20
IMPLEMENTATION OF ´CRASHµUSING NETWORK SECURITY TECHNIQUES JEPPIAAR ENGINEERING COLLEGE 

Crash Antony

Embed Size (px)

Citation preview

Page 1: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 1/20

IMPLEMENTATION OF ´CRASHµUSING

NETWORK SECURITY TECHNIQUES

JEPPIAAR ENGINEERING COLLEGE 

Page 2: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 2/20

Page 3: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 3/20

Government provides food at highly subsidized rates to the poor people.

Three types of cards are issued by the government - Above Poverty Line

(APL), Below Poverty Line (BPL) and Antyodaya. There is little subsidy on

rations meant for APL cards. Antyodaya cards are issued to the poorest of 

the poor. Rations are issued to them at highly subsidized rates.

³ SURVEY REVEALS 87%WHEAT AND 94%RICE SIPHONED OFF ́

Survey revealed that out of a total of 182 families , 142 families did not

receive a single grain of wheat during the month of June. 167 families did

not receive a single grain of rice.

Out of a total of 4650 Kgs of wheat supposed to have been distributed to the

people, only 595 Kgs had actually been received by the people. The rest 87%found its way to the black market.

Out of a total of 1820 Kgs of rice supposed to have been distributed as per

daily sales registers, only 110 Kgs was received by the people. Balance 94%

was siphoned off.

 BELIEVE IT OR NOT«!IT·S 94% CORRUPTION««

Page 4: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 4/20

Have u experienced it before??? The issue of ration from ration shops is laden with corruption. People

 face several types of problems.

The shops do not open. Even if it opens, the usual plea of the shopkeeper 

is that there is no stock.

 Ration issued to a person is less than the entitled quota of that person.

 Rates charged are much more than the official prescribed rates. In

nutshell, a shopkeeper tries his best to prevent people from taking ration

 from him, so that he is left with as much ration as possible to sell in the

black market.

Corruption takes place in records. The ration is siphoned off by making 

 false entries in the records. Fake thumb impressions or signatures are

 put by the shopkeepers in the names of the people and their rations are

siphoned off.

Page 5: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 5/20

We have the solution for this«

CRASH

Fighting Corruption«.(C orruption Reduction using Automated Systems with Handprint access)

´We limit crores corrupted  

We let the most live 

We connect to evolve««.µ 

C onnecting to evolve««

Page 6: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 6/20

 Distribution Network 

 Main Memory

 Display on items present 

 Main Network 

Code Generation&

 Split Circuit Code Scanner 

Fingerprint Access Controller 

Timer Control 

 Refreshing section Decryption circuit 

n c d 

110010101

101001010

 Real code Processor 

Transactions

Validity Chamber 

 Load Counter+Price List 

QTYcontroller..O/P 

 Accounts

Verification Chamber 

Card ³A´ ³B´ ³C´ 

 Availability check of the user 

 A

 A

Page 7: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 7/20

THE LANGUAGE OF CRYPTOGRAPHY

symmetric key: crypto: shared secret key (eB=dB).

public-key: crypto: Bob has a public encryption key

and a matching private decryption key

plaintext plaintextciphertext

eB

encryption

algorithm

decryption

algorithm

Key to encryptto Bob

Key Bob usesto decrypt

dB

Page 8: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 8/20

Symmetric key cryptography 

Substitution cipher: substituting one thing for 

another 

monoalphabetic cipher: substitute one letter for another 

plaintext: abcdefghijklmnopqrstuvwxyz

ciphertext: mnbvcxzasdfghjklpoiuytrewq

Plaintext: bob. i love you. aliceciphertext: nkn. s gktc wky. mgsbc

E.g.:

Page 9: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 9/20

Publ  

ic key cryptography 

 Asymmetric, Public Key Cryptosystem (PKCS): Alice knows only Bob¶s public key eB, Bob knows private key dB.

Betterthan symmetric (shared) key cryptosystems.

plaintextmessage, m

ciphertextencryptionalgorithm

decryptionalgorithm

Bob·s publickey

plaintextmessageK (m)

B

+

KB

+

Bob·s privatekey

KB

-

m = K (K (m))B

+

B

-

Page 10: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 10/20

Algorithm for the decryption circuit 

1. Choose two large prime numbers p, q .(e.g., 1024 bits each)

2. Compute n = pq , z = (p-1)(q-1)

3. Choose e (with e<n) that has no common factorswith z . (e, z are ´relatively primeµ).

4. Choose d such that ed-1 is exactly divisible by z .(in other words: ed mod z = 1 ).

5. P ublic key is (n,e). P rivate key is (n,d ).

KB+

KB-

Page 11: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 11/20

Is 

there a lock without a key?Gue ss«.

0. Given (n,e) and (n,d) as computed above.

1. T o encrypt bit pattern, m, compute

c = m mod n

e (i.e., remainder when m is divided by n)e

2. T o decrypt received bit pattern, c, compute

m = c mod nd (i.e., remainder when c is divided by n)d

m = (m mod n)e mod ndMagichappens!

c

Page 12: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 12/20

Examine @@@@ it«««Bob chooses p=5 , q=7 .  T hen n=35 , z=24 .

e=5 (so e, z relatively prime).

d= 29 (so ed -1 exactly d ivisible by z .

letter m me c = m mod  ne

l 12 1524832 17

c m = c mod nd

17 481968572106750915091411825223071697 12

cd letter

l

encrypt:

decrypt:

Page 13: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 13/20

IMPLEMENTATION OF THE ALGORITHM IN JAVASCRIPT 

import java.math.BigInteger;

import java.security.SecureRandom;

class key{

private BigInteger n, d, e;

public key(int bitlen)

{

SecureRandom r = new SecureRandom();

BigInteger p = new BigInteger(bitlen / 2, 100, r);

BigInteger q = new BigInteger(bitlen / 2, 100, r);

n = p.multiply(q);

BigInteger m = (p.subtract(BigInteger.ONE))

.multiply(q.subtract(BigInteger.ONE));e = new BigInteger("3");

while(m.gcd(e).intValue() > 1) e = e.add(new BigInteger("2"));

d = e.modInverse(m);

}

public BigInteger encrypt(BigInteger message)

{

return message.modPow(e, n);

}

public BigInteger decrypt(BigInteger message)

{

return message.modPow(d, n);}

}

Page 14: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 14/20

Bio-Metric Access

 Difference makes an aspect«««« A fingerprint is made up of a pattern of ridges

and furrows as well as characteristics that 

occur at Minutiae points (ridge bifurcation or 

a ridge ending)Fingerprint scanning essentially provides an

identification of a person based on the

acquisition and recognition of those unique

 patterns and ridges in a fingerprint 

The actual fingerprint identification processwill change slightly between products and 

systems. The basis of identification, however,

is nearly the same

Page 15: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 15/20

As easy as time clock or payroll accessª..

C heck it out?   Standard systems are comprised of a sensor for scanning a fingerprint 

and a processor which stores the fingerprint database and software

which compares and matches the fingerprint to the predefined database.

Within the database, a fingerprint is usually matched to a reference

number, or PIN number which is then matched to a person.s name or 

account.

 In instances of security the match is generally used to allow or disallowaccess, but today this can also be used for something as simple as a time

clock or payroll access.

Page 16: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 16/20

Integrated security processing  A high-performance network-security processing IC will provide the

necessary form factor and cost to be integrated into enterprise

communication equipment and access equipment.

 Although the number of simultaneous tunnels and maximumthroughput for each tunnel is an important factor, the time to create and 

tear down tunnels will become a major issue as the number of tunnels

 for branch-to-branch and remote access increases.

The integration of symmetric data encryption and asymmetric tunnel-

negotiation algorithms on a single device provides a flexible solution .

CRASH that is now being designed demands a security processing 

solution that is programmable, scaleable, and high performance .

Page 17: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 17/20

We maintain automations such that

´Machines Maintain secretsµ ADVANTAGES:

VERY EASY AND QUICK TO BE ACCCESSED.

 MACHINES MAINTAIN SECRETS 

 NO NEED OF PASSWORDS OR ANY KEYS TO ACCESS AN ACCOUNT 

WHICH IS APPLICABLE TO THE ILLITERATES(POOR PEOPLE).  IT SAVES NEARLY 300 CRORES CORRUPTED PER YEAR.

 IMPLEMENTATION COST IS CHEAP.

 STOCKS MAINTANENCE WILL BE EASY ANDTRANSPERANT.ENORMOUSLY LARGE QUEUES IN RATION SHOPS ARE 

 AVOIDED.

 MAKING THE FINGERPRINT AS THE KEY TO ENCRYPT THEIR REAL

CODES.  LAST BUT NOT THE LEAST,THE MATERIALS ALLOTED BY THE 

GOVERNMENT DIRECTLY GOES TO THE PUBLIC.

Page 18: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 18/20

We feed the Unfed««.

OUR SYSTEM ELIMINATES THE FOLLOWING:

 AVOIDS CORRUPTION BY REPUTED PEOPLE SINCE THE  ACCOUNTS MANAGER OR THE SOFTWARE CODER CANNOT 

 ACCESS ANOTHER USER¶S ACCOUNT.

 MAINTAINS THE RIGHT AMOUNT OF THINGS GIVEN TO THE  RIGHT CATEGORY OF PEOPLE.

 AVOIDS VENDORS SELLING THINGS OUTSIDE AT HIGHER

COST.

 AVOIDS RATION GOODS GET SOLD IN THE BLACK MARKET.

Page 19: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 19/20

VISION DEDICATED TO OUR PRESIDENT¶S 

³EMPOWERED NATION BY 2020´ 

WE FEED THE UNFED««.WE FEEL THAT THIS 

CRASH SYSTEM MIGHT ADD TO THE STEPS WHICH 

 DR.A.P.J.ABDUL KALAM  FEELS TO MAKE OUR

 NATION A DEVELOPED ONE BY 2020.

Page 20: Crash Antony

8/8/2019 Crash Antony

http://slidepdf.com/reader/full/crash-antony 20/20

Queries«

?