You are on page 1of 13

TABLE OF CONTENTS

S.NO CONTENTS PAGE NO

ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS

1.

INTRODUCTION 1.1 Aim 1.2 Objective 1.3 Organization profile

2.

SYSTEM STUDY 2.1 Existing system 2.2 Proposed system 2.3 Feasibility study

3.

SYSTEM SPECIFICATION 3.1 Hardware 3.2 Software 3.3 Software description

4.

MODULE SPECIFICATION

5.

SYSTEM DESIGN 5.1 DFD 5.2 Data Dictionary 5.3 Table Structure 5.4 Input Design 5.5 Output Design 5.6 Screen Shots

6. 7. 8.

TESTING AND VALIDATION CONCLUSION BIBLOGRAPHY

ABSTRACT

The problem of unsecure communication is compounded by the fact that much of this information is sent over the public Internet and may be processed by third parties, as in e-mail or instant messaging (IM)

Cryptography can be used to provide message confidentiality and integrity and sender verification. The basic functions of cryptography are encryption, decryption and cryptographic hashing. In order to encrypt and decrypt messages, the sender and recipient need to share a secret. Typically this is a key, like a password, that is used by the cryptographic algorithm.

Cryptography involves converting a message text into an unreadable cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both these techniques provide more security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks.

In this paper I propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding. This system will be more securing than any other these techniques alone and also as compared to steganography and cryptography combined systems.

1. INTRODUCTION

Electronic communication is the lifeblood of many organizations. Much of the information communicated on a daily basis must be kept confidential. Information such as financial reports, employee data and medical records needs to be communicated in a way that ensures confidentiality and integrity.

Cryptography can be used to provide message confidentiality and integrity and sender verification. The basic functions of cryptography are encryption, decryption and cryptographic hashing.

The three basic types of cryptography in common use are symmetric key, asymmetric (public) key systems and cryptographic hash functions. Typically, the strength of a crypto system is directly related to the length of the key. This assumes that there is no inherent weakness in the algorithm and that the keys are chosen in a way that fully utilizes the key space (the number of possible keys). There are many kinds of attacks that can be used against crypto systems, but these are beyond our scope here. That said, if you use public algorithms with no known vulnerabilities, use reasonable key lengths (most defaults are fine) and choose good keys (which are normally chosen for you), your communications will be very secure.

Symmetric key cryptography uses the same key to encrypt and decrypt data. Some common symmetric key algorithms are the Data Encryption Standard (DES), Triple DES, Blowfish and the Advanced Encryption Standard (AES). DES is ineffective because it uses a 64bit key and has been broken. Be careful, because some crypto security, like Microsofts Windows

XP Encrypted File System (EFS), defaults to DES and must be changed to provide good security.

Asymmetric (public) key cryptography uses a pair of mathematically related keys. Each key can be used to encrypt or decrypt. However, a key can only decrypt a message that has been encrypted by the related key. The key pair is called the public/private key pair. Some common public key systems are Rivest-Shamir-Adelman (RSA), Diffe-Hellman and Digital Signature Standard (DSS).

Cryptographic hash functions take a message of arbitrary length and compute a fixed signature, often called a message digest, for the message. This can be done for a file, e-mail message or your entire hard-drive image. The main properties of these functions are that it is difficult to find different files that produce the same digest and that the function is one-way. Therefore, it is not computationally feasible to recover a message given its digest.

1.1 Aim:

Information is a strategic resource which is paramount for the effective functioning of any organization. This information needs to be managed and safeguarded from malicious and unauthorized users. Various encryption and data security standards have been suggested and implemented for this purpose.

The Aim of this project is to propose new DATA ENCRYPTION and DECRYPTION software that amalgamates the best of many encryption algorithms creating a new unified approach to data security, confidentiality, and authentication by bringing all these diverse algorithms to work in tandem.

1.2 Objective: In today's world of Electronic Commerce on the Internet, the need for secure communications is obviously crucial. Cryptographic technologies provide enterprises with the best mechanisms of protecting their information, without putting the business at risk by exposing it on the Net. Cryptography allows you to transmit data securely over the Internet.

Information is a strategic resource, Security measures are taken through physical and administrative means, similarly spread of IT has given a requirement for automated/technical security measures, In any organization a significant portion of its budget is spent on managing information. Main Objective of this Project is to provide
Confidentiality Authentication Integrity Access Control

For secured data over the TCP /IP Network.

1.3 Organization profile :

2. SYSTEM STUDY

2.1 EXISTING SYSTEM: Most of the present day encryption standards use only one of the classical or modern encryption algorithms to render the information/message unreadable and irretrievable. However, these standards are prone to eavesdropping and other intruders attack such as brute force attack. However the problem is that of key exchange - it is the mechanism for safely ensuring both parties, the sender and the receiver, have the secret key. This is one of the weakest areas of symmetric cryptography. So the demerit of this method is that if the key is known, privacy is sacrificed.

2.2 PROPOSED SYSTEM: In this paper we propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding. This system will be more secure than any other these techniques alone and also as compared to steganography and cryptography combined systems The message will first be encrypted using Asymmetric Key Cryptography technique. The data will be encrypted using basic DES algorithm [9]. This cipher will now be hidden into a multimedia file. Cryptographic algorithms generally need a reference table which aids the conversion of a small block of data into another block (may not be a block of data in the original content).

In order to provide higher security levels the algorithm is designed to use a reference database .The reference database will consist of various reference grids. Each of these grids will have a 3-d representation of the encoding schema which will be used to represent the characters in terms of specific numbers. (The same number may or may not represent a different character in a different grid).

2.3 FEASIBILITY STUDY:

3. SYSTEM SPECIFICATION

3.1 HARDWARE USED:

P4Processor Keyboard Mouse Multimedia Color monitor 256MBRAM

3.2 SOFTWARE USED:

Windows xp. Dot Net Frame work 4.0.

You might also like