

  • 8/18/2019 Data Integrity in Network Security Without Code

    7/14

     )ere are t,o type o$ using ey in #SA algorit)m a. public ey b. ri*ate ey

    R%A is an algorit)m used by modern computersto encrypt and decrypt messages It is an asymmetriccryptograp)ic algorit)m. Asymmetric means t)at t)ereare t,o di;erent eys. )is is also called public key

    cryptography - because one o$ t)em can be gi*en toe*eryone. )e ot)er ey must be ept pri*ate. #SAstands $or #on #i*ets- Aid S)amir and 'eonard Adelman

     )e #SA Algorit)m $or (reating #SA ublic and ri*ate

  • 8/18/2019 Data Integrity in Network Security Without Code

    8/14

    Mo"u'es

    Tere are tree ty$e oA'goritm using in +ybri"!ry$tosystem

    R%A A()*RIT+M:- R%A a'goritm using or e!ry$t an" En!ry$t ata

     AE% A()*RIT+M:-Te AE% a'goritms use to be e!ry$te" ata

    M5:-Te M5 are a'so using te Message igest an" it is i"e'yuse" !ry$togra$i! un!tion it 123 bit as 4a'ue

  • 8/18/2019 Data Integrity in Network Security Without Code

    9/14

    E.CR6TI*.

    IE

    et %are" 8ey

    R%AE.CR6TI*.

    ATA

    En!ryata

    M

    Re!ei4er7s ub'i! 8ey

  • 8/18/2019 Data Integrity in Network Security Without Code

    10/14

    R%AECR6TI*.

    AE%ECR6TI*.

    M/5 (#EAI I7/AA

    Re!ei4er7s ri4ate 8ey

    e!ry$te" In$ut

    ata

    e!ry$te" %are"%e!ret Key

    Message igest

    RECEI&ER7% %IE

    e!ry$te" ata

  • 8/18/2019 Data Integrity in Network Security Without Code

    11/14

  • 8/18/2019 Data Integrity in Network Security Without Code

    12/14

  • 8/18/2019 Data Integrity in Network Security Without Code

    13/14

    A77S (0E# (0E# BEM0E#>

    1

    2

    3

    4

    5

    6IM(EME.TATI*.

    IM'EMEAIImplementation  plan

    Proposed worked

     and paper submission

    Final

    implementation

    TIME-(I.E C+ART

    To$i! se!tionan" abstra!t

  • 8/18/2019 Data Integrity in Network Security Without Code

    14/14

     

     A


Recommended