Vous êtes sur la page 1sur 10

EXPERT SECURITY SYSTEM

By
Shashank Dwivedi (0609113099)
Shilendra Mahan (0609113100)
Shobhit Verma (0609113106)
Sonabh Dubey (0609113112)

Submitted to the Department of Information Technology in partial


fulfillment of the requirements
for the degree of
Bachelor of Technology
in
Information Technology

J.S.S ACADEMY OF TECHNICAL EDUCATION, NOIDA


U.P. TECHNICAL UNIVERSITY
April, 2010

ii

DECLARATION
We hereby declare that this submission is our own work and that, to the best of our knowledge and
belief, it contains no material previously published or written by another person nor material which to
a substantial extent has been accepted for the award of any other degree or diploma of the university
or other institute of higher learning, except where due acknowledgment has been made in the text.

Signature:

Signature:

Name

Name

: SHASHANK DWIVEDI

: SHOBHIT VERMA

Roll No.: 0609113099

Roll No.: 0609113106

Date

Date

Signature:

Signature:

Name

Name

: SHILENDRA MAHAN

: SONABH DUBEY

Roll No.: 0609113100

Roll No.: 0609113112

Date

Date

iii

CERTIFICATE

This is to certify that Project Report entitled EXPERT SECURITY SYSTEM which is
submitted by SHASHANK DWIVEDI, SHILENDRA MAHAN, SHOBHIT VERMA,
SONABH DUBEY in partial fulfillment of the requirement for the award of degree B. Tech.
in Department of COMPUTER SCIENCE AND ENGINEERING AND INFORMATION
TECHNOLOGY of U. P. Technical University, is a record of the candidate own work carried
out by him under my/our supervision. The matter embodied in this thesis is original and has
not been submitted for the award of any other degree.

Supervisor

Date

iv

ACKNOWLEDGEMENT
It gives us a great sense of pleasure to present the report of the B. Tech Project undertaken during B.
Tech. Final Year. We owe special debt of gratitude to Mrs. Archana Saxena, of Computer Science &
Engineering, J.S.S Academy Of Technical Education, Noida for his constant support and guidance
throughout the course of our work. His sincerity, thoroughness and perseverance have been a constant
source of inspiration for us. It is only his cognizant efforts that our endeavors have seen light of the
day.
We also take the opportunity to acknowledge the contribution of Assistant Professor, Poornima Mehta
Head, Department of Computer Science & Engineering, J.S.S Academy Of Technical Education, Noida
for his full support and assistance during the development of the project.
We also do not like to miss the opportunity to acknowledge the contribution of all faculty members of
the department for their kind assistance and cooperation during the development of our project. Last
but not the least, we acknowledge our friends for their contribution in the completion of the project.

Signature:

Signature:

Name

Name

: SHASHANK DWIVEDI

: SHOBHIT VERMA

Roll No.: 0609113099

Roll No.: 0609113106

Date

Date :

Signature:

Signature:

Name

Name

: SHILENDRA MAHAN

: SONABH DUBEY

Roll No.: 0609113100

Roll No.: 0609113112

Date

Date

ABSTRACT

A variety of trusted third-party encryption requirements have been suggested in recent years by government
agencies seeking to conduct covert surveillance within the changing environments brought about by new
technologies. This report discusses an alternative implementation of third party based encryption. The new
system, called TBE, involves the use of third party to create keys for the server and the client. The server and
client can use their private keys to decrypt any messages sent to each other. The system can be implemented into
modern browsers, and would provide an alternative security system for web servers and clients. This report
includes the underlying mathematical basis which provides the security of the system, and also includes the TBE
system and its method of securely generating keys and the encryption and decryption functions.

vi

TABLE OF CONTENTS

DECLARATION...................................................................................................

Page

ii

CERTIFICATE......................................................................................................... ...

iii

ACKNOWLEDGEMENTS.................................................................................

...

iv

ABSTRACT..........................................................................................................

LIST OF FIGURES...............................................................................................

viii

LIST OF SYMBOLS..............................................................................................

ix

LIST OF ABBREVIATIONS..................................................................................

CHAPTER 1 INTRODUCTION................................................................

01

1.1 Motivation................................................................................................

01

1.2 Project Objective.....................................................................................

02

1.3 Scope of Project..

03

1.4 Related Previous Work...

03

1.5 Organization of Report.

03

CHAPTER 2 LITERATURE SURVEY..............................................................

05

2.1 Introduction to theories by Shamir..

05

2.1.1 Overview of TB Cryptography .......................................................

06

2.2.Third Party based Encryption.................................................................

07

2.2.1. Revocation of Public Keys....................................................................

07

2.2.2. Definitions...............................................................................................

08

2.2.3 .One way TBE ..........................................................................................

08

2.3. Concrete TBE system using Weil pairing.......................................

09

vii

CHAPTER 3 SYSTEM DESIGN AND METHODODLOGY....................................

10

3.1. System Design.................................................................................................

10

3.1.1 Data Flow Diagrams (Level 0). .....................................................................

12

3.1.2 Level 1 DFD . .....................................................................

13

3.1.3 RSA Algorithm . .....................................................................

14

CHAPTER 4 IMPLEMENTATION and RESULTS .................................................

18

4.1 Minimum Hardware Requirements..

18

4.2 Minimum Software Requirements .......................................................

18

4.3 Assumptions and Dependencies .......................................................

18

4.4 Constraints..........................................................

19

4.5 Implementation Details .......................................................

20

4.5.1 Snapshots of Interfaces .......................................................

20

CHAPTER 5 CONCLUSIONS ..................................................................................

28

5.1 Performance Evaluation..

28

5.2 Comparison with existing state-of-art technology.......................................

28

5.3 Future Directions........................................................

29

APPENDIX . ...................................................................... 30
REFERENCES... .......................................................................................................

49

viii

LIST OF FIGURES

Figure 3.1

System Architectural View

Figure 3.1.0

System Functional View

Figure 3.1.1

Level 0 DFD

Figure 3.1.2

Level 1 DFD

Figure 4.5.1

Home Page

Figure 4.5.2

Client Login Window

Figure 4.5.3

Client Request and Message Sending view

Figure 4.5.4

Message Encryption View by Server

Figure 4.5.5

Database of Client and Server at Third Party End

Figure 4.5.6

Message Decryption view by Server

ix

LIST OF SYMBOLS

Totient Function

Not Equal

Belongs to

Equivalent to

LIST OF ABBREVIATIONS

ESS

Expert Security System

TBE

Third Party Based Enryption

RSA

Rivest Shamir Adleman

AuthN

Authenticated

Vous aimerez peut-être aussi