secure visual algorithm simulator

17
LOGO Secure Visual Algorithm Simulator

Upload: prachi-singhal

Post on 06-Jul-2015

79 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Secure visual algorithm simulator

LOGO

Secure Visual Algorithm Simulator

Page 2: Secure visual algorithm simulator

Company Logo

Page 3: Secure visual algorithm simulator

Visualization gains more attention than theoretical study and it is an easy way Visualization gains more attention than theoretical study and it is an easy way of learning process. VISUALIZATION of algorithms’ sequence is an of learning process. VISUALIZATION of algorithms’ sequence is an important process to learn various hidden steps, which are involved important process to learn various hidden steps, which are involved dynamically. The advantages of visualizing algorithms are: Easy to learn with dynamically. The advantages of visualizing algorithms are: Easy to learn with different set data,different set data,Understand hidden steps of algorithms, Memory usages and Time management Understand hidden steps of algorithms, Memory usages and Time management strategy.The secure login can be made by using various hashing algorithms strategy.The secure login can be made by using various hashing algorithms which will providing security and intergrity of user thus login module uses which will providing security and intergrity of user thus login module uses hashing alogorithm Web applications, needing user authentication, typically hashing alogorithm Web applications, needing user authentication, typically validate the input passwords by comparing them to the real passwords, which validate the input passwords by comparing them to the real passwords, which are commonly stored in the company’s private databases. If the database and are commonly stored in the company’s private databases. If the database and hence these passwords were to become compromised, the attackers would have hence these passwords were to become compromised, the attackers would have unlimited access to these users’personal. Nowadays, databases use a hash unlimited access to these users’personal. Nowadays, databases use a hash algorithm to secure the stored passwords but there are still security breaches.algorithm to secure the stored passwords but there are still security breaches.

Literature SurveyLiterature Survey

Page 4: Secure visual algorithm simulator

Problem Statement

The way the human brain processes information, it is faster for people to grasp the meaning of many data points when they are displayed in charts and graphs rather than poring over piles of spreadsheets or reading pages and pages of reports. Many of the algorithms are hard to understand thus visualization of such algorithm makes easier to understand. The purpose of data visualization is to simplify data values, promote the understanding of them, and communicate important concepts and ideas. Thus we tried to Implement of such algorithm for the better understanding .

Page 5: Secure visual algorithm simulator

Solution ApproachSolution Approach

This web based project on visualization can be seen in the light of being little This web based project on visualization can be seen in the light of being little like a secure web portal which will illustrate visual simulation for some of the like a secure web portal which will illustrate visual simulation for some of the algorithms. The website uses an innovative authentication mechanism i.e algorithms. The website uses an innovative authentication mechanism i.e using cryptography using a file and embedding for the login process hence using cryptography using a file and embedding for the login process hence making the environment of operation a very secure one. The increased making the environment of operation a very secure one. The increased security will make the user portal less prone to attacks and hacking.security will make the user portal less prone to attacks and hacking.

The main aim is implement the new Authentication mechanism in an The main aim is implement the new Authentication mechanism in an efficient way so as to increase the security of the web portalefficient way so as to increase the security of the web portal

To develop an interactive Algorithm simulator so that working of algorithm To develop an interactive Algorithm simulator so that working of algorithm can be understood in an easier waycan be understood in an easier way

Page 6: Secure visual algorithm simulator

Implementation Of AlgorithmImplementation Of Algorithm

The secure login module makes use of encryption and embedding. The pass- phrase The secure login module makes use of encryption and embedding. The pass- phrase which is submitted by the user at the time of registration is used to generate a hash which is submitted by the user at the time of registration is used to generate a hash code using MD5 cryptographic hash algorithm. This 128 bit code embedded in file code using MD5 cryptographic hash algorithm. This 128 bit code embedded in file and the position of embedding is different for different users.and the position of embedding is different for different users.

The md5() function uses the RSA Data Security, Inc. MD5 Message-Digest The md5() function uses the RSA Data Security, Inc. MD5 Message-Digest Algorithm. The MD5 Message-Digest algorithm takes as iput a message of Algorithm. The MD5 Message-Digest algorithm takes as iput a message of arbitrary length and produces an output of a 128-bit “fingerprint” or “ message arbitrary length and produces an output of a 128-bit “fingerprint” or “ message digest” of the input. The MD5 algorithm is intended for digital signature digest” of the input. The MD5 algorithm is intended for digital signature applications, where a large file must be “compressed” in a secure manner before applications, where a large file must be “compressed” in a secure manner before being encrypted with a private (secret) key under a public- key cryptosystem such being encrypted with a private (secret) key under a public- key cryptosystem such as RSA.as RSA.

This function returns the calculated MD5 hash on success, or FALSE on failure.This function returns the calculated MD5 hash on success, or FALSE on failure.

Page 7: Secure visual algorithm simulator

The Algorithm simulator module uses JQuery which is a javascript library. Query The Algorithm simulator module uses JQuery which is a javascript library. Query is free,open source software , dual-licensed under the MIT License or the GNU is free,open source software , dual-licensed under the MIT License or the GNU General Public License. Jquery’s syntax is designed to make it easier to navigate General Public License. Jquery’s syntax is designed to make it easier to navigate a document , select DOM elements, create animations, handle events, and a document , select DOM elements, create animations, handle events, and develop Ajax applications . Jquery also provides capabilities for developers to develop Ajax applications . Jquery also provides capabilities for developers to create plug-ins on top of javascript library. This enables developers to create create plug-ins on top of javascript library. This enables developers to create abstractions for low-level interaction and animation, advanced effects and high-abstractions for low-level interaction and animation, advanced effects and high-level, theme-able widgets. The module approach to the jQuery library allows the level, theme-able widgets. The module approach to the jQuery library allows the creation of powerful dynamic web pages and web applications.creation of powerful dynamic web pages and web applications.

.animate().animate()

.animate(properties [, duration] [, easing] [,complete]).animate(properties [, duration] [, easing] [,complete])Properties :Properties : A map of CSS properties that the animation will move toward. A map of CSS properties that the animation will move toward.Duration:Duration: A string or number determining how long the animation will run. A string or number determining how long the animation will run.Easing:Easing: A string indicating which easing function to use for the transition. A string indicating which easing function to use for the transition.Complete:Complete: A function to call once the animation is complete. A function to call once the animation is complete.

Page 8: Secure visual algorithm simulator

The web project is developed using the three tier architecture. The layers are:The web project is developed using the three tier architecture. The layers are:

Front EndFront End: In this the layer, the use of Client Side scripting language like HTML : In this the layer, the use of Client Side scripting language like HTML and javascript is used to display the web pages.and javascript is used to display the web pages.

Business LogicBusiness Logic: The technology used to program the business logic is PHP. PHP : The technology used to program the business logic is PHP. PHP is an open source programming language.is an open source programming language.

Database Layer:Database Layer: The database used for the web project is MYSQL. This layer The database used for the web project is MYSQL. This layer acts as an interface between the business logic and the database.acts as an interface between the business logic and the database.

System HandlingSystem Handling

Page 9: Secure visual algorithm simulator

Data Flow DiagramData Flow Diagram

Page 10: Secure visual algorithm simulator

ScreenshotsScreenshots

Page 11: Secure visual algorithm simulator
Page 12: Secure visual algorithm simulator
Page 13: Secure visual algorithm simulator

Module1 : Login ModuleThis module consists of two operations, Registration and Login. In this project the authentication mechanism has been innovated by using an ENCRYPTED FILE to login by the user. The File is created by and provided to user on the time of registration. The main concepts used are Cryptography and embedding File Handling.INPUT/OUTPUTIn case of the registration process the USER DETAIL is the Input and the Encrypted login File will get downloaded on your computer. For the Login process the LOGIN FILE and the emailed will be the input and output will be redirection to the User Portal on successful authentication, otherwise an error message.

Project ModulesProject Modules

Page 14: Secure visual algorithm simulator

Module2 : User PortalUser portal provides the user with an interface so that the user can browse the web portal. These modules functions are redirection to various pages on user requests, uploading of profile picture , feedback and Logout operation.INPUT/OUTPUTThe input/ output to this module are:•Request for a particular page, the user is directed to that page if the user session is valid else the user is directed to the home page.•Request for changing profile picture, the picture is uploaded or the error is displayed if the image is invalid or the size is too large.•Request for Logout, the user session is destroyed and the user is directed to the home page.

Page 15: Secure visual algorithm simulator

Module3: Algorithm SimulatorSimulation is the imitation of some real thing available, state of affairs or process. The act of simulating something generally entails representing certain key characteristics or behavious of a selected physical or abstract system.Algorithm Simulator will be able an interactive tool which will visually explain the working of some of the already known algorithms. The task is accomplished by converting the simulation into a set of animating patterns. The animation will be performed using JAVASCRIPT on the web page. INPUT/OUTPUT•The inputs will be input to the algorithm which is to be simulated. The output will be an interactive simulation of algorithm using Javascript Animation.

Page 16: Secure visual algorithm simulator

Module 4: Online examination portalOnline examination is a level examination portal. It can also serve the purpose of conducting online examination on a large scale as the web portal is highly secure.INPUT/OUTPUTThe input to the module will be the REQUEST to take an exam. The level is checked in the database and the output is START EXAM or NOT ELIGIBLE and need to clear previous level

Page 17: Secure visual algorithm simulator

The project Secure Visual Algorithm simulator will fulfill a wide range of aims and objectives.This web based project on visualization can be seen in the light of being little like a secure web portal which will illustrate visual simulation for some of the algorithms. The website uses an innovative authentication mechanism i.e using cryptography using a file and embedding for the login process hence making the environment of operation a very secure one. The increased security will make the user portal less prone to attacks and hacking.

ConclusionConclusion