-
8/18/2019 Data Integrity in Network Security Without Code
1/14
By ARIJEET KUMAR
Registration number:-15MCA1025
Autenti!ation base" on #nger$rint using %ymmetri! an"
&isua' Cry$togra$y
-
8/18/2019 Data Integrity in Network Security Without Code
2/14
1 . Abstract.
2 . Introduction.
3 . Existing System.
4 . Implementation plan.5 . Modules.
6 . ools re!uired.
" . #e$erences.
% . ime&'ine ()art.
Contents
-
8/18/2019 Data Integrity in Network Security Without Code
3/14
)e combination o$ symmetric and *isual cryptograp)ytec)ni!ue is used to )a*e secured aut)entication basedon +nger print t)e proposed system consist o$ t,op)ases.
In t)e +rst p)ase- t)e +gure print image is di*ided into
t,o s)ares ,it) t)e )elp o$ *isual cryptograp)ytec)ni!ue. inally one encrypted s)are is stored in I/card and anot)er one is stored in /ata 0ase.
In second p)ase- actual aut)entication process isper$ormed based on t)e )umb Impression ,)ic) is
gi*en by t)e person. A$ter getting t)e )umbImpression- encrypted s)ares are decrypted and bot)s)ares are staced to generate t)e )umb Impressionare compared. I$ bot) are e!ual t)e person is allo,ed ornot allo,ed.
Abstra!t
-
8/18/2019 Data Integrity in Network Security Without Code
4/14
Introduction
1 ybrid encryption is a mode o$ encryption t)at merges t,o or moreencryption systems. It incorporates a combination o$ asymmetric
and symmetric encryption to bene+t $rom t)e strengt)s o$ eac) $orm
o$ encryption. )ese strengt)s are respecti*ely de+ned as speed andsecurity.
2. ybrid encryption is considered a )ig)ly secure type o$ encryptionas long as t)e public and pri*ate eys are $ully secure.
3.ybrid encryption is ac)ie*ed t)roug) data trans$er using uni!uesession eys along ,it) symmetrical encryption. ublic eyencryption is implemented $or random symmetric ey encryption.
.
0#I/ E(#I
-
8/18/2019 Data Integrity in Network Security Without Code
5/14
M/5 Is a ,idely used cryptograp)ic $unction ,it) a12%& bit )as) *alue. M/5 )as been employed in a ,ide
*ariety o$ security applications- and is also commonlyused to c)ec t)e integrity o$ +les . )e M/5 algorit)m uses 4 state *ariables- eac) o$
,)ic) is a 32 bit integer.
)ese $unctions- using t)e state *ariables and t)emessage as input- are used to trans$orm t)e state*ariables $rom t)eir initial state into ,)at ,ill becomet)e message digest.
A()*RIT+M ,*R ME%%A)E I)E%T I.M5
-
8/18/2019 Data Integrity in Network Security Without Code
6/14
/AA (MM7I(AIS SE(7#IMEAS7#ES◦ 'imiting net,or access
i. 7se o$ pass,ords8Is to accessin$ormation
ii. ire,alls
iii. istorical 9 statistical logging
i*. rotecting data during transmission userseit)er public or secret ey cryptograp)y
E/isting %ystem
-
8/18/2019 Data Integrity in Network Security Without Code
7/14
)ere are t,o type o$ using ey in #SA algorit)m a. public ey b. ri*ate ey
R%A is an algorit)m used by modern computersto encrypt and decrypt messages It is an asymmetriccryptograp)ic algorit)m. Asymmetric means t)at t)ereare t,o di;erent eys. )is is also called public key
cryptography - because one o$ t)em can be gi*en toe*eryone. )e ot)er ey must be ept pri*ate. #SAstands $or #on #i*ets- Aid S)amir and 'eonard Adelman
)e #SA Algorit)m $or (reating #SA ublic and ri*ate
-
8/18/2019 Data Integrity in Network Security Without Code
8/14
Mo"u'es
Tere are tree ty$e oA'goritm using in +ybri"!ry$tosystem
R%A A()*RIT+M:- R%A a'goritm using or e!ry$t an" En!ry$t ata
AE% A()*RIT+M:-Te AE% a'goritms use to be e!ry$te" ata
M5:-Te M5 are a'so using te Message igest an" it is i"e'yuse" !ry$togra$i! un!tion it 123 bit as 4a'ue
-
8/18/2019 Data Integrity in Network Security Without Code
9/14
E.CR6TI*.
IE
et %are" 8ey
R%AE.CR6TI*.
ATA
En!ryata
M
Re!ei4er7s ub'i! 8ey
-
8/18/2019 Data Integrity in Network Security Without Code
10/14
R%AECR6TI*.
AE%ECR6TI*.
M/5 (#EAI I7/AA
Re!ei4er7s ri4ate 8ey
e!ry$te" In$ut
ata
e!ry$te" %are"%e!ret Key
Message igest
RECEI&ER7% %IE
e!ry$te" ata
-
8/18/2019 Data Integrity in Network Security Without Code
11/14
-
8/18/2019 Data Integrity in Network Security Without Code
12/14
-
8/18/2019 Data Integrity in Network Security Without Code
13/14
A77S (0E# (0E# BEM0E#>
1
2
3
4
5
6IM(EME.TATI*.
IM'EMEAIImplementation plan
Proposed worked
and paper submission
Final
implementation
TIME-(I.E C+ART
To$i! se!tionan" abstra!t
-
8/18/2019 Data Integrity in Network Security Without Code
14/14
A