Beruflich Dokumente
Kultur Dokumente
Presented by:
V. SeethaRama Rao
(12B81D5727)
UNDER GUIDENCE OF
Mr. M. Ashok Sir..
(Sr. Asst.Professor)
CONTENTS :
AIM of Project
Attacks
Network Security block diagram
D-H key Exchange Algorithm
ZKP Version1 and Version 2
Simulation Results
Applications
Conclusion
Future scope
References
Aim of Project:
The main aim of project is to design Zero Knowledge Proof protocol
done by Cryptography.
Cryptography means hiding the data.
Security Attack:
Any action that compromises the security of information
owned by an organization
Masquerade
Replay
Modification of message
Denial of Service
Passive Attack:
A passive attack on a cryptosystem is one in which the cryptanalyst cannot
interact with any of the parties involved, attempting to break the system solely based
upon observed data i.e. the cipher text.
Security Services:
Confidentiality
Integrity
Authentication
Nonrepudiation
Access Control
Availability
Terminologies present:
Plain Text.
Cipher Text.
Encryption.
Decryption.
Symmetric Cryptography (Conventional Encryption).
Asymmetric Cryptography (Publickey Encryption).
Cryptanalysis (Breaking Code).
Symmetric
Asymmetric
Encryption &Decryption
Fast
Slow
Key Distribution
Difficult
Easy
Complexity
O(Log N)
O (N3)
Security
Moderate
Highest
Security Services
Confidentially
Confidentially, integrity,
non repudiation
Example
AES,DES
RSA,DH Algorithm
DH Algorithm:
Example:
1)
2)
3)
4)
5)
6)
Continued.
Advantages:
DH Algoritham key agrrement not limited to negotiateing a key
shared by only two participants.
Disadvantages:
DH Algoritham is susceptible to two types of attacks.
1)Discrete logarithmic attack
2)Man in the middle attack
Version 1:
Version 2:
Tools used:
Design Entry
Verilog HDL
Synthesis
Simulation
ISE Simulator
Implementation
FPGA board
Schematic:
RTL Schematic:
Binary Division:
Schematic:
DH Simulation Results:
Schematic:
Schematic:
RTL Schematic:
Applications:
Diffie-Hellman is currently used in many protocols, namely:
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Secure Shell (SSH)
Internet Protocol Security (IPSec)
Public Key Infrastructure (PKI)
FPGA Prototyping:
01110001
Conclusion:
Future Scope:
These techniques not only used for secure data transfer, but
References: