Professional Documents
Culture Documents
WITH AUTHENTICATION
Contents
1
2
3
4
5
6
7
8
.
.
.
.
.
.
.
.
Abstract.
Introduction.
Existing System.
Implementation plan.
Modules.
Tools required.
References.
Time-Line Chart.
Abstract
Data integrityrefers to maintaining and assuring
the accuracy and consistency ofdata over its
entirelife Data integrity is the assurance that
information can be accessed or modified only by
those authorized to do so. Modern data security
strategies therefore need to consider two layers1 . The layer where data is being stored and
organised
2 . And the layer where data is being retrieved.
Introduction
HYBRID ENCRYPTION
1 Hybrid encryption is a mode of encryption that merges two
or more encryption systems. It incorporates a combination
of asymmetric and symmetric encryption to benefit from the
strengths of each form of encryption. These strengths are
respectively defined as speed and security.
2. Hybrid encryption is considered a highly secure type of
encryption as long as the public and private keys are fully
secure.
3.Hybrid encryption is achieved through data transfer using
unique session keys along with symmetrical encryption.
Public key encryption is implemented for random symmetric
key encryption.
.
Integrity
Security
MODULES
Modules
There are three type of
Algorithm using in Hybrid
cryptosystem
RSA ALGORITHM:- RSA algorithm using for Decrypt and Encrypt Data
AES ALGORITHM:-The AES algorithms use to be Decrypted Data
MD5:-The MD5 are also using the Message Digest and it is widely
used cryptographic function with 128 bit hash value.
SIDE
ENCRYPTION
RSA
ENCRYPTION
DATA
Encryp
Data
MD
RECEIVERS SIDE
Receivers Private key Decrypted Shared
Secret Key
RSA
DECRYPTION
AES
DECRYPTION
Decrypted Data
Decrypted Input
Data
Message Digest
Existing System
DATA COMMUNICATIONS SECURITY
MEASURES
Limiting network access
Encryption.
Encrypt the message and transmit it.
Implementation Plan
I implement the message authentication code
(MAC) in Data integrity.
MAC key is used to develop cryptographic
function using a string sequence of numbers.
Incryptography, amessage authentication
code(oftenMAC) is a short piece of information
used toauthenticateamessageand to provide
integrity and authenticity assurances on the
message
During the network initialization phase,we boost
the authentic node with a sequence of numbers
(X1, X2 ... Xn).
SCREEN SHORT
Tools Required
Software tools
i. JDK
ii.Internet Browser.
iii.Windows 8.
iv.PowerPoint.
Referance.
Yupu Zhang, Abhishek Rajimwale, Andrea C.
Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
Computer Sciences Depart ment, University of
Wisconsin-Madison.
Gopalan Sivathanu, Charles P. Wright, and Erez
Zadok Stony Brook University Computer Science
Department
https://www.eecis.udel.edu/~mills/teaching/eleg86
7b/crypto_slides/ch11.ppt
http://cs.sjsu.edu/~stamp/crypto/PowerPoint_PDF/1
6_MD5.pdf
TIME-LINE CHART
IMPLEMENTATION
6
4
IMPLEMENTATION
3
Topic section
and abstract
0
AUGUST
OCTOBER
OCTOBER
NOVEMBER