Sie sind auf Seite 1von 48

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

CHAPTER 1

INTRODUCTION
1.1 BACKGROUND
In present day, the increasing reliance on computer systems has led to the
dependence on confidential security measures. Protection of data for the computer users
who are entrusted with sensitive data has always been a primary concern.
Windows password policies came into effect for the reason to safeguard user
sensitive data . Password has become one of the most ubiquitous modern day security
tool and is very commonly used for authentication. There passwords are string of
characters used for authentication or user access. Still the need for stronger solution
arises as some of the password policies are not enough to safe guard personal and
organizational data. Stronger policies make it difficult for users to recall the password
forcing them to note it down, adding to potential risk.
In windows, the password feature is connected to user accounts providing the
administrator user the right of creation and modification of user accounts. There were no
road maps in windows which would ensure that the password entered is secure enough or
no, which was a major drawback. Then the password policies came into existence that
made sure that the systems were protected by certain guidelines either set into the systems
or enforced by the organizations. However, the general adoption of these policies were
not extensive. The enforcement of some policies were such that the user had to abide by
it, such as, changing of password every day or every week in organizations. A program
known as LC5 is capable of cracking simple passwords with eight characters in a count of
Dept. of CS&E, 2015-16

Page 1

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


seconds. As a matter of fact, most passwords dwell between 5 to 8 characters. Generally
in windows password are stored in encrypted hashes. LC5 attack these hashes with
hundreds of hashes per minute. Eventually the correct password will be sent and then
displayed to the screen.
The data contained within the organizations are supposed to be so sensitive that
there is a need for it to be kept highly secured. In this process, organizations tend to
impose stringent password policies. The strictness of these policies may differ from
one organization to the other. However, overall these policies are deemed as user
unfriendly by those on whom these policies are imposed. Rightly so, for example, the
policy may say, password must contain an alphabet, a capital letter, a number, an
alphanumeric symbol, and must be between 8 to 15 characters. As a user it is very
painful to follow this policy and expect to remember the password every time.
Moreover the policy may force the user to change the password every day or every
week. When users cannot cope with the demands of strict password policies, it
a) Reduces their productivity, and
b) Leads them to adopt coping strategies - which usually reduce security.

Dept. of CS&E, 2015-16

Page 2

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Biometric seems to be an obvious solution for the vulnerabilities. However it
requires the assumption of unrealistic precondition for performance gain. Various
problem may come about when presenting biometric authentication with T-FA systems.
Performance gain with respect to recognition rates is often achieved due to the
assumption of unrealistic condition. Resulting performance distortions may not be
recognised at first sight, yet these could led to serious security vulnerabilities. Access
control systems require time-trusted and reliable personal recognition. To overcome the
problem faced by these processes individually, we can use combination of the two or
more security processes. A very good example of the flaws in Biometric is that It is
common for the finger print of the person to get affected in Chemical companies. Voice
of the person may change with age, throat infection or due to background noise in the
environment. The eyes of diabetic patients are affected resulting in differences. Moreover,
the biggest drawback is that Biometrics is an exceedingly expensive security solution.

1.2 Overview of the Present Work


File Security is a feature of our file system which controls which users can access
which files. The file system considers the users identity, and what kind of action the user
is performing, and consults the files permissions.
Two-factor authentication has ameliorated security in authentication systems.
Sensitive files can be provided double protection using Rijndael security extension
and Mobile Bluetooth tokens. So, we are using Bluetooth as a token in the Two Factor
Authentication System [T-FA] along with the powerful Rijndael Encryption, which will
not only provide a solution to all these disadvantages, but also produce a password
decentralized user friendly security system.

Dept. of CS&E, 2015-16

Page 3

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Fig 1.2.1:- Pictorial description of two factor authentication system

The project aims on the aspect of developing the proper and cost effective
security system. The key feature for security in this project is MAC address and
Bluetooth. The key used here is the private key and it uses block cipher for encryption
and decryption. Here the computer and phone is used for working. The application run
on server side i.e. computer and authentication of authorized devices are done on client
side i.e. phone.
In order to protect the file against unauthorized reading and undetected mutilation,
a user encrypts it with a secret cryptographic key of a symmetric cryptosystem. This
symmetric key is needed to encrypt or decrypt data with it. The cryptographic keys are
used in data encryption to make the file more secure. The same key must be used to
decrypt the data. This means that we have to either memorize the key or store it
somewhere. Memorizing it isnt practical, so we must store it so that we can recall it
when we want to decrypt the data back into its meaningful form, but no one else can.
Dept. of CS&E, 2015-16

Page 4

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


For storage we use windows registry. There are many useful adjustments to the
windows configuration or behaviour that can be made by simple editing of the
registry. Unless you are the administrator, registry cannot be edited.

1.3 Problem Statement


To develop Bluetooth technology based security enhancement mechanism for folders in
windows.

1.4 Objectives
The following are the objective of this project:

To enhance the safety and security of the windows system.

To provide protection to personal and organisational data.

To produce a password decentralized user friendly security system.

To develop the cost effective and efficient security system.

1.5 ORGANIZATION OF THE PROJECT REPORT


The report is organized as follows.

Chapter 2 gives brief description of prior works that are carried out on Gender
Classification.

Chapter 3 gives the brief description about various requirements like functional,
non-functional and hardware/software requirements.

Chapter 4 gives the overall architecture of the system and an overview of major
algorithm used in the project.

Chapter 5 gives the brief description about how the project is implemented. The
various modules have been explained in brief.

Dept. of CS&E, 2015-16

Page 5

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Chapter 6 gives brief description of the testing done on the modules to see if they
are successfully implemented and work as required.

Chapter 7 concludes the report along with future enhancements that can be
incorporated later.

Dept. of CS&E, 2015-16

Page 6

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

CHAPTER 2

Literature survey
2.1 Summary of prior works
This chapter describes abstraction of few of the related work, in terms of the
problem taken in hand, their approach and finding.
Wankhade S.B, Damini A.G, Desai S.J, Khanapure A.V An innovative
approach to File Security Using Bluetooth International Journal of Scientific
Engineering and Technology 2013[1]
This paper try to solve the problem of stealing and editing a stored private data
using different encrypting algorithms. File Encryption XP system that can encrypt
files of any type using Blowfish algorithm. It protects information against being
viewed or modified without Authorization. MEO is file encryption software for Mac
or Windows that will encrypt or decrypt files of any type. Protect sensitive data
against unauthorized viewers with the latest data encryption technologies to keep
your documents safe and secure. User can easily send encrypted emails, or create
self-extracting encrypted files so the receiver can open the encrypted files on any
Windows or Mac computer without needing to install the encryption software on
their machine. File Encryption XP encrypts files and folders using a strong blowfish
algorithm with 384-bit key, and no encryption passwords are saved within the
encrypted files. File Encryption XP has a deletion method that will completely
remove files after encryption so that the only remaining file is the encrypted version
and no unencrypted temporary files ever created. File Encryption XP has a built-in

Dept. of CS&E, 2015-16

Page 7

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


password generator allows generating new passwords according to the criteria the user
specify. Strong passwords are ones containing upper and lower case letters as well as
numbers and so they are almost hard to guess. The program adds items into Windows
Explorer popup menu to simplify encryption, decryption and wiping tasks. Safe
House Pro promotes data privacy and help you to protect your confidential files. It is
inevitable that sooner or later your sensitive data will be at risk. Maybe your laptop
gets stolen. Maybe that memory stick in your pocket ends up at the dry cleaners. The
more portable your data becomes, the more careful you need to be. And that is the
reason why Safe House is used for file encryption.
A.V Nadargi et al. Study of Securing Computer Folder with Bluetooth
International Advance Research Journal in Science 2015 [2]

In this paper algorithm used is AES. In AES raising the key size by 64 bits leads
to increase in energy usage of about 8% without any data transfer. In case of AES
higher key size leads to modification in battery and time usage.
This paper makes the comparison between the short range wireless communication
technologies and describes why Bluetooth is the most efficient short range wireless
communication compared to others. There are several standards available for
transferring keys between the elements of the system wirelessly in a short range.
The most three popular technologies are Wi-Fi, Bluetooth and IrDA

Wi-fi. :
Wi-Fi is the name of a popular wireless networking technology that uses radio

waves to provide wireless high speed Internet and network connections. Wi-Fi is
simply a trademarked term meaning IEEE 802.11x. Wi-Fi works with no physical
wired connection between sender and receiver by using radio frequency (RF)
technology, a frequency within the electromagnetic spectrum associated with

Dept. of CS&E, 2015-16

Page 8

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


radio wave propagation. When an RF current is supplied to an antenna, an
electromagnetic field is created that then is able to propagate through space. The
cornerstone of any wireless network is an access point (AP). The primary job of an
access point is to broadcast a wireless signal that computers can detect and "tune"
into. In order to connect to an access point and join a wireless network, computers
and devices must be equipped with wireless network adapters.

IrDA
As infrared data communications, based on standards from the Infrared Data

Association (IrDA), become widely available on personal computers and peripherals,


a timely opportunity exists for effective and inexpensive short range wireless
communications on embedded systems and devices of all types. The IrDA standards
were developed rapidly (compared to most standards organizations), and information
on the IrDA protocols has not yet reached every corner of the embedded systems
universe. The Infrared Data Association (IrDA) is an industry based group of over
150 companies that have developed communication standards especially suited for
low cost, short range, cross-platform and point-to-point communications at a wide
range of speeds.

Bluetooth
Bluetooth is a Radio Frequency (RF) specification for short range, point-to-point

and point-to-multi-point voice and data transfer. Bluetooth will enable users to
connect to a wide range of computing and telecommunications devices without
the need for proprietary cables that often fall short in terms of ease-of-use. The
technology represents an opportunity for the industry to deliver wireless solutions
that are ubiquitous across a broad range of devices. The strength and direction of
the underlying Bluetooth standard will ensure that all solutions meet stringent
expectations for ease-of-use and interoperability.

Dept. of CS&E, 2015-16

Page 9

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Properties

Bluetooth

Operating range

Operates
2.4GHz
which

IrDA
in

the Operates within the Operating range upto

ISM
is

Wi-Fi

band range of at least 1 155ft

globally meter

available

that

indoor

and

can 1500ft outdoors

further be extended
2 metres

Ways of

Omni-directional, non Two

communication

line

way Use

sight communication(Bi

of

transmission(through

directional)

point

to

multipoint
configuration

wall)
Spread Spectrum Uses frequency hope Uses

direct Uses

DSSS,FHSS,

Spread orthogonal frequency

Spread

sequences

Spectrum(FHSS)

Spectrum(DSSS)

division
multiplexing(OFDM)

Data

Transfer Difference data rate as Data transfer rate Provides data rate of

Rate

per

version.

Ver1.2 ranges from 9600 1Mbps,

upto 1 Mbps

b/s

with

2Mbps,

primary 11Mbps(802.11b)

Ver 2.0-EDR upto 3 speed cost and steps 54Mbps(802.11a)


Mbps

of 115 kb/s

Ver 3.0-HS upto 24


Mbps
Cost and power Low cost

Consumes

consumed

power

Speed

Speed is 1 to 2 Mb/s

Maximum
upto 4Mb/s

less Cost

is

high

comparatively
speed Speed ranges from 11
to 300 Mb/s

Table 2.1 Difference between Bluetooth, Wi-Fi, IrDa

Dept. of CS&E, 2015-16

Page 10

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

2.2 Outcome of the review- problems identified


The gaps identified based on the above literature survey are as follows:

Blowfish algorithm was used which was less secure than the Rinjdael
Algorithm.

Authentication was done only once.

No master password was used. Password was shared from mobile.

Need for different mobile platform applications.

2.3 Proposed work

Get Bluetooth enabled in your laptop and PC.

Write an interface to discover Bluetooth devices.

With an Admin password authenticate the MAC address. MAC address of your
mobile gets stored in Registry of the System.

Your application will start as a background process as soon as you start your PC.

In the configuration mode select a

folder

as

your

Working

folder.

The program must have a timer to read contents of all files of all types including
video of that folder.

The program implements a Handshake protocol with your device in every 5


seconds.

As soon as you go away from PC, it encrypts all the files of the folder and log off
your account.

Soon as you Log in to the account, it searches for your Bluetooth Mac address. It
prompts you with the password. If password matches, decrypts all the files.

If somebody else logs into your system, Bluetooth device if any do not get
matched. hence the application never ask for password.

Dept. of CS&E, 2015-16

Page 11

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

2.3.1 Proposed System


The system uses Two Factor Authentication [T-FA] system with the use of mobile
phones tokens utilizing Bluetooth and Rijndael Encryption. It focuses on the following
basic thought. The discovery of Bluetooth devices is done through the Bluetooth enabled
computer or laptop. User authorized Bluetooth MAC address, which is unique for every
Bluetooth device is then stored in the database. Protection is enabled for the folder which
has been selected by the user. The implementation of handshake protocol then takes place
to check whether the authorized Bluetooth device is present in the vicinity. Unavailability
of the authorized Bluetooth device in the locality will lead to the encryption of all the files
contained in the folder and the software to log off. The decryption of the files will only
take place after a successful log in and the availability of authorized Bluetooth device. In
such a case, user will be prompted for a password and all files will be decrypted upon
successful password matching. Password will never be asked in case of absence of
authorized Bluetooth device.

Dept. of CS&E, 2015-16

Page 12

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 2.3.1:- Pictorial representation of the working of the proposed work

Dept. of CS&E, 2015-16

Page 13

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

2.3.2 Implemented System


This initiates with first time registration where user identification details are to be
entered. The system does not accept incorrect details. Only if all the text fields are
filled with correct data, the registration gets validated. If anyone field (e.g. date of
birth) has been incorrectly entered by user, the registration page does not get validated
and an error is shown.
It should be noted that an account gets created based on the user profile when
the systems predefined set of rules are followed and all the data fields are correctly
filled. Once the user account is created system initiates pairing with remote Bluetooth
device so that to complete creation of user profile. The page scans all the available
remote Bluetooth devices in the systems vicinity and pairs with the users remote
Bluetooth device. Pairing with more than one Bluetooth device is forbidden by the
system. The remote device acts as an authentication pass in two factor authentication.
Successful user profile creation will lead to an encryption page would appear on the
computer screen that depicts that, once users paired remote Bluetooth device is out
of systems Bluetooth range, system will encrypt all the files in the folder for which
protection has been enabled. The system will give an error if any user other than the
primary authorized user is trying to register an account in the system. System allows
only one authorized registration. When user exits the system and logins the next time,
system will seek the user id and password. If the users username and password
doesnt match then the system does not allow the user/intruder access to the files.
The decryption module in protection page portrays that it is necessary for the
remote Bluetooth device to be present at all times in order to decrypt the protected
folder. In absence of remote Bluetooth device the folder cannot be decrypted and an
error message will be seen. Even in the presence of the remote Bluetooth device, it is
Dept. of CS&E, 2015-16

Page 14

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


mandatory for the user to enter the account password to decrypt a file. If an intruder
gets access to the remote Bluetooth device and enters an incorrect password, the
protection page in the system will flashes an error message. However, if the users
paired remote Bluetooth device is in the systems Bluetooth range and the password
entered by the user is correct, successful decryption of the protected files will take place.

Bluetooth
The idea Bluetooth was proposed in 1997 by Jim Kardach who formulated a
system that would allow mobile phones to communicate with computers. The Bluetooth
logo is a bind rune merging the Younger Futhark runes and Harald's initials. Bluetooth
network devices exhibit a master-slave relationship.
Bluetooth specifies three basic security services namely
1. Authorization
2. Confidentiality
3. Authentication
Bluetooth device Media Access Control address (MAC address) is absolutely unique.
Speed of Bluetooth devices ranges from 1 to 2Mbps. It has a low cost as compared to WiFi and consumes very less power. Bluetooth is of the most efficient system in point-topoint and point-to-multi-point voice and data transfer.

Dept. of CS&E, 2015-16

Page 15

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Fig. 2.3.2 Characteristics of Bluetooth


The contribution of Bluetooth in T-FA System is as follows:
Authentication: Connect to a particular device only if the device is known to the system,
otherwise the connection is terminated. MAC Address of the device determines the
familiarity of the Bluetooth device.
Authorization: Only registered Bluetooth device can access to the protected data.
Confidentiality: The fact that Bluetooth devices have a range of only 1 meter, there
wont be any spoofing because once the device leaves the Bluetooth vicinity, the
protection of personal files and folders get activated.

Rijndael Encryption
The Advanced Encryption Standard (AES), also cited as Rijndael (its original
name), is an encryption of electronic data specification which was established by the
U.S. National Institute of Standards and Technology in the year 2001.
AES is grounded on the Rijndael cipher developed by two Belgian cryptographers,
Joan Daemen and Vincent Rijmen, who presented a subject matter to NIST during the
AES selection process. Rijndael is a family of ciphers with varying key and block sizes.
Dept. of CS&E, 2015-16

Page 16

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Rijndael algorithm was preferred for this implementation since it is widely considered
very difficult to solve. Also performance of Rijndael algorithm is complex which makes it
difficult to crack.
Rijndael is one of modern symmetrical cryptography algorithm, which has 4 processes in
each round:
1. Sub Bytes Transformation,
2. Shift Rows Transformation,
3. Mix Columns Transformation,
4. Add Round key

Rijndael has various distinguishing strong points due to which it is a part of this security
system. The design philosophy of Rijndael adopts three main principles namely:
1. Simplicity: Rijndael is described as having a 'rich algebraic structure' which grants the
cipher's security to be easily evaluated in a restrained time frame. This is an advantage
over more complex designs which has a requirement of extensive thinking, searching and
'bit tracing'.
2. Performance: Rijndael is a consistent performer in both hardware and software across
broad range of computing environments. Its key setup time coupled with key agility is
splendid. Rijndael is perfectly fitted for restricted space environments due to its low
memory requirements. The extra security in Rijndaels procedures are amongst the easiest
to defend versus power and timing attacks.

Dept. of CS&E, 2015-16

Page 17

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

3. Usage of well-understood components: Rijndael's implementation is very elastic


because it can be used with varying key sizes and block sizes. Change of sequence of
some steps in Rijndael does not affect the cipher. It is a simple and elegant structure does
not involve any complex components. Instead, it profits from the advantages earned by
the use of simple components in a well-defined structure.
Design simplicity of Rijndael facilitates understanding the mechanisms that give the
algorithm its high resistance against differential cryptanalysis and linear cryptanalysis, to
date the most important general methods of cryptanalysis in symmetric cryptography.

Dept. of CS&E, 2015-16

Page 18

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

CHAPTER 3

System Requirements
3.1 Functional Requirements
The system behaviour is provided by the functional requirements. These
behaviours are expressed as either as a service provided to the user, and internal
functioning of the system. These can be the system design, specifications, guidelines for
the usage of the system, modules involved in the system and so on.

3.1 Functional Requirements are as follows:

System should allow any type of Bluetooth enabled device to be paired with
system.

System should browse the desired folder with different type of content to be
locked.

Specified MAC address of the users phone should be the authorised user, for
unlocking and access the folder.

Input (password) for unlocking the folder should be taken from the keyboard only
when the device is in connection.

Dept. of CS&E, 2015-16

Page 19

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

3.2 Non-Functional Requirements


These requirements are specific to criteria. These are used to judge the operation of a
system, than specifying the behaviour. There are two kinds of non-functional
requirements. They are:

1. Performance requirements

Secure and efficient way to decrypt the password for unlocking the desired folder.

2. Normal requirements

The code should be able to provide security to any kind of folder.

The system should be simple and easy to use.

It should detect all type of Bluetooth devices irrespective of platform.

It should run on all versions of windows.

3.3 Software/Hardware Used:


The software and hardware requirements of the proposed system:
Software used:

Windows XP/Windows 7/Windows 8/Windows 10(64-Bit)as an Operating System

Java Eclipse Mars JDK 8U45/8u92

Java 1.6 and above

Hardware requirements:

2GB RAM

Core i3 processor

Dept. of CS&E, 2015-16

Page 20

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

20GB hard disk(HDD)

Bluetooth (IEEE 802.11)

Dept. of CS&E, 2015-16

Page 21

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

CHAPTER 4

System Design
Design Process is nothing but the representation of the System, or is a process
producing a mode, which will be used to develop or build the system. The input for the
design process is the System Requirement Stage and the output Is Design of the
Proposed System, while the System Requirement Stage is entirely in Problem domain,
design is the first step in moving from the problem domain to solution domain.
Design is essentially a bridge between the Requirement Specification and the final
solution for satisfying the requirement. Thus it is essentially a blueprint for a solution for
the system.
Software design sits at the technical kernel of the Software Engineering Process
and is applied regardless of the development that is used. Once the Software Requirement
is specified, software design is the first of the technical activities design, coding and
testing.

4.1 Architecture
The following below 4.1 figure gives the detail step by step procedure of the project

Dept. of CS&E, 2015-16

Page 22

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Select a folder as
working folder

Unlock the
folder

MAC address is
authenticated

Implements handshake
protocol with device

In every 30 sec

NO

Is Device
is in range
?

YES

Keep the
working
folder open

Lock the
folder

Logs out of the


system

Searches for
Bluetooth

Figure 4.1 Pictorial view of step by step procedure of the project

Dept. of CS&E, 2015-16

Page 23

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

4.2 Algorithm
The following provides an algorithm for securing the folders in windows system.
Step1: Start
Step2: Reading a folder path and its content.
Step3: Reading password from user.
Step4: Scanning for bluetooth Mobile.
Bluecove v2.1.1 will run with the windows socket api ( WINSOCK ) and search for
the nearby devices.winsock is a technical specification that defines how windows
network services.
Step5: Storing the folder name(path),password and MAC address configuration in the
registry.
Step6: Encripting the folder with the rinjdael algorithm.
Step7: Scanning the bluetooth Mobile, if present Decrypt the folder with the correct
password. Else encrypt the folder.
Step8: End of algorithm.

Dept. of CS&E, 2015-16

Page 24

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 4.2 gives the pictorial view of the algorithm working.

Dept. of CS&E, 2015-16

Page 25

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


The below figure 4.2.1 gives the password cycle. How passwords are generated and kept
with yourself and what process are to be followed in case of the forgetting the password.

Choose
Your
password

Reuse your
password

Forget your

Commit your

Live with your


password

Figure 4.2.1: Password cycle

Dept. of CS&E, 2015-16

Page 26

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

CHAPTER 5

IMPLEMENTATION
5.1 MODULE 1: GRAPHICAL USER INTERFACE
Objective of the module

: To provide user a simple interface to interact with the


application

Input of the module

: Folder directory path, password, MAC address

Output of the module

: Options to lock or unlock the folder.

Decription of the module :This module provide the graphical interface for user to
interact and easily submit its input, and also to call the various function. It takes input for
folder path, password which is to be sent as cipher key and device MAC address. It also
provide options to change the authenticated device and password used.

Pseudocode:
Click lock folder tab
Browse directory()
Folder_pathdirectory path
If(! New file(path).isDirectory()){
Print(valird or not)
}
Click password tab
Get password()
Match password()
Passwordsetpassword
Dept. of CS&E, 2015-16

Page 27

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Click device tab
Call devicedetector()
Select device
DeviceMAC address
END Module

Figure 5.1.1:Browisng the folder path for locking

Dept. of CS&E, 2015-16

Page 28

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 5.1.2 Entering the password for future unlcoking the folder

Dept. of CS&E, 2015-16

Page 29

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 5.1.3 Listing of the nearby Bluetooth devices which are turned on

Figure 5.1.4 Selection of the nearby Bluetooth devices from the list.

Dept. of CS&E, 2015-16

Page 30

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

5.2 MODULE 2: BLUETOOTH SCANNER

Objective of the module

: To scan the nearby bluetooth devices.

Output of the module

: Returning the list of nearby bluetooth devices


MAC adress

Decription of the module

: In this module we are discovering the list of the

bluetooth devices which are in the range of the system and returning the list of the MAC
address of the bluetooth devices for configuration.
In this module a variable device address is defined which holds the Mac addresses of the
bluetooth devices and variable status is defined which contain status of the device as
AVAILABLE/UNAVIALABLE/UNKNOWN
Function device discovery is called to initailize the variables.

Pseudocode:
Class devicedetector{
Enum status
Device address
Vector<string>devices
Call scanner() {
Scans the all nearby Bluetooth devices
Activate bluecove on winsock
StatusCall get status()
Dept. of CS&E, 2015-16

Page 31

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Device addressdevice.mac
}
}

5.3 MODULE 3: Configuration of System


Objective of the module

: Selecting the desired folder and respective Mac

address along with the password and storing them in registry.


Input to the module

: MAC address sent by the Bluetooth scanner

Output of the module

: storing the desired folder and respective Mac

address along with the password in the registry


Decription of the module

: In this module the particular MAC address is given

authorization for locking and unlocking the particular folder with the help of password.
A class prefernce is defined to stored the particular folder path, MAC address and
password associated with it. Storing the configuration with details in the registry with file
name f1.config

Pseudocode:
Click configure button
Class preference{
Folder path variable
Device mac variable
Password variable

Dept. of CS&E, 2015-16

Page 32

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Call preference()
Ask user to save the configuration
If true
Save the log into f1.config file
Call crypto()
Else call devicedetector
}

5.4 MODULE 4: Encryption/Decryption


Objective of the module

: Encrypting and decrypting the content of the folder

Input to the module

: Password or cipher key from the user

Output of the module

: Encrypted or Decrypted content of the folder

Decription of the module

: In this module 128 bit key size Rijandael algorithm

is used for encrypting and decrypting the content of the folder.


Without the authorized MAC address and passowrd folders can not be encrypted or
decrypted. A class crypto is called to encrypt the folder with 128 bik keysize. Avariable
secret key is defined to hold the password for encrypting. After class crypto class
decryptfile is called for decrypting the folder.

Pseudocode:
Class crypto(){
Function getinstance(AES/CBC/PKCS5Padding)

Dept. of CS&E, 2015-16

Page 33

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Secretkey
password
Folderpathget folder_path()
Encrypt the content with rijndael algorithm
}
Class decryptfile(password, folder path, byte iv){
Cipher= cipher.getinstance (AES/CBC/PKCS5Padding)
Secretkeypassword
Decrypt the content
}
End of module

Dept. of CS&E, 2015-16

Page 34

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

CHAPTER 6

TESTING AND RESULTS

6.1 TESTING
Testing is an important phase of a software development life cycle. It allows us to
check the accuracy of the applications and validity of it with respect to the requirements.
Testing phase provides a method to identify the possible error in the application. It
helps the developer to predict the types of mistake what an end user might perform
while running the application. If errors are found then a recovery strategy can be
implemented to come out of the error.
The various types testing can be:
Structural testing: also known as white box testing. It a method of testing an
application based on the internal implementations. This requires deep knowledge
about the implementation it or to perform testing. It allows a testing engineer to
compute error present at the code level.
Functional testing: also known as black box testing. This is testing method where
the application is tested based on inputs they provide to the application and what
respective output they are going to get. This type of testing may not require in depth
knowledge about the implementation.
The following shows the test cases that are designed during testing phase.

Dept. of CS&E, 2015-16

Page 35

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

TEST 1

Table 6.1.1 Module test for selecting the Desired Folder


Sl. No. Of Test Case:

Item/Feature to be Tested:

Folder Selection

Folder Selection

Sample Input:

Folder Directory with Folder

Directory

with

different type of content different type of content


(mp3, mp4, jpeg, pdf (mp3, mp4, jpeg, pdf
etc.)
Expected Output:

etc.)

Desired Folder Path is Desired Folder Path is


retrieved

Actual Output:

Remark

Dept. of CS&E, 2015-16

GUI

displaying

retrieved

the GUI

displaying

Folder Path

Folder Path

Test Passed

Test Passed

the

Page 36

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


TEST 2:
Table 6.1.2 Checking for platform independence of Bluetooth devices in the range

Sl. No. Of Test Case:

Item/Feature

to

Tested:

Sample Input:

Expected Output:

Actual Output:

Remarks

Dept. of CS&E, 2015-16

be

List of Bluetooth
devices in range to be
displayed
(Symbian, java, android,
Mac, windows)
MAC addresses of
Bluetooth devices

List of Bluetooth
devices in range to
be displayed
(Symbian, java,
android, Mac,
windows)
MAC addresses of
Bluetooth devices

List of Bluetooth
devices
MAC address

List of Bluetooth
devices
MAC address

Limited devices found


(error exception)

List of Bluetooth
devices

Test failed

Test passed

Page 37

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


TEST 3:
Table 6.1.3 Authentication and unlocking the folder.
5

Authentication of MAC
address.

Authentication of MAC
address.

Folder path, mac address,


password

Folder path, Mac


address, password

Expected Output:

Folder to be decrypted only


with connection with the
particular device.

Folder to be decrypted
only with connection
with the particular
device.

Actual Output:

Folder was decrypted even


without connection.

Folder was decrypted


only with the
authenticated device and
password.

Test failed

Test passed

Sl. No. Of Test Case:

Item/Feature to be Tested:

Sample Input:

Remarks

TEST 4:
Dept. of CS&E, 2015-16

Page 38

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS


Table 6.1.4 Module for encrypting./decrypting the folder
Sl. No. Of Test Case:

Item/Feature to be

Encryption/decryption

Encryption/decryption

Cipher key and bit size

Cipher key and bit size

Encrypted/ decrypted
content of folder

Encrypted/ decrypted content


of folder

Invalid key size, decrypted


but error files are present

Encrypted/ decrypted content


of folder

Test failed

Test passed

Tested:

Sample Input:

Expected Output:

Actual Output:

Remarks

Dept. of CS&E, 2015-16

Page 39

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

6.2 RESULT
This chapter describes the results obtained from the application. It shows different
scenarios obtained from various modules and their representation
.

Figure 6.2.1: Snapshot for browsing option of the desired folder for locking

Dept. of CS&E, 2015-16

Page 40

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 6.2.2:- selecting the desired folder for locking

Dept. of CS&E, 2015-16

Page 41

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 6.2.3: Displaying the name of the selected folder

Figure 6.2.4: Entering and saving the password for unlocking the folder

Dept. of CS&E, 2015-16

Page 42

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 6.2.5: Bluetooth scanning option

Figure 6.2.6: Showing the list of the nearby Bluetooth device

Dept. of CS&E, 2015-16

Page 43

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 6.2.7: Selecting the desired device for giving authorization and background
shows the files are encrypted after saving.

Dept. of CS&E, 2015-16

Page 44

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 6.2.8: Snapshot of Scanning the authenticated Mac address for unlocking the
folder

Figure 6.2.9: Green tick shows Found the authenticated bluetooth device and pop-up
box appears for entering the password for uncloking.

Dept. of CS&E, 2015-16

Page 45

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 6.2.10: Entering of password for unlocking the folder

Figure 6.2.11: Process for unlocking the folder

Dept. of CS&E, 2015-16

Page 46

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

Figure 6.2.12: File is decrypted as shown in the background.

Figure 6.2.13: Configuration mode to change the folder, Password and Device.

Dept. of CS&E, 2015-16

Page 47

SECURITY ENHANCEMENT FOR FOLDERS IN WINDOWS

CHAPTER 7

Conclusion and Future work


7.1 Conclusion
This application will make sure that the user authentication is done by the
windows password login further authentication employing their Bluetooth enabled mobile
phone. This application is considered to be user friendly as this imposes less frequent
password changes. A folder configuration mode is implanted which will let the user to
change device, Password and folder also. This application has less stringent polices that
the user are resistant to.

7.2 Future work


There is always a room for improvement in every software. The system in future
can allow multiple users ,multiple folders and multiple devices of each user just in
case the user has more than one Bluetooth devices.

Dept. of CS&E, 2015-16

Page 48