Académique Documents
Professionnel Documents
Culture Documents
By
Shashank Dwivedi (0609113099)
Shilendra Mahan (0609113100)
Shobhit Verma (0609113106)
Sonabh Dubey (0609113112)
ii
DECLARATION
We hereby declare that this submission is our own work and that, to the best of our knowledge and
belief, it contains no material previously published or written by another person nor material which to
a substantial extent has been accepted for the award of any other degree or diploma of the university
or other institute of higher learning, except where due acknowledgment has been made in the text.
Signature:
Signature:
Name
Name
: SHASHANK DWIVEDI
: SHOBHIT VERMA
Date
Date
Signature:
Signature:
Name
Name
: SHILENDRA MAHAN
: SONABH DUBEY
Date
Date
iii
CERTIFICATE
This is to certify that Project Report entitled EXPERT SECURITY SYSTEM which is
submitted by SHASHANK DWIVEDI, SHILENDRA MAHAN, SHOBHIT VERMA,
SONABH DUBEY in partial fulfillment of the requirement for the award of degree B. Tech.
in Department of COMPUTER SCIENCE AND ENGINEERING AND INFORMATION
TECHNOLOGY of U. P. Technical University, is a record of the candidate own work carried
out by him under my/our supervision. The matter embodied in this thesis is original and has
not been submitted for the award of any other degree.
Supervisor
Date
iv
ACKNOWLEDGEMENT
It gives us a great sense of pleasure to present the report of the B. Tech Project undertaken during B.
Tech. Final Year. We owe special debt of gratitude to Mrs. Archana Saxena, of Computer Science &
Engineering, J.S.S Academy Of Technical Education, Noida for his constant support and guidance
throughout the course of our work. His sincerity, thoroughness and perseverance have been a constant
source of inspiration for us. It is only his cognizant efforts that our endeavors have seen light of the
day.
We also take the opportunity to acknowledge the contribution of Assistant Professor, Poornima Mehta
Head, Department of Computer Science & Engineering, J.S.S Academy Of Technical Education, Noida
for his full support and assistance during the development of the project.
We also do not like to miss the opportunity to acknowledge the contribution of all faculty members of
the department for their kind assistance and cooperation during the development of our project. Last
but not the least, we acknowledge our friends for their contribution in the completion of the project.
Signature:
Signature:
Name
Name
: SHASHANK DWIVEDI
: SHOBHIT VERMA
Date
Date :
Signature:
Signature:
Name
Name
: SHILENDRA MAHAN
: SONABH DUBEY
Date
Date
ABSTRACT
A variety of trusted third-party encryption requirements have been suggested in recent years by government
agencies seeking to conduct covert surveillance within the changing environments brought about by new
technologies. This report discusses an alternative implementation of third party based encryption. The new
system, called TBE, involves the use of third party to create keys for the server and the client. The server and
client can use their private keys to decrypt any messages sent to each other. The system can be implemented into
modern browsers, and would provide an alternative security system for web servers and clients. This report
includes the underlying mathematical basis which provides the security of the system, and also includes the TBE
system and its method of securely generating keys and the encryption and decryption functions.
vi
TABLE OF CONTENTS
DECLARATION...................................................................................................
Page
ii
CERTIFICATE......................................................................................................... ...
iii
ACKNOWLEDGEMENTS.................................................................................
...
iv
ABSTRACT..........................................................................................................
LIST OF FIGURES...............................................................................................
viii
LIST OF SYMBOLS..............................................................................................
ix
LIST OF ABBREVIATIONS..................................................................................
CHAPTER 1 INTRODUCTION................................................................
01
1.1 Motivation................................................................................................
01
02
03
03
03
05
05
06
07
07
2.2.2. Definitions...............................................................................................
08
08
09
vii
10
10
12
13
14
18
18
18
18
4.4 Constraints..........................................................
19
20
20
28
28
28
29
APPENDIX . ...................................................................... 30
REFERENCES... .......................................................................................................
49
viii
LIST OF FIGURES
Figure 3.1
Figure 3.1.0
Figure 3.1.1
Level 0 DFD
Figure 3.1.2
Level 1 DFD
Figure 4.5.1
Home Page
Figure 4.5.2
Figure 4.5.3
Figure 4.5.4
Figure 4.5.5
Figure 4.5.6
ix
LIST OF SYMBOLS
Totient Function
Not Equal
Belongs to
Equivalent to
LIST OF ABBREVIATIONS
ESS
TBE
RSA
AuthN
Authenticated