Vous êtes sur la page 1sur 14

Authentication based on finger

print using Symmetric and


Visual Cryptography

By ARIJEET KUMAR
Registration number:-15MCA1025

Contents
1
2
3
4
5
6
7
8

.
.
.
.
.
.
.
.

Abstract.
Introduction.
Existing System.
Implementation plan.
Modules.
Tools required.
References.
Time-Line Chart.

Abstract

The combination of symmetric and visual cryptography


technique is used to have secured authentication based
on finger print the proposed system consist of two
phases.
In the first phase, the figure print image is divided into
two shares with the help of visual cryptography
technique. Finally one encrypted share is stored in ID
card and another one is stored in Data Base.
In second phase, actual authentication process is
performed based on the Thumb Impression which is
given by the person. After getting the Thumb
Impression, encrypted shares are decrypted and both
shares are stacked to generate the Thumb Impression
are compared. If both are equal the person is allowed or
not allowed.

Introduction
HYBRID ENCRYPTION
1 Hybrid encryption is a mode of encryption that merges two or more
encryption systems. It incorporates a combination of asymmetric
and symmetric encryption to benefit from the strengths of each form
of encryption. These strengths are respectively defined as speed and
security.
2. Hybrid encryption is considered a highly secure type of encryption
as long as the public and private keys are fully secure.
3.Hybrid encryption is achieved through data transfer using unique
session keys along with symmetrical encryption. Public key
encryption is implemented for random symmetric key encryption.
.

ALGORITHM FOR MESSAGE DIGEST IN


MD5

MD5 Is a widely used cryptographic function with a


128- bit hash value. MD5 has been employed in a wide
variety of security applications, and is also commonly
used to check the integrity of files .
The MD5 algorithm uses 4 state variables, each of
which is a 32 bit integer.
These functions, using the state variables and the
message as input, are used to transform the state
variables from their initial state into what will become
the message digest.

Existing System

DATA COMMUNICATIONS SECURITY


MEASURES
Limiting network access
i. Use of passwords/PINs to access
information
ii. Firewalls
iii. Historical & statistical logging
iv. Protecting data during transmission users
either public or secret key cryptography

Implementation Plan

There are two type of using key in RSA algorithm


a. public key
b. Private key

RSAis analgorithmused by modern computers


toencryptand decrypt messagesIt is an asymmetric
cryptographic algorithm. Asymmetric means that there
are two different keys. This is also calledpublic key
cryptography , because one of them can be given to
everyone. The other key must be kept private. RSA
stands for Ron Rivets,Aid ShamirandLeonard Adelman
The RSA Algorithm for Creating RSA Public and Private
Key Pair.

Modules

There are three type of


Algorithm using in Hybrid
cryptosystem
RSA ALGORITHM:- RSA algorithm using for Decrypt and Encrypt Data
AES ALGORITHM:-The AES algorithms use to be Decrypted Data
MD5:-The MD5 are also using the Message Digest and it is widely
used cryptographic function with 128 bit hash value.

SIDE

ret Shared key

ENCRYPTION

Receivers Public key

RSA
ENCRYPTION
DATA

Encryp
Data

MD

RECEIVERS SIDE
Receivers Private key Decrypted Shared
Secret Key

RSA
DECRYPTION

AES
DECRYPTION

Decrypted Data

MD5 CREATION INPUT


DATA

Decrypted Input
Data

Message Digest

Tools Required

Software tools

i.
ii.
iii.

Java language
Internet Browser.
Oracle 10g (Data Base)

Reference.

You Zhang, Abhishek Rajimwale, Andrea C. ArpaciDusseau, Remzi H. Arpaci-Dusseau Computer


Sciences Depart ment, University of WisconsinMadison.
Gopalan Sivathanu, Charles P. Wright, and Erez
Zadok Stony Brook University Computer Science
Department
https://www.eecis.udel.edu/~mills/teaching/eleg867b
/crypto_slides/ch11.ppt
http://cs.sjsu.edu/~stamp/crypto/PowerPoint_PDF/1
6_MD5.pdf

TIME-LINE CHART
IMPLEMENTATION

Final
implementation

5
4
Proposed worked
and paper submission

Implementation
plan

2
1
0

Topic section
and abstract

AUGUST

OCTOBER OCTOBER NOVEMBER

IMPLEMENTATION

THANK
YOU