Você está na página 1de 8

SECURED TRANSMISSION USING

THRESHOLD-MULTISIGNATURE

A PROJECT REPORT

Submitted by
SARAVANA SUNDARA MURTHY E.
(07W71A0566)
SHIV DEEP B.
(07W71A0571)

in partial fulfillment for the award of the degree


Of
BACHELOR OF ENGINEERING
In
COMPUTER SCIENCE AND ENGINEERING

VANJARI SEETHAIAH MOMERIAL ENGINEERING COLLEGE

JNTU: HYDERABAD 500 072


VANJARI SEETHAIAH MEMORIAL ENGINEERING COLLEGE

IDA, Patancheru

Medak district

Department of Computer Science & Engineering

CERTIFICATE

Certified that this Mini project report “SECURED TRANSMISSION USING

THRESHOLD-MULTISIGNATURE”is the bonafide work of “E.SARAVANA

(07W71A0566) and B.SHIVDEEP(07W71A0571)” who carried out the project work

under my supervision.

SIGNATURE

Mr. M. V. Vijaya Saradhi

HEAD OF THE DEPARTMENT

MRS.Nagini
II
SUPERVISOR
ACKNOWLEDGEMENT

A project is never the outcome of single person’s effort. It is the confluence of


varied thought processes harmoniously integrated into resourceful product. It is natural
that we feel indebted to several people for having made this project possible.

We express our gratitude to our parents who have been the major contributors
of inspiration and encouragement to us throughout our career.

We express our gratitude and sincere thanks to our Principal Dr. M. Shobha,
Principal,VSMEC., for having given us spontaneous and wholehearted encouragement
for completing our project successfully.

We are very indebted to our Head of the Department of Computer Science and
Engineering Sri. M. V. Vijaya Saradhi for the deluge of ideas, assistance and
invaluable support that she has provided to us all through the project.

Our thanks to all other faculty and non-teaching staff members of our
department for their support and peers for having stood by us and helped us to complete
this project.

III
ABSTRACT

Threshold Multisignature schemes combine the properties of threshold group-


oriented signature schemes and Multisignature schemes to yield a signature scheme that
allows more group members to collaboratively sign an arbitrary message.

In contrast to threshold group signatures, the individual signers do not remain


anonymous, but are publicly identifiable from the information contained in the valid
Multisignature. The main objective of our project is to propose such a secure and
efficient Multisignature scheme. Our project shows that the proposed scheme eliminates
the latest attacks to which other similar schemes are subject.

Multisignature is based on distributed-key management infrastructure (DKMI),


which consists of distributed-key generation (DKG) protocol and distributed-key
redistribution/updating (DKRU) protocol. The round optimal DKRU protocol solves a
major problem with existing secret redistribution/ updating schemes by giving group
members a mechanism to identify malicious or faulty share holders in the first round,
thus avoiding multiple protocol executions.

In this project, java is used as the front end and Microsoft SQL Server is used as
the back end. The group key is generated and stored in the database. The Multisignature
is generated using this group key.

IV
TABLE OF CONTENTS
CHAPTER NO TITLE PAGE NO
ABSTRACT IV
LIST OF FIGURES VII
LIST OF ABBREVATIONS VIII
1 INTRODUCTION 1
1.1Introduction 1
1.2Benefits of Multisignature 1
1.3Properties of Multisignature 2
1.3.1 Correction 2
1.3.2 Threshold Property 2
1.3.3 Traceability 2
1.3.4 Coalition Resistance 3
1.3.5 Break Resistance 3
2 SYSTEM ANALYSIS 4
2.1Existing System 4
2.2Proposed System 4
2.3Efficiency Analysis 5
3 PROBLEM FORMULATION 9
3.1Hardware Specification 9
3.2Software Specification 9
3.3Software Description 10
4 SYSTEM DESIGN 25
4.1Design Overview 25
4.2Data Flow Diagram 29

V
4.3Architecture Diagram 33
5 IMPLEMENTATION 34
6 SYSTEM TESTING 43
6.1Types of Tests 43
6.2Unit Testing 45
6.3Integration Testing 46
6.4Acceptance Testing 46
7 CONCLUSION 47
APPENDIX 48
Screen Shots 47
REFERENCES 59

VI
LIST OF FIGURES

FIGURE NO. NAME OF THE FIGURE PAGE NO

1 Java Platform Description 18

2 TCP/IP Stack 21

3 Total Address 23

4 DFD for Signature Generation 29

5 DFD for Signature Verification 30

6 DFD for Encryption 31

7 DFD for Decryption 31

8 DFD for Unicasting Message 32

9 DFD for Multicasting Message 32

10 Architecture Diagram 33

VII
LIST OF ABBREVIATIONS

DKG - Distributed-key generation

DKMI - Distributed-key management infrastructure

DKRU - Distributed-key redistribution/updating

TTP - Trusted third party

DES - Data encryption standard

DFD - Data flow diagram

OMT - Object modeling technique

CRC - Class responsibility collabarator

JDBC - Java database connectivity

JVM - Java virtual machine

GUI - Graphical user interface

TCP - Transmission control protocol

UDP - User datagram protocol

VIII

Você também pode gostar