cryptology for security
TRANSCRIPT
PROJECT PRESENTATION ON
CRYPTOLOGY FOR SECURITY
GROUP MEMBERS : GROUP GUIDE :
1. MANDEEP KUMAR MR. NILAKSH
2. NISHANT PANDEY (ASSISTANT PROFESSOR)
3. SUMAN SAURABH
Objective: The main objective of this project (Cryptology for
Security) is to send the confidential details and relatedconfidential files and documents to their recipients ina securable way. Cryptology for Security will use thenumerous kinds of algorithms to generate theencrypted strings, files and decrypted strings, files.
The Secure Sockets Layer (SSL) is a commonEncryption protocol used in Cryptology. When yousee a URL in your Web browser that starts with"https" instead of "http", it is a secure connection thatis using SSL. Some methods of cryptography used a"secret key" to allow the recipient to decrypt themessage. The most common secret key cryptosystemis the Data Encryption Standard (DES), or the moresecure Triple-DES which encrypts the data threetimes.
The purposeful algorithms used by Cryptology will
be in the
forms of:
1. MD5
2. SHA1
3. RSA
Existing System:
1)In Existing system, the data will not be secure
through the
network because data transmission is done in
unencrypted format.
2) In Existing system, data will also be accessed
through the
unauthorized person.
3) The system does not provide security to the data
store in
database.
4) In Existing System, the security is not provided
throughout
the server and database.
Proposed System:
1)In Proposed System, the data will be secure
using the web
technology by using https enabled.
2) In Proposed System, the data will be accessed
through the
authorized person.
3) The system provides security to the data store in
the
database.
4) In Proposed System, the security is provided
throughout the
server and database by disabling the cookies etc.
The Cryptology has been divided into 5 different
modules:
1. Administrator
2. User
3. Cryptic messages
4. Cryptic files.
5. Image transformation
Administrator:
Administrator is a super user in the system. He will
monitor all
the users’ activities in the system. He has
privileges to do
anything at any point of time. He is responsible for
providing
secure mechanism for the user of the system to
send their
confidential data in a secure way.
User:
User will register in to site and send his confidential
data in a
secured way by using Crypto log technology facility
provided in
the application.
Cryptic messages:
In this module user will send his confidential
messages in an
encryption format so that receiver will receive the
data and he
will decrypt to get original data. So that data will
transmitted in
a secure way.
Cryptic files:
In this module user will send data file in an
encryption format
so that receiver will receive the data and he will
decrypt to get
original data. Application provides a facility to send
files in a
secured way.
Image transformation:
In this module user will transmit data in the form
of image and he can encrypt the image and
transform to receiver. Receiver will receive the
data and he will decrypt to get original data. By
using this application user can send images also
in a secured way.
Administrator Sequence
Diagram
User Sequence Diagram
JAVA WEB APPLICATION
ARCHITECTURE
Model1 Model2
MVC1 MVC2
MODEL1
• Use either servlet component or jsp component
as main web component of application but not
both.
• The main web component of web application
contain multiple logics.
Advantages• multiple programmers are not required.
• Knowledge of multiple technology is not required.
• Use model1 to develop small web application.
Disadvantages of MODEL1
• Every component contains multiple logics so
there is no clear separation b/w logics.
• The modification done in one logic effect other
logics.
• Maintenance & enhancement of web application
become quite complex.
• Parallel development is not possible.
• Productivity is poor.
MODEL1 ARCHITECTURE
BROWSER
Browser
Web Server
Web Application
JSPJSP JSP
JSPJSPJSP
Database
Request
Response
MODEL2
M---- Model (represent data)
V---- View (represent representation logic)
C--- Controller (representation Integration
logic)
Controller monitor and control all the activities of
the web application.
Integration logic responsible to take request from
client to pass the request to the model
component to gather results from model
component and to pass the request to view.
MVC1
Here we take single component having VIEW,
CONTROLLER layer logics and we take separate
components for MODEL layer.
MVC1 gives clear separation b/w logics compare
to MODEL1, but if we want more clean separation
b/w logics go for MVC2.
MVC1 is good to develop medium scale
application.
Servlet/JSP to java class/Java bean
communication comes under MVC1.
MVC1 ARCHITECTURE
BROWSER
Browser
Web Application
Database
Request
Response
VIEW
+
CONTROLLER
Servlet
Or
JSP
MODEL
MVC2
Here we take separate components for
VIEW,CONTROLLER and MODEL layer.
Because of multiple layers, we get clean
separation b/w logics.
Modification done in one layer does not effect
other layer logics.
Enhancement & maintenance of project becomes
easy.
Parallel development possible.
Productivity is good.
It is industry standards to develop the web
application.
MVC2 ARCHITECTURE
BROWSER
Browser
Web Application
Database
Request
Response
CONTROLLER
Servlet
MODEL
VIEW
(JSP)
Software Requirements:
Operating System :
WinXP/Win7/Win8/10/Linux
User Interface : HTML, CSS
Client-side Scripting : JavaScript
Programming Language : Java
Web Applications : JDBC, JNDI,
Servlets, JSP
IDE/Workbench : My Eclipse
Database : Oracle11g
Server Deployment : Tomcat
Hardware Requirements
Processor :Core 2 Duo/intel i3/i5/i7
Hard Disk :40GB
RAM :512mb/1 GB/4GB