Sie sind auf Seite 1von 9

CHAPTER 6

SYSTEM DESIGN

6.1 Block Diagram

User Password Salt and Pepper key Hashed password+ Salt and Pepper key

Bb2c07cdadbe56b2923
Cyber @%CY(POBE*()R 501496d58ae82624106
+_!^^ d52d9e0ff9ef2532b178c
5053eed940849

Bb2c07cdadbe56b292350
1496d58ae82624106d52d
9e0ff9ef2532b178c5053ee
d940849

hashed password+ salt and


pepper key
Fig6.1: Block Diagram
@%(po*()+_!^^

6.2 Data Flow Diagram

A data-flow diagram (DFD) is a way of representing a flow of a data of a


processor a system (usually an information system) The DFD also provides
information about the outputs and inputs of each entity and the process itself. A
data-flow diagram has no control flow; there are no decision rules and no loops.
Specific operations based on the data can be represented by a Flow chart. The
data-flow diagram is part of the structured-analysis modeling tools. When using
UML, the activity diagram typically takes over the role of the data-flow
diagram. A special form of data-flow plan is a site-oriented data-flow plan.
6.2.1 DFT Level 0

Start

Login

Username
Password

User Name Password

Data Base Hashing


Lookup For Operation
Password Hash

Hashed Hashed
Password Password

Equal??

Authentication

Fig6.2.1: DFT level 0


6.2.2DFT Level 1
Start

Login

Plaintext

Hash Function

Hash Text ≡ Stored Hash Text

If No Then
Hash Non Authenticated
Matches?
?

If Yes then
Authenticated

End

Fig 6.2.2:DFT Level 1


6.3 UML Diagram

A UML diagram is a diagram based on the UML (Unified


Modeling Language) with the purpose of visually representing a system
along with its main actors, roles, actions, artifacts or classes, in order to
better understand, alter, maintain, or document information about the
system.
6.3.1 Use Case Diagram

Signup

Verification

Login

User Enter password System

Generate
Hashing
algorithm
Adding
salt&pepper

Hash Match
verify

Authenticate

View profile Server

Fig :6.3.1use case


6.3.2 Class Diagram

User System

Username :String Password :Alphanumeric

Password :Alphanumeric
Email :String +Check Password()

Conform Pwd:String +Show success()

+Login() +Show Error()

+View profile() +Show nothing()

+Register() +Change category()

Server System Process

Correct pass:int Counter State:int

Generate Hash function Count number of element

+Validate pass() +Increment()

+Increment() +padding()

+Fetch data() +Salt()


+Pepper()
+Share infer()
+Hashing()
+Response to user()
+User detail ()

6.3.2 Class Diagram


6.3.3 Activity Diagram

Plain text

System

Plain text1
Plain text2…
Plain text
3…..
%

P P P P P

1 * 2 * 3 * 4 * n
Plain text2…...

Plain Plain text1 MD5

% Plain text2…...
Hash function SHA512

Plain
Authenticate SHA384

6.3.3 Activity Diagram


CHAPTER 7
7.1CONCLUSION
The framework is useful in securing to the authorized person. It gives to
the confidence on high protection. Differences in security, the cyber world can
be used in this type of algorithm because of our system can be provide the high
authority protection to the authorized person.

The hacker cannot crack the password. We provide may 99% secure your
account. The hacker can target just one account. Make sure those passwords are
very strong, so negative password will be too difficult. But our system randomly
generates your passwords as well, so when some hacker is not found the
password

The best hints I can give you

Passwords should have a safe password policy (depends on the


application, but 8+ chars and symbols should be ok)
Passwords should be hashed with a good hashing function
(SHA512,SHA384,MD5).
Passwords should be hashed with a strong variable salt and pepper.
Read and learn more about security. It’s a very difficult area.

7.2FUTURE ENHANCEMENT

If update in any algorithm for security domain in the world . we are


include that algorithm, in our system .that will be provide more secure…
REFERENCE

[1] IEEE Transactions on Information Forensics and Security. Authentication


by Encrypted Negative Password.Wenjian Luo, Senior Member, IEEE, Yamin
Hu, Hao Jiang, and Junteng Wang(Base paper)

[2] IEEE Transaction On Fuzzy Systems, VOL. 11, NO. 4,AUGUST 2003
.Noise Reduction by Fuzzy Image Filtering. Dimitri Van De Ville, Member,
IEEE, Mike Nachtegael, Dietrich Van der Weken, Etienne E. Kerre,Wilfried
Philips, Member, IEEE, and Ignace Lemahieu, Senior Member, IEEE

[3] IEEE Transaction On Image processing, VOL. 14, NO. 10, OCTOBER 2005
Salt-and-Pepper Noise Removal by Median- Type. Noise Detectors and Detail-
Preserving Regularization. Raymond H. Chan, Chung-Wa Ho, and Mila
Nikolova

[4] An Effective Algorithm for Salt-and-Pepper Noise Removal in Color Images


Zhang Jianjun Department of Mathematics, Shanghai University, Shanghai
200444, Shanghai Chinajjzhang@staff.shu.edu.cn

[5] Salt and Pepper Noise Removal for Image Signals Soheil Feizi, Sina
Zahedpour, Mahdi Soltanolkotabi, Arash Amini and Farokh Marvasti Electrical
Engineering Department Sharif University of Technology
[6] Salt and pepper Noise Removal by Using Improved Decision Based
Algorithm Muhammad syafiq Alza Alias,Norazlin Ibrahim, Zalhan Mohd Zin

[7] Enhancing Security Of Image by Steganography and Cryptography


Techniques Sadaf Bukhari, Muhammad Shoalib Arif, M.R Arjun, Samia Dilbar.

[8] Using salt and Pepper noise Detection and Removal Based on Neighbor
Pixels in Gray- Scale images. J.Vahidi and Mohammad Madadpour

[9] Detection and Removal of Salt and Pepper Noise in Images by Improved
Median Filter . S.Deivalakshmi ,S.Sarath,P.Palanisamy

[10] A New approach to Salt and Pepper Noise Removal for Color Image. Quig
Xu, Rui Zhang , Mateu Sbert.

[11]A New Filter for removal of Salt and Pepper Noise. Satyabrata Biswal
,Nilamani Bhoi.

Das könnte Ihnen auch gefallen