cryptology for security

24
PROJECT PRESENTATION ON CRYPTOLOGY FOR SECURITY GROUP MEMBERS : GROUP GUIDE : 1. MANDEEP KUMAR MR . NILAKSH 2. NISHANT PANDEY (ASSISTANT PROFESSOR) 3. SUMAN SAURABH

Upload: manish-kumar

Post on 23-Jan-2018

110 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Cryptology for security

PROJECT PRESENTATION ON

CRYPTOLOGY FOR SECURITY

GROUP MEMBERS : GROUP GUIDE :

1. MANDEEP KUMAR MR. NILAKSH

2. NISHANT PANDEY (ASSISTANT PROFESSOR)

3. SUMAN SAURABH

Page 2: Cryptology for security

Objective: The main objective of this project (Cryptology for

Security) is to send the confidential details and relatedconfidential files and documents to their recipients ina securable way. Cryptology for Security will use thenumerous kinds of algorithms to generate theencrypted strings, files and decrypted strings, files.

The Secure Sockets Layer (SSL) is a commonEncryption protocol used in Cryptology. When yousee a URL in your Web browser that starts with"https" instead of "http", it is a secure connection thatis using SSL. Some methods of cryptography used a"secret key" to allow the recipient to decrypt themessage. The most common secret key cryptosystemis the Data Encryption Standard (DES), or the moresecure Triple-DES which encrypts the data threetimes.

Page 3: Cryptology for security

The purposeful algorithms used by Cryptology will

be in the

forms of:

1. MD5

2. SHA1

3. RSA

Page 4: Cryptology for security

Existing System:

1)In Existing system, the data will not be secure

through the

network because data transmission is done in

unencrypted format.

2) In Existing system, data will also be accessed

through the

unauthorized person.

3) The system does not provide security to the data

store in

database.

4) In Existing System, the security is not provided

throughout

the server and database.

Page 5: Cryptology for security

Proposed System:

1)In Proposed System, the data will be secure

using the web

technology by using https enabled.

2) In Proposed System, the data will be accessed

through the

authorized person.

3) The system provides security to the data store in

the

database.

4) In Proposed System, the security is provided

throughout the

server and database by disabling the cookies etc.

Page 6: Cryptology for security

The Cryptology has been divided into 5 different

modules:

1. Administrator

2. User

3. Cryptic messages

4. Cryptic files.

5. Image transformation

Page 7: Cryptology for security

Administrator:

Administrator is a super user in the system. He will

monitor all

the users’ activities in the system. He has

privileges to do

anything at any point of time. He is responsible for

providing

secure mechanism for the user of the system to

send their

confidential data in a secure way.

Page 8: Cryptology for security

User:

User will register in to site and send his confidential

data in a

secured way by using Crypto log technology facility

provided in

the application.

Page 9: Cryptology for security

Cryptic messages:

In this module user will send his confidential

messages in an

encryption format so that receiver will receive the

data and he

will decrypt to get original data. So that data will

transmitted in

a secure way.

Page 10: Cryptology for security

Cryptic files:

In this module user will send data file in an

encryption format

so that receiver will receive the data and he will

decrypt to get

original data. Application provides a facility to send

files in a

secured way.

Page 11: Cryptology for security

Image transformation:

In this module user will transmit data in the form

of image and he can encrypt the image and

transform to receiver. Receiver will receive the

data and he will decrypt to get original data. By

using this application user can send images also

in a secured way.

Page 12: Cryptology for security

Administrator Sequence

Diagram

Page 13: Cryptology for security

User Sequence Diagram

Page 14: Cryptology for security

JAVA WEB APPLICATION

ARCHITECTURE

Model1 Model2

MVC1 MVC2

Page 15: Cryptology for security

MODEL1

• Use either servlet component or jsp component

as main web component of application but not

both.

• The main web component of web application

contain multiple logics.

Advantages• multiple programmers are not required.

• Knowledge of multiple technology is not required.

• Use model1 to develop small web application.

Page 16: Cryptology for security

Disadvantages of MODEL1

• Every component contains multiple logics so

there is no clear separation b/w logics.

• The modification done in one logic effect other

logics.

• Maintenance & enhancement of web application

become quite complex.

• Parallel development is not possible.

• Productivity is poor.

Page 17: Cryptology for security

MODEL1 ARCHITECTURE

BROWSER

Browser

Web Server

Web Application

JSPJSP JSP

JSPJSPJSP

Database

Request

Response

Page 18: Cryptology for security

MODEL2

M---- Model (represent data)

V---- View (represent representation logic)

C--- Controller (representation Integration

logic)

Controller monitor and control all the activities of

the web application.

Integration logic responsible to take request from

client to pass the request to the model

component to gather results from model

component and to pass the request to view.

Page 19: Cryptology for security

MVC1

Here we take single component having VIEW,

CONTROLLER layer logics and we take separate

components for MODEL layer.

MVC1 gives clear separation b/w logics compare

to MODEL1, but if we want more clean separation

b/w logics go for MVC2.

MVC1 is good to develop medium scale

application.

Servlet/JSP to java class/Java bean

communication comes under MVC1.

Page 20: Cryptology for security

MVC1 ARCHITECTURE

BROWSER

Browser

Web Application

Database

Request

Response

VIEW

+

CONTROLLER

Servlet

Or

JSP

MODEL

Page 21: Cryptology for security

MVC2

Here we take separate components for

VIEW,CONTROLLER and MODEL layer.

Because of multiple layers, we get clean

separation b/w logics.

Modification done in one layer does not effect

other layer logics.

Enhancement & maintenance of project becomes

easy.

Parallel development possible.

Productivity is good.

It is industry standards to develop the web

application.

Page 22: Cryptology for security

MVC2 ARCHITECTURE

BROWSER

Browser

Web Application

Database

Request

Response

CONTROLLER

Servlet

MODEL

VIEW

(JSP)

Page 23: Cryptology for security

Software Requirements:

Operating System :

WinXP/Win7/Win8/10/Linux

User Interface : HTML, CSS

Client-side Scripting : JavaScript

Programming Language : Java

Web Applications : JDBC, JNDI,

Servlets, JSP

IDE/Workbench : My Eclipse

Database : Oracle11g

Server Deployment : Tomcat

Page 24: Cryptology for security

Hardware Requirements

Processor :Core 2 Duo/intel i3/i5/i7

Hard Disk :40GB

RAM :512mb/1 GB/4GB