Vous êtes sur la page 1sur 4

Speeding up Secure Web Transactions Using

Identity Based Cryptography.

ABSTRACT

Secure communication is an intrinsic requirement of today’s world of on-line

transactions. Whether exchanging financial, business or personal information, people

want to know with whom they are communicating (authentication) and they wish to

ensure that the information is neither modified (data integrity) nor disclosed

(confidentiality) in transit. The growing popularity of web applications in the last few

years has led users to give the management of their data to online application providers,

which will endanger the security and privacy of the users. In this project, we present

WebIBC, which integrates public key cryptography into web applications without any

browser plugins. The implementation and performance evaluation demonstrate that

WebIBC is secure and efficient both in theory and practice.

Existing System:

1 In existing system, security is achieved through certificate


management and certificate authority by using traditional Public
Key Cryptography.
2 The public key authentication will increase the communication
cost and storage capacity.

PROPOSED SYSTEM:
3 Enhancing web application with web Identity Based Cryptography and Private
Key Generator( Trusted Authority)

4 Every user needs to authenticate him to authority by providing some credentials


he has owned the identity, and the authority will extract the private key from the
master secret according to user’s identity.

5 The public and private key pair is generated using Elliptic Curve Cryptography
(ECC)

It should be noticed that all theKEY SERVER

GENERATES
6 SECRET key

7 PUBLIC PARAMETERS

Receives private key for user2@u2.com

Requests private key,


authenticates

User2 decrypts with private key

user 1 encrypts with user2@u2.com

user 2@u2.com

user 1@u1.com

User 2
User 1

9 cryptography operations are all done within the browser, and


the server can only receive the cipher text. The security and
privacy of end users can be protected from attacks both on
network and server side. From another point of view, server is
also free from the burden of cryptography operations which
means WebIBC is a good model for distributed computation
based on web browsers.

SYSTEM ARCHITECTURE
System Requirements:

Hardware:

PROCESSOR : PENTIUM IV 2.6 GHz


RAM : 512 MB DD RAM
MONITOR : 15” COLOR
HARD DISK : 20 GB
CDDRIVE : LG 52X
KEYBOARD : STANDARD 102 KEYS
MOUSE : 3 BUTTONS

Software:

FRONT END : J2ee (JSP)


TOOL USED : Dreamweaver
OPERATING SYSTEM : Window’s Xp
BACK END : Sql Server 2000

REFERENCES:
10 Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, Xianghao Nan-
“WebIBC: Identity Based Cryptography for Client Side Security in Web
Applications”, IEEE, 2008

11 Yongjun Ren,Jiandong Wang, Youdong Zhang,Liming Fang – “Identity-Based


Key Issuing Protocol for Ad Hoc Networks”, 2007 IEEE International
Conference on Computational Intelligence and Security