Secure File Transmission using Split & Merge Technique
|
|
|
- Shauna Summers
- 10 years ago
- Views:
Transcription
1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015, pg RESEARCH ARTICLE ISSN X Secure File Transmission using Split & Merge Technique Neha Koli 1, Siddhant Parkar 2, Karan Shah 3, Asst. Prof Manisha Giri 4 ¹Department of Comp. Engineering, Atharva College of Engineering, India ²Department of Comp. Engineering, Atharva College of Engineering, India 3 Department of Comp. Engineering, Atharva College of Engineering, India 4 Department of Comp. Engineering, Atharva College of Engineering, India 1 nehakoli @gmail.com; 2 [email protected]; 3 [email protected]; 4 [email protected] Abstract This paper deals with the development of an application under the data security domain. In today s age, security of data has become paramount. Continuous flow of information in removable storage and/or internet has made data susceptible to mischief. Convenient, safe and fast transmission of data is the aim behind developing this application. The application splits a large file into multiple chunks making it practically unreadable or incomprehensible to achieve data security. It is impractical to upload a large raw file with slow internet connection. Such files can be compressed using the application. An module added to the application makes the transfer even easier. Keywords Splitting, Merging, Compression, Decompression, Encryption, Decryption I. INTRODUCTION The application to be developed primarily deal with data security. The basic idea behind this application is split and merges. Suppose if you have media file of 3 GB and have two removable storages of 2 GB each. A dilemma arises of effectively transferring the said media file. Apart from the security aspect of the application to be developed an easy way to transfer the file is achieved. This big file can be split into multiple smaller pieces of user defined sizes. Now these can be conveniently stored to the removable storage devices. Along with providing convenience of transfer, it also secures the media file. The file extension would be changed because of the split operations performed on them. This renders the file naturally unreadable which makes it safe from prying eyes. Alas this approach isn t very helpful when the security of text files is involved. With this in mind, encryption is introduced. Encoding messages or information in such a way that only authorized parties can read it is known as encryption. Converting plain text into ciphertext with or without the help of a key is the core idea behind encryption. Ciphertext is encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. To understand or access the encrypted data one need to decrypt it which also requires a key. The process of decryption is the reverse of encryption in which the cipher text is subject to the process of deciphering which converts the cipher 2015, IJCSMC All Rights Reserved 59
2 text into plain text which the receiver can read. When the internet speed is slow, it is impractical to send large media files. Compression allows us to decrease the file size so it can be sent faster over a network. Compression can be done using two methods lossy and lossless. In lossy compression some redundant data is lost therefore lossless is usually preferred over lossy. Lossy Compression is usually used for media files like image, audio, video, etc and lossless compression is usually used for documents in text format. An module is used to transfer the file. II. ALGORITHMS & TECHNIQUES USED We consider and discuss algorithms and techniques which have been zeroed in on, to use in the software development. 1. Encryption Algorithm 1.1 AES (Advanced Encryption Standard). For the encryption purpose AES [2] has been considered. AES [2] is a symmetric encryption algorithm. It belongs to the class of block ciphers. The name Rijndael is derived from its two creators Vincent Rijmen and John Daemen. Because of its symmetric nature key management is very essential as the encrypted data can be decoded using the same key which was used to encrypt it in the first place. AES [2] is based on the design principle of both substitution and permutation. The Advanced Encryption Standard [2] is operated on a fixed block size of 128 bits, along with varying key sizes of 128 bits, 196 bits and 256 bits. Depending upon the key size 256,128 and 196 it takes 14, 10 and 12 cycles respectively to get encrypted. 2. Data compression Techniques 2.1 G ZIP For compression the gzip algorithm is considered [3]. A variation of LZ77 is the deflation algorithm used by gzip. In the input data duplicated strings are found. A pointer to the previous string replaces second occurrence of a string, in the form of a 1pair (length, distance). 32K bytes is the distance, and and 258 bytes the length. A sequence of literal bytes is emitted when a string does not occur anywhere in the previous 32K bytes. `String' is not restricted to printable characters and must be taken as an arbitrary sequence of bytes. 1. Split and Merge III. MODULES Both the split and merge modules are combined. The file to be secured is selected by the user. With the help of file stream the contents of the file are read. The contents need to be manipulated. For that we write the data into a byte array using BinaryWriter. The split size of the file chunk can be specified by the user. The application should run a loop where the byte array in which the contents are stored are retrieved at every pass and save in a new file with extension.dat Also the size of the array is decreased subsequent for each chunk retrieved. The loop goes on until the buffer is empty. We get the output as split chunks of a readable file. The chunks so formed are unreable to humans. In this way files can be securely transmitted from one system to another. Now if the user is at receivers end i.e. he has received the split chunks for security purpose and now wishes to read/write the file. He will have to have access to the whole file. For that he has to merge the files. To achieve that, the user has to have each and every piece of the split file. The user has to select the first piece and the target directory to save the merged file. 2. Encryption and Decryption The provision has to be made so that the user is able to select the file that has to be encrypted. Once the file gets encrypted the user can save the file on the system or the encrypted file can be directly transferred using the module. Splitting generally makes the file unreadable for human eyes. But for text files, we can even view split files using a notepad. So for this we introduced an encryption 2015, IJCSMC All Rights Reserved 60
3 module using AES. AES will make text files unreadable. These files can then be safely split. In the encryption module we select the text file using open. Then we select encrypt. When the text is encrypted we save it. 3. Compression and Decompression GZip [3] is used for compression. Compression is of two types. One is lossy compression and one is lossless compression. Lossy compression is mainly used for images and videos. Lossless compression is used for compression of application files. Compression facilitates quick upload and transfer of files over the network. We select the file to be compressed and then we select the destination folder. The compressed file is stored in a zip format. For decompression we select the zip file and select the output folder. The compressed file is then decompressed. 4. Transfer of file is ubiquitous in today s environment. The world has become a smaller place due to the advent of the internet. It goes without saying that when an application involving encryption and compression is developed. And module would be added to it. The module facilitates an easy transfer of data over the network. allows attachments of maximum size 25mb. When the file is split and compressed using our application, an module is not just an afterthought. The developer can connect the module being developed to any portal. Simple Message Transport Protocol can be used to connect the said module to the server. IV. PSEUDO CODE A pseudo code for the application being developed is described as follows. public bool beginsplit() BinaryReader breader = null; BinaryWriter bwriter = null; byte[] buffer = null; long fsize = 0; int curfilesplit = 0; long numleftoverbytes = 0; long bytesread = 0; long cursplitsize = 0; string cursplitfilename = null; string basename = null; if (!checkinputs(true, true)) return false; fsize = FileSystem.FileLen(targFileName); if (fsize < MaxSplitSize) return false; targfileacl = new FileInfo(targFileName).GetAccessControl(); buffer = new byte[buffersize]; basename = targfilename.substring(targfilename.lastindexof("\\") + 1, targfilename.length - (targfilename.lastindexof("\\") + 1)); cursplitfilename = outputdir + "\\" + basename + splitfirstname + splitreplacetoken + splitext; breader = new BinaryReader(new FileStream(targFileName, FileMode.Open, FileAccess.Read, FileShare.None, BufferSize, FileOptions.SequentialScan)); bwriter = new BinaryWriter(File.Create(curSplitFileName.Replace(splitReplaceToken, curfilesplit.tostring()), BufferSize, FileOptions.None, targfileacl)); while (bytesread > 0) if ((cursplitsize + bytesread) > MaxSplitSize) numleftoverbytes = MaxSplitSize - cursplitsize; bwriter.write(buffer, 0, Convert.ToInt32(numLeftOverBytes)); bwriter.flush(); 2015, IJCSMC All Rights Reserved 61
4 bwriter.close(); curfilesplit += 1; bwriter = new BinaryWriter(File.Create(curSplitFileName.Replace(splitReplaceToken, curfilesplit.tostring()), BufferSize, FileOptions.SequentialScan FileOptions.WriteThrough, targfileacl)); cursplitsize = bytesread - numleftoverbytes; if (onprogressstep!= null) double temp789 = breader.basestream.position / fsize; double temp147 = curfilesplit / curstats.numsplits; onprogressstep(convert.toint32(math.floor((temp789) * 100)), Convert.ToInt32(Math.Floor((temp147) * 100))); if (!(numleftoverbytes == 0)) bwriter.write(buffer, Convert.ToInt32(numLeftOverBytes - 1), Convert.ToInt32(curSplitSize)); else bwriter.write(buffer, Convert.ToInt32(numLeftOverBytes), Convert.ToInt32(curSplitSize)); else bwriter.write(buffer, 0, Convert.ToInt32(bytesRead)); cursplitsize += bytesread; if (onprogressstep!= null) double temp258 = breader.basestream.position / fsize; double temp369 = curfilesplit / curstats.numsplits; onprogressstep(convert.toint32(math.floor((temp258) * 100)), Convert.ToInt32(Math.Floor((temp369) * 100))); return true; private void DoSplit() boolean b = SpliterClass.beginSplit(); if (b == false) print("cannot Split File"); else print("split Done Successfully"); function bool beginreassembly() BinaryReader breader = null; BinaryWriter bwriter = null; byte[] buffer = null; int curfilesplit = 0; long bytesread = 0; string cursplitfilename = ""; string basename = ""; System.Security.AccessControl.FileSecurity targfileacl = null; //store file access control list, used on each split file long fsize = 0; if (!checkinputs(true, false)) return false; targfileacl = FileInfo(targFileName).GetAccessControl(); buffer = new byte[buffersize]; 2015, IJCSMC All Rights Reserved 62
5 basename = targfilename.substring(targfilename.lastindexof("\\") + 1, targfilename.length - (targfilename.lastindexof("\\") + 1)); basename = basename.substring(0, basename.lastindexof(splitfilefirstname)); cursplitfilename = outputdir + "\\" + basename + splitfirstname + splitreplacetoken + splitext; bwriter = new BinaryWrite(File.Create(outputDir + "\\" + basename, BufferSize, System.IO.FileOptions.None, targfileacl)); while (File.Exists(curSplitFileName.Replace(splitReplaceToken, curfilesplit.tostring()))) breader = new BinaryReader(new System.IO.FileStream(curSplitFileName.Replace(splitReplaceToken, curfilesplit.tostring()), FileMode.Open, FileAccess.Read,FileShare.None, BufferSize,FileOptions.SequentialScan)); fsize = FileSystem.FileLen(curSplitFileName.Replace(splitFileReplaceToken, curfilesplit.tostring())); while (bytesread > 0) bwriter.write(buffer, 0, Convert.ToInt32(bytesRead)); if (onprogressstep!= null) double temp14 = (breader.basestream.position / fsize) * 100; double temp15 = (curfilesplit / curstats.numsplits) * 100; onprogressstep(convert.toint32(math.floor(temp14)), Convert.ToInt32(Math.Floor(temp15))); breader.close(); breader = null; //avoid exception in finally block return true; private void DoAssemble() boolean b = beginreassembly(); if (b == false) print("cannot Merge File"); else print("merge Done Successfully"); V. FEATURES AND APPLICATIONS The application developed will have a variety of uses in the domain of data security. Particularly for day to day users who do not have access to sophisticated methods of securing data. The proposed application would have possible use in Silence Tracking Radar and Region of Interest. VI. FUTURE WORK The application under development will have several life applications. These applications can be extended to Silence Tracking. Silence tracking involves recording by radar over a period of time. The recording if needed to be monitored can be split using our application and check. Another application of the application can be finding ROI or Region of Interest in an image like an X Ray. VII. CONCLUSIONS The developed application will work on windows platform. Black box and white box testing will be carried out to make sure all the arising errors are ruled out. The unified GUI will make operations easy for the end user by bringing together the four modules of Split Merge, Compress Decompress, Encrypt Decrypt, and . Splitting and/or encryption make every known format practically unreadable. 2015, IJCSMC All Rights Reserved 63
6 REFERENCES [1] Amandeep Singh Sidhu [M.Tech]1, Er. Meenakshi Garg [M.Tech]2 (2014) An Advanced Text Encryption & Compression System Based on ASCII Values & Arithmetic Encoding to Improve Data Security [2] Joan Daemen, Vincent Rijmen(2002\) The Design of Rijndael: AES - The Advanced Encryption Standard [3] Franceschini Robert.; Dept. of Computer Sci., Univ. of Central Florida, Orlando, FL, USA ; Mukherjee Amar (1996) Data compression using encrypted text [4] Muhanad Hayder (2009) Design and Implementation of a File Splitter and Merger Software [5] Siddhant Parkar, Neha Koli, Karan Shah, Manisha Giri (2015) Study of Different Algorithms and Techniques for Secure File Transmission [6] Rauschert, P. Fac. of Electr., Inf. & Media Eng., Wuppertal Univ., Germany Klimets, Y. ; Velten, J. ;Kummert, A. (2004) Very fast GZIP compression by means of content addressable memories [7] Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Mike Stay, David Wagner, Doug Whiting(20002) Improved Cryptanalysis of Rijndael [8] Henri Gilbert and Marine Minier A collisions attack on the 7-rounds Rijndael [9] Fredrik A. Dahl, Margreth Grotle, Jūratė Šaltytė Benth, Bård Natvig(2008) Data splitting as a countermeasure against hypothesis fishing: with a case study of predictors for low back pain 2015, IJCSMC All Rights Reserved 64
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Keywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
CHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It
CHAPTER 5 5.1. Introduction Obfuscation is a process of converting original data into unintelligible data. It is similar to encryption but it uses mathematical calculations or programming logics. Encryption
A Novel Cryptographic Key Generation Method Using Image Features
Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic
Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 965 OPTIMIZATION OF AES ALGORITHM USING HARDWARE AND SOFTWARE Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V Abstract-In
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
encoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
SeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique
A Survey on Performance Analysis of, AES and RSA Algorithm along with LSB Substitution Technique B. Padmavathi 1, S. Ranjitha Kumari 2 1 Research Scholar, R.V.S College of Arts & Science (Autonomous )Sulur,
Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Tape Drive Data Compression Q & A
Tape Drive Data Compression Q & A Question What is data compression and how does compression work? Data compression permits increased storage capacities by using a mathematical algorithm that reduces redundant
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
Network Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
Integrating basic Access Control Models for efficient security along with encryption for the ERP System
Integrating basic Access Control Models for efficient security along with encryption for the ERP System Prof. Swapnaja A. Ubale Research Scholar (Computer Science & Engineering Department) Research Center
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
Fast Arithmetic Coding (FastAC) Implementations
Fast Arithmetic Coding (FastAC) Implementations Amir Said 1 Introduction This document describes our fast implementations of arithmetic coding, which achieve optimal compression and higher throughput by
Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013 [email protected]
Diffusion and Data compression for data security A.J. Han Vinck University of Duisburg/Essen April 203 [email protected] content Why diffusion is important? Why data compression is important? Unicity
Compression techniques
Compression techniques David Bařina February 22, 2013 David Bařina Compression techniques February 22, 2013 1 / 37 Contents 1 Terminology 2 Simple techniques 3 Entropy coding 4 Dictionary methods 5 Conclusion
Encryption and Decryption for Secure Communication
Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
Deploying De-Duplication on Ext4 File System
Deploying De-Duplication on Ext4 File System Usha A. Joglekar 1, Bhushan M. Jagtap 2, Koninika B. Patil 3, 1. Asst. Prof., 2, 3 Students Department of Computer Engineering Smt. Kashibai Navale College
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES
A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES K.Ramesh 1, P.Manivannan 2 1,2 Assistant Professor, Department of Information Technology, V.R.S. College of Engineering & Technology,
Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab
Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the
Back2Cloud: A highly Scalable and Available Remote Backup Service
Department of Computer Science Georgia Institute of Technology FINAL REPORT Back2Cloud: A highly Scalable and Available Remote Backup Service Professor Ling Liu CS 8803 Advanced Internet Application Development
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6
Technology Overview CONTENTS INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 FULL TWO-WAY SYNCHRONIZED TDMA COMMUNICATION... 5 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 UNMATCHED
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Solutions to Problem Set 1
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose
Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES
Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES K Anjaneyulu M.Tech Student, Y.Chalapathi Rao, M.Tech, Ph.D Associate Professor, Mr.M Basha,
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK
SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK Deepika.K 1, Varshini Karthik 2 1 Post Graduate Student, Department of BME, SRM University, Tamilnadu, India 2 Assistant Professor,
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS Dasaradha Ramaiah K. 1 and T. Venugopal 2 1 IT Department, BVRIT, Hyderabad, India 2 CSE Department, JNTUH,
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
Evaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya ([email protected]) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
SCAN-CA Based Image Security System
SCAN-CA Based Image Security System Bhagyashree.S.Anantwar 1, S.P.Sonavane 2 Student, Department of Computer Science and Engg, Walchand College of Engg, Sanli, India 1 Asso. Professor, Department of Information
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
