Você está na página 1de 11

Crypto Systems using RSA and DES Encryption

1
ABSTRACT

The Software security system is totally enhanced with the Features that
enable us to feel the real time environment. Todays world is mostly employing the latest
networking techniques instead of using stand alone pcs .Due to globaliation the information
is shared through sending memos! "#mails and Fa$ .%t is not secure and reliable . There is
threat of security by the eavesdroppers! hackers and other unauthoried users. &ence! it is
necessary to develop an application for providing security to the developed system. This
pro'ect (Software Security System) simulates the above application.

Software security is to secure from the unauthoried user to gain access
over the information. The main aim of security system is secured the networking concepts
and the information cant converted by the other user. To read the information one must
decrypt the encrypted information in a specified manner. The sender and receiver both can
have the systematic way of access to the information. The security system must start with
physical security. This is physically inaccessible to unauthoried intruders.
Security system involves protecting the computer installation against natured disarters
such as fires or earthquakes. Security systems have methods of verifying accesses. *ne
method is to store a list of acceptable telephone numbers in the computer and have the
computer callbacks when a user calls in another method.

+

Todays software are being pirated from the original one.This must be prevented
which is also one of the main intention of the pro'ect *therwise some other pirate the
important software developed by you. , unique identification number namely the (-,.
,ddress) is used to protect the software from piracy.
This pro'ect provides security using the concept of (cryptography). The security
may be any of the two types !that is! )symmetric) or (asymmetric). The procedure containing
of encode the data using some algorithms which consist of a key /public0private1 through
which the other side i.e! other party will decode using the same key which has been
accepted . 2y both parties or users.
3
CONCEPT OF PROJECT WORK

2efore starting every pro'ect its planning is done. 4lanning a pro'ect is a very important
task and should be taken up with great care as the efficiency of whole pro'ect largely
depends upon its planning.
5hile planning a pro'ect! each and every detail should be worked out in anticipation and
should be considered carefully considering all the relevant provisions in advance.
6owadays! more stress is being given to bring the engineers forward to open their own
companies! and "ngineering students after completing their courses are also being
encouraged to open their own companies. During the pro'ect work! students get
e$perience of future of the e$ternal environment in which their work becomes valuable
service to the companies. &ence! the study of pro'ect planning has become more
important. For this reason most of the universities and 2oards have introduced the pro'ect
work in the syllabus of final year of "ngineering and Diploma courses.
This chapter will help in planning the pro'ect for the students as well as to the
engineering who want to start new companies and will facilitate in formulating the
correct approach to take up the 'ob of pro'ect planning. 2roadly speaking! pro'ect
analysis is the commercial research done to find the suitability of business or a company
to be started. 4lanners go into different investigations for effecting the business or
company to obtain good working conditions! better quality of product and quite
handsome profits.
7
INTRODUCTION
The pro'ect (SOFTWARE SECURITY SYSTES) is totally enhanced with the
features that enable us to feel the real#time environment. ,s the todays world is mostly
employing the latest networking techniques instead of using stand#alone 4.s. ,s every
product possessing advantages might also have some disadvantages. The advantages with
the networking are that a company can share files or data without need to use some
e$ternal devices to carry the data. Similarly! a company can share the single costly
printer. 8ikely! the disadvantages are also numerous. Somebody writes a program and can
make the costly printer to misprint the data. Similarly! some unauthoried user may get
access over the network and may perform any illegal functions like deleting some of the
sensitive information like employee salary details! while they are in transaction. *ur
pro'ect has some of the features described as follows9
Firstly! the pro'ect makes use of the secured networking concepts that will make
the sensitive information to be encrypted /converted1 in such a manner that will not be
understood by the unauthoried user who gains access over this information. To read the
information one must decrypt the encrypted information in a pre#specified manner. *nly
sender and receiver both can have the systematic way of access to the information.
Secondly! many of the todays software are being pirated from the original one.
This must be prevented which is also the one of the main intention of the pro'ect.
*therwise some other might pirate the important software developed by you. , unique
identification number namely the (-,. ,ddress) is used to protect the software from
piracy.
:
2.1 EXISTING SYSTEM:
%n the physical system the network helps a particular organiation to share the data by
using e$ternal devices. The e$ternal devices are used to carry data. The e$isting system
cannot provide security! which allows an unauthoried user to access the secret files. %t
also cannot share a single costly printer. -any interrupts may occur with in the system.
2.2 PROPOSED SYSTEM:
%n this system ;security is the term that comes into picture when some important or
sensitive information must be protected from an unauthoried access. &ence there must
be some way to protect the data from them and even if he hacks the information! he
should not be able to understand whats the actual information in the file! which is the
main intention of the pro'ect.
<
MODULES:
The pro'ect is designed to protect the sensitive information while it is in
transaction in the network. There are many chances that an unauthoried person can have
an access over the network in some way and can access this sensitive information. The
pro'ect uses the strong secured algorithms that enables and guarantees the security of the
information in the network.
The pro'ect is divided in to t!o modu"es. "ach module is embedded with the
powerful algorithms that are used especially to secure the sensitive information.
1. =S, algorithm.
+. D"S algorithm.
3.1 RSA algorithm:

The =ivest#Shamir#,dlemen /=S,1 scheme has reigned supreme as the most widely
accepted and implemented general#purpose approach to public key encryption. The =S,
scheme makes use of the e$pressions with e$ponentials. The =S, algorithm encrypts the
data into cipher te$t i.e.! unreadable format according to ht specifications given be =S,
algorithm.
Firstly the encryption is done using the concept called ,uthentication in which the
encryption is done through the private key of the sender. The receiver makes use of the
public key of the sender to decrypt it.
Secondly the encryption is done using the concept called (confidentiality). %n this the
encryption i.e.! converting plain te$t into cipher te$t! is done using the receivers public
key. The receiver at the other end must use his private key to decrypt the cipher te$t back
into the plain te$t. 8astly! the encryption is done through (security) option in which the
encryption is done twice. =S, algorithm is as follows9
>
1. ?enerate public key and private key set.
1. ?enerate prime numbers randomly! the prime numbers are p! q
,nd p is not equal to q.
+. 6 @ pAq
3.m@/p#11A/q#11
7.gcd/e! m1@1
:. D@e#1mod n
Therefore public key Be! nC and private key Bd! nC
#$%i"e encryption or directory encryption
1.open a file
+.read character by character
1.encrypt logic /character#encrypt te$t1
+.decrypt logic /encrypt te$t#character1
3.open other file in write mode.
&$# DES a"gorit'm(
%n D"S algorithm! data are encrypted in <7#bit blocks using a :<#bit key. The algorithm
transforms <7#bit input in a series of steps into a <7#bit output. The D"S en'oys
widespread use. %t has also been the sub'ect of much controversy concerning how secure
the D"S is.
,s with any encryption scheme! there are two inputs to the encryption
function the plain te$t to be encrypted and the key. %n this case the plain te$t to be
encrypted and the key. %n this case the plain te$t must be <7 bits in length and the key is
:< bits in length.
D
3.3 DES OVERVIEW:
64-bit length text 56-bit
length text
Initial
permutation
Permuted choice1

Round2 Permuted
choice2
Left circular shift
Round16 Permuted
choice2
Left circular shift
32 bit sweep
Inverse initial
permutation

64-bit cipher text
%n the above diagram shows D"S overview. %n this algorithm we can take two inputs.
*ne input is new one and another one is past output. 5e can use these two inputs we can
E
Round1 Permuted
choice2
Left circular shift
get the resultant output. %n these two inputs one input length is <7#bit and another input
length is :<#bit.
SYSTEM REQUIREMENTS
Our pro)ect *S*FT5,=" S".F=%TG SGST"-S+ needs t'e %o""o!ing
minimum re,uirements o% system$
SOFTWARE RE-UIREENTS
.RO/RAIN/ 0AN/ (1A2A
O.ERATIN/ SYSTE (WINDOWS
FRAE WOR3 (SWIN/S
DOCUENTATION (OFFICE #444
5ARDWARE RE-UIREENTS
.ROCESSER (64768
5ARD DIS3 (9$# /B
RA (98 B
ONITOR (2/A
3EYBOARD (949 STANDARD 3EY
1H
OUSE (0O/ITEC5
11

Você também pode gostar