You are on page 1of 20

HYBRID CRYPTOGRAPHY

WITH AUTHENTICATION

Submitted By- Arijeet kumar


Registration number:15mca1025

Contents
1
2
3
4
5
6
7
8

.
.
.
.
.
.
.
.

Abstract.
Introduction.
Existing System.
Implementation plan.
Modules.
Tools required.
References.
Time-Line Chart.

Abstract
Data integrityrefers to maintaining and assuring
the accuracy and consistency ofdata over its
entirelife Data integrity is the assurance that
information can be accessed or modified only by
those authorized to do so. Modern data security
strategies therefore need to consider two layers1 . The layer where data is being stored and
organised
2 . And the layer where data is being retrieved.

Introduction
HYBRID ENCRYPTION
1 Hybrid encryption is a mode of encryption that merges two
or more encryption systems. It incorporates a combination
of asymmetric and symmetric encryption to benefit from the
strengths of each form of encryption. These strengths are
respectively defined as speed and security.
2. Hybrid encryption is considered a highly secure type of
encryption as long as the public and private keys are fully
secure.
3.Hybrid encryption is achieved through data transfer using
unique session keys along with symmetrical encryption.
Public key encryption is implemented for random symmetric
key encryption.
.

ALGORITHM FOR MESSAGE DIGEST IN


MD5
What is a message-digest algorithm(MD)?
A message-digest algorithm is also called a hash
function or a cryptographic hash function. It accepts a
message as input and generates a fixed-length output,
which is generally less than the length of the input
message. The output is called a hash value, a fingerprint
or a message digest.
MD5 Is a widely used cryptographic function with a 128bit hash value. MD5 has been employed in a wide
variety of security applications, and is also commonly
used to check the integrity of files.
The MD5 algorithm uses 4 state variables, each of
which is a 32 bit integer.

Integrity

The integrity of data means its accuracy


and completeness. Data has integrity if it
has not been corrupted in any way. Data is
said to be corrupted if errors are
introduced into it. Usually the errors have
been introduced by faulty equipment.
o Preventing or detecting & correcting
errors in data transmission

Security

Preventing unauthorized access to


data during its transmission
Physically locking up information
Personal signatures on documents
Passwords & PINS.

MODULES
Modules
There are three type of
Algorithm using in Hybrid
cryptosystem
RSA ALGORITHM:- RSA algorithm using for Decrypt and Encrypt Data
AES ALGORITHM:-The AES algorithms use to be Decrypted Data
MD5:-The MD5 are also using the Message Digest and it is widely
used cryptographic function with 128 bit hash value.

SIDE

ret Shared key

ENCRYPTION

Receivers Public key

RSA
ENCRYPTION
DATA

Encryp
Data

MD

RECEIVERS SIDE
Receivers Private key Decrypted Shared
Secret Key

RSA
DECRYPTION

AES
DECRYPTION

Decrypted Data

MD5 CREATION INPUT


DATA

Decrypted Input
Data

Message Digest

Existing System
DATA COMMUNICATIONS SECURITY
MEASURES
Limiting network access

i. Use of passwords/PINs to access information


ii.Firewalls
iii.Historical & statistical logging
iv.Protecting data during transmission users
either public or secret key cryptography

Encryption.
Encrypt the message and transmit it.

Implementation Plan
I implement the message authentication code
(MAC) in Data integrity.
MAC key is used to develop cryptographic
function using a string sequence of numbers.
Incryptography, amessage authentication
code(oftenMAC) is a short piece of information
used toauthenticateamessageand to provide
integrity and authenticity assurances on the
message
During the network initialization phase,we boost
the authentic node with a sequence of numbers
(X1, X2 ... Xn).

SCREEN SHORT

Tools Required
Software tools
i. JDK
ii.Internet Browser.
iii.Windows 8.
iv.PowerPoint.

Referance.
Yupu Zhang, Abhishek Rajimwale, Andrea C.
Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
Computer Sciences Depart ment, University of
Wisconsin-Madison.
Gopalan Sivathanu, Charles P. Wright, and Erez
Zadok Stony Brook University Computer Science
Department
https://www.eecis.udel.edu/~mills/teaching/eleg86
7b/crypto_slides/ch11.ppt
http://cs.sjsu.edu/~stamp/crypto/PowerPoint_PDF/1
6_MD5.pdf

TIME-LINE CHART
IMPLEMENTATION
6

4
IMPLEMENTATION
3

Topic section
and abstract

0
AUGUST

OCTOBER

OCTOBER

NOVEMBER

You might also like