Sie sind auf Seite 1von 41

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

EAST WEST INSTITUTE OF TECHNOLOGY

Project Phase II presentation


on
“SECURITY FRAMEWORK FOR DISTRIBUTED
DATABASE SYSTEM”
SUBMITTED
by:
CHIRAG ALI I K :
(1EW16CS034) UNDER THE GUIDANCE
DARSHAN H P : of:
(1EW16CS036) PROF. ANOOP PRASAD N
Asst Professor,
HARSHA K :(1EW16CS048)
Department of CSE, EWIT
RESHMA K H :
Dept Of CSE,EWIT 1
(1EW16CS409)
CONTENTS
• Introduction
• Literature Survey
• Problem statement
• Objectives
• Proposed System
• Implementation
• Result analysis
• Conclusion

Dept Of CSE,EWIT 2
INTRODUCTION

With the increase in the progress of the technology in the world of communication,
Cryptography has become very important for securing the information during transmission,
so it protects information against active and passive attack. The main objective of this study
is to find out a suitable algorithm for the encryption of a specific size of text file where the
experiment of each algorithm is based on encryption of different sizes of the text files,
which are in varying sizes of text files and also to calculate the time duration that each
algorithm takes to encrypt or to decrypt the particular size of each text file and display the
same.

Dept Of CSE,EWIT 3
LITERATURE SURVEY
S No Title Description Limitations
1 Effective comparison and Structure and design of both • Slow software
evaluation of DES and algorithms and advantages implementation
Rijnadael Algorithm. and disadvantages of both • Similar encryption of
the algorithms. every block.

Dept Of CSE,EWIT 4
LITERATURE SURVEY
S No Title Description Limitations
2 A comparative study of Analysis of a family of • Ciphers are at risk due to
Rivest Cipher algorithms. symmetric key algorithms easier decryption.
(International Journal of called Rivest Cipher
Information and Computation algorithms.
Technology)

Dept Of CSE,EWIT 5
LITERATURE SURVEY
S No Title Description Limitations
3 Comparative analysis of Analysis of the AES,DES RSA algorithm can be very
cryptographic algorithms in and RSA algorithms. slow in cases where large
securing data data needs to be encrypted
by the same computer.

Dept Of CSE,EWIT 6
LITERATURE SURVEY
S No Title Description Limitations
4 A study of DES and Evaluation of performance
Blowfish encryption in execution speed •Key management is
algorithm. based on different memory complicated.
sizes and compared them.
The
experimental results show
the relationship between
function run
speed and memory size.

Dept Of CSE,EWIT 7
PROBLEM STATEMENT
• Hackers always attack and destroy the data in the system through the security gaps.
• Lack of finding suitable algorithm for the encryption or decryption of a specific range of
the text file size.
• All algorithms are not suitable for the encryption or decryption of larger size text file.
• The time duration that each symmetrical algorithm takes to encrypt or decrypt different
text files is not similar.

Dept Of CSE,EWIT 8
OBJECTIVES

• To combine all the above mentioned algorithms in one program, so that the program
could select a suitable algorithm while encrypting or decrypting the text file based on
the size of the text file.
• To find out the time duration that each algorithm takes to encrypt different text files so
that the programmers need not to reinvent the wheel each time to develop a new
application.
• To display the best encryption algorithm for different sizes of .txt files

Dept Of CSE,EWIT 9
PROPOSED SYSTEM

• Along with the presently available algorithms, a new symmetric algorithm


“BlowFish Encryption” algorithm is implemented.
• Blowfish Encryption algorithm is much faster when compared to DES and can work
with differing file sizes (<4 GB)

Dept Of CSE,EWIT 10
Start
FLOWCHART
1) User authentication Data Owner Data Receiver

5) Req/res secret key for download


No Is User
Register
Registered
File Download

4) Decryption key req/res


2) Encryption key req/res

Yes
3) Secret key req/res

Login

Cloud Server
End

Authority

Dept Of CSE,EWIT 11
ALGORITHMS

 AES Encryption Algorithm


 DES Encryption algorithm
 Rivest ciphers
 Blowfish

Dept Of CSE,EWIT 12
AES Encryption Algorithm
 Symmetric key block cipher
 Plain text – 128 bits
 Key length - 128/256 bits
 The key size used for an AES
cipher specifies the number of
transformation rounds that
convert the plain text
• 10 rounds for 128-bit keys.
• 12 rounds for 192-bit keys.
• 14 rounds for 256-bit keys.

Dept Of CSE,EWIT 13
 Algorithm:

Dept Of CSE,EWIT 14
DES Encryption Algorithm
 Symmetric encryption algorithm

 Block size 64 bit

 Key length 56 bit

 Uses 16 Round Fiestel structure

Dept Of CSE,EWIT 15
Round function of DES Encryption algorithm
 Expansion Permutation Box − Since
right input is 32-bit and round key is a
48-bit, we first need to expand right
input to 48 bits.
 XOR−After the expansion
permutation, DES does XOR
operation on the expanded right
section and the round key.
 Substitution Boxes. − The S-boxes
carry out the real mixing (confusion).
DES uses 8 S-boxes, each with a 6-bit
input and a 4-bit output. Refer the
following illustration −
Dept Of CSE,EWIT 16
Rivest cipher (RC2) Algorithm
 Input block size 64 bits

 Output block size 64 bits

 Variable key size 1 byte to 128


bytes
 Works best on 16 bit
microprocessors

Dept Of CSE,EWIT 17
Encryption process in RC2 algorithm

Encryption steps performed on every data block: Each Mashing Round consists of four Mashing
1.Initialize the counter j to 0. operations, performed on four words of the data
2.Perform five Mixing Rounds. block:
3.Perform one Mashing Round. 1.Mashing R[0]
4.Perform six Mixing Rounds. 2.Mashing R[1]
5.Perform one Mashing Round. 3.Mashing R[2]
6.Perform five Mixing Rounds. 4.Mashing R[3]

Dept Of CSE,EWIT 18
Blowfish Algorithm

 Symmetric key block algorithm

 Block size 64 bits

 Key size 32-448 bits

 Uses 16 Round Fiestel network

Dept Of CSE,EWIT 19
F function in blowfish encryption algorithm

• The function splits the 32-bit input into four


eight-bit quarters, and uses the quarters as
input to the S-boxes.
• The outputs are added modulo 232 and
XORed to produce the final 32-bit output.

Dept Of CSE,EWIT 20
Implementation
MODULES:
Module 1: Data Owner
Input: User data file for transfer.
Output: Encrypted user data file using appropriate encryption algorithm.

Module 2: Cloud server


Input: Encrypted user data file, Owner & receiver authentication.
Output: View accessible users, Permitted users, File transactions.

Dept Of CSE,EWIT 21
…cont.

Module 3: Authority
Input: Permissions from different users for encryption/decryption key
Output: Encryption Key or decryption key for user requests.

Module 4: Data receiver


Input: User details to access the cloud.
Output: Requested file (downloadable).

Dept Of CSE,EWIT 22
SNAPSHOTS

Homepage: Gives access to all the modules of the system


Dept Of CSE,EWIT 23
Data Owner log in/Register page

Dept Of CSE,EWIT 24
Data owner requests file encryption key from the Authority and
requests permission to view those files

Dept Of CSE,EWIT 25
Data owner requests Secret key from the Authority and requests permission to
provide secret key to the particular file chosen by the data owner

Dept Of CSE,EWIT 26
Data owner uploads the file and selects the algorithm to encrypt the file

Dept Of CSE,EWIT 27
Data Receiver secure log in/Register page

Dept Of CSE,EWIT 28
Data receiver requests decrypt key from the Authority(AA) and
Displays the response given by the authority

Dept Of CSE,EWIT 29
Data receiver requests Secret key from the Authority and the response given
By the authority(AA)

Dept Of CSE,EWIT 30
Once the authority provides the secret key the data receiver
enters the secret key and downloads the file

Dept Of CSE,EWIT 31
Authority(AA) log in/Register page

Dept Of CSE,EWIT 32
All the data owners requesting access to the cloud are permitted by the Authority(AA)

Dept Of CSE,EWIT 33
The Authority(AA) views all the key requests by the data owners/data recievers
and permits them to upload the file for the encryption

Dept Of CSE,EWIT 34
The Authority(AA) views all the secret key requests by the
data owners/data receivers and generates the secret key

Dept Of CSE,EWIT 35
RESULT ANALYSIS
 Encryption time:

Dept Of CSE,EWIT 36
RESULT ANALYSIS

Dept Of CSE,EWIT 37
RESULT ANALYSIS

Dept Of CSE,EWIT 38
RESULT ANALYSIS

Dept Of CSE,EWIT 39
CONCLUSION
Various symmetrical cryptographic algorithms have been used and each algorithm
has been used for encryption and decryption of different sizes of the text files. The
main concept of the analysis is on the role of time duration that each algorithm takes
to encrypt and decrypt text file in particular, and the result was in the term of various
time durations. After analysis of time durations for each process, the finding was that
some algorithms are appropriate for the smaller size of the text file and others are
appropriate for bigger size of the text file and according to this result analysis, the
concept of the suitable crypt has constructed, the concept is in the terms of checking
the size of the text file before encryption and decryption process, and choose the
suitable crypt according to size of the text file, the result is analyzed by web server.

40
Dept Of CSE,EWIT
41
Dept Of CSE,EWIT

Das könnte Ihnen auch gefallen