Java Coding Ground With Security Editor

Similar documents
Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

The Mathematics of the RSA Public-Key Cryptosystem

Software Tool for Implementing RSA Algorithm

The application of prime numbers to RSA encryption

CRYPTOGRAPHY IN NETWORK SECURITY

A SOFTWARE COMPARISON OF RSA AND ECC

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Overview of Public-Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Lukasz Pater CMMS Administrator and Developer

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Elements of Applied Cryptography Public key encryption

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Applied Cryptography Public Key Algorithms

CSCE 465 Computer & Network Security

RSA Encryption. Tom Davis October 10, 2003

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

Cryptography and Network Security Chapter 9

Public Key Cryptography and RSA. Review: Number Theory Basics

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

CS 758: Cryptography / Network Security

Number Theory and the RSA Public Key Cryptosystem

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Primality Testing and Factorization Methods

Lecture 9: Application of Cryptography

7! Cryptographic Techniques! A Brief Introduction

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

CSE Final Project: crypchat Encrypted Chat Program Christopher Durr, Matthew Mooney, Paul Zakas

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Number Theory and Cryptography using PARI/GP

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.

How To Know If A Message Is From A Person Or A Machine

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Public Key Cryptography: RSA and Lots of Number Theory

The science of encryption: prime numbers and mod n arithmetic

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Enhance data security of private cloud using encryption scheme with RBAC

Symmetric Key cryptosystem

Computing exponents modulo a number: Repeated squaring

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

CIS 5371 Cryptography. 8. Encryption --

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

Cryptography and Network Security

Cryptography: Authentication, Blind Signatures, and Digital Cash

Notes on Network Security Prof. Hemant K. Soni

Shor s algorithm and secret sharing

EXAM questions for the course TTM Information Security May Part 1

Advanced Cryptography

Associate Prof. Dr. Victor Onomza Waziri

Table of Contents. Bibliografische Informationen digitalisiert durch

SSL Handshake Analysis

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Maths delivers! A guide for teachers Years 11 and 12. RSA Encryption

Public-key cryptography RSA

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

Lecture 6 - Cryptography

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Cryptography and Network Security

Chapter 10. Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Public Key (asymmetric) Cryptography

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Public Key Cryptography Overview

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Data Grid Privacy and Secure Storage Service in Cloud Computing

An Introduction to the RSA Encryption Method

Lecture 3: One-Way Encryption, RSA Example

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

A Secure Intrusion Avoidance System Using Hybrid Cryptography

Timing Attacks on software implementation of RSA

Computer Security: Principles and Practice

Speeding Up RSA Encryption Using GPU Parallelization

SECURITY IN NETWORKS

A Factoring and Discrete Logarithm based Cryptosystem

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Public Key Cryptography of Digital Signatures

SFWR ENG 4C03 - Computer Networks & Computer Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Cyber Security Workshop Encryption Reference Manual

Secure File Transfer Using USB

Transcription:

IJCST Vo l 6, Is s u e 1, Ja n - Ma r c h 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Java Coding Ground With Security Editor 1 ISurya Prabha, 2 GPrabhakar Reddy, 3 V Ramakrishna, 4 YDeepika 1 Associate professor, IT Dept, Institute of Aeronautical Engineering, Hyderabad, Telangana, India 2 Research Scholler, CSE Dept, Institute of Aeronautical Engineering, Hyderabad, Telangana, India 3 Professor, CSE Dept, K L University, Guntur, Andhra Pradesh, India 4 Student, MTech SE Dept Institute of Aeronautical Engineering, Hyderabad, Telangana, India Abstract In the present days every one are using internet to make their work easy In the present days all the things are made online Everyone are using internet to do their work as early as possible in a easy way Everything is available in the online In this paper we discussed about Java coding ground with security editor In this paper we are also discussed about security editor This editor perform the encryption and decryption operations on the required fie In this RSA algorithm is used to perform encryption and decryption There is a lot of security algorithms, but RSA is very efficient to encrypt and decrypt the file In this we are going to view all types of java API It is very useful for writing the java program easily Keywords Security editor, Encryption, Decryption, RSA Algorithm, Public Key, Private Key, Cipher text I Introduction In the present days every one are using internet to make their work easy In the present days all the things are made online Everyone are using internet to do their work as early as possible in a easy way Everything is available in the online In this paper we discussed about Java coding ground with security editor In this paper we are also discussed about security editor This editor performs the encryption and decryption operations on the required fie In this RSA algorithm is used to perform encryption and decryption There is a lot of security algorithms, but RSA is very efficient to encrypt and decrypt the file In this we are going to view all types of java API It is very useful for writing the java program easily Input design will work like a bridge between the users and servers on information systems It provide the manner in which data enters the system for processing and produce the reports from accurate data or it may results in output of error information II Related Work A Modules Description 1 Java File Creation In this module we create the java file and save it in our local file system Using this web page the clients can create the java files and save it This web page can used as editor for the clients It is very easy to access and user friendly to the clients 2 Java File Compilation Using this module we can compile the created java file(created in the first module) The JDK machine is available with the server, not with the client The client can use this application to compile the java file The client is connected to the server(jdk installed server) The server compile and run the java file and send back the response to client Compilation for all java programs available in server machines 3 Java API Information Getting information about all the Application Programming Interfaces(API) is very important In this module we can know the information about API available in the java API is a collection of classes and interfaces available in a package As the programmer cannot remember all methods of a class and interfaces of package, the JAVA API is used 4 Encryption In this module we are encrypting the java file by using RSA( Ron Rivest Adi Shamir and len Adleman) algorithm Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties Encrypting the message will provide protection from the hackers 5 Decryption In this module, we are doing decryption using RSA (Ron Rivest, Adi Shamir and Len Adleman) Algorithm We are decrypting the file with the help of RSA Algorithm For decrypting a file, we need to decrypt it by giving the private keys With the help of these private keys we are decrypting the file Now the cipher text of the file is converted to the actual text So it will visible for the user It will be in known formats B Java Program Java API Java Virtual Machine Program Hard Ware 1 Java API API(APPLICATION PROGRAM INTERFACE) is a set of tools which is helpful for building a software applications API is a set of classes and interfaces of packages Using API makes the ease of accessing the database or computer hardware API is based on the source code 2 JVM JVM is developed by Microsystems This Virtual Machine is used for executing the java Byte code JVM is a major component of the java platform JVM verify the byte code before executing JVM is used for converting the byte code into machine language Fig 1: wwwijcstcom International Journal of Computer Science And Technology 173

IJCST Vo l 6, Is s u e 1, Ja n - Ma r c h 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) 3 Program Program is a set of instruction, that perform a specified task Java is a object oriented programming language Java is very useful for developing web applications Each and every instructions of a java program are interpreted by JVM C Security Security is a major factor for everyone in the present era The state of being free from hackers and danger or threads In this concept the security is provided by using electronic signatures, public/ private key management, accesses control, and certificate etc D Data Base Access Data base is a collection of related data with logically coherent structure, inherent meaning, purpose for identical users and applications, varying size, various applications for possibly conflicting objectives Database is used for storing data Relational database provides storage for application data J2EE implementation is not required, means that database supported by different J2EE products may vary III Java A What is Java? Java is a high-level, object oriented programming language Object oriented programming allows the user to develop a model which is flexible and reusable Java is an important and exciting advancement in the area of software technology Java helps the user to create software that makes wonders in many applications such as mobile phones, cars and television etc Java uses the JDK tool for compiling the programs The java program is compiled and it creates another file which contains the byte code Byte code is platform independent and can be executed on any machine This byte code then interpreted to get the output Java Program Interpreter 1 Application programming interface (API): API consists of all the inbuilt software components 2 Java Virtual Machine (JVM): JVM acts as an interface between the java application and the hardware system In technical terms API is library of packages API guides the programmer for accessing the functionalities of different packages according to the requirement Java contain many code libraries that provides pre-defined functionalities for programmers to make their work easy For example swing is a user interface code library Import javaxswing*; Graphical components can be accessed by using SWING s API to build graphical user interface The core API gives you the following features: The Essentials: Objects, Strings, threads, numbers, input and output, datastructures, system properties, date and time, and so on Applets: The set of conventions used by Java applets Networking: URL s TCP and UDP sockets and IP addresses Internationalization: Help for writing programs that can be localized for users Worldwide programs can automatically adapt to specific locates and be displayed in the appropriate language C What Can Java Do? Java is a simple, object-oriented, interpreted, robust, secure, architecture-neutral, portable, high-performance, multithreaded and dynamic language Java is used in different types of applications Some of them are Web-based applications, embedded systems, gaming applications, image processors and mobile applications These applications allow the user to play online games, calculate the mortgage interest, view three dimensional images and so on Java is so popular today because it can be used on the internet The WWW is a huge collection of millions of pages containing information about various topics These pages can be created using a language called the HTML Java applets can be embedded in these pages to add sound, animation and multimedia effects A good example to illustrate the application of applet is the e-cards that are available free on several sites Compilers My Program IV Security Editor A RSA Algorithm Fig 2: Java is used in different types of applications Some of them are web-based applications, embedded systems, gaming applications, image processors and mobile applications B Java Platform In technical terms the platform is defined as the environment of software or hardware in which program runs It enables the creation of products and processes that support present or future or past development The greatest benefit of using java appears to be in area of programming for the internet and WWW The passive HTML pages on the WWW can be made interactive by using java As java is machine independent the programs developed in java can virtually work on any machine in any part of the world without the need for re-writing or re-compiling This is achieved by using a java platform The two java platforms are: 174 International Journal of Computer Science And Technology 1 History: Rivest, Shamir, and Adleman were a perfect team Rivest is a computer scientist of cryptographer with an exemplary ability to apply new ideas in new places He also kept up with the latest scientific papers, so he always had these zany new ideas for the one way function Shamir, also a computer scientist of Israeli cryptographer, has a lightning intellect, and an ability to cast aside the technicalities and focus on the core of a problem He as well as Rivest generated ideas for the one-way function Adleman is a mathematician with extraordinary stamina, rigor and patience He was largely responsible for spotting the flaws within the ideas of Rivest and Shamir, and he ensured that they did not follow false leads It was very discouraging, but they knew that each failure steered them away from sterile math into more fertile mathematical ground In April 1977, Rivest, Shamir, and Adleman spent a lot of time for finding the solutions to the questions which they had Rivest was unable to sleep, so he lay on his couch with a math textbook wwwijcstcom

ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) He began to mull over the question that had been nagging him all year: He spent the rest of the night formalizing his idea, and by daybreak he had effectively written a complete mathematical paper Rivest had a breakthrough, but it could not have come without the help of Shamir and Adleman The system was later dubbed RSA, for Rivest, Shamir, and Adleman 2 Operations THE RIVEST-SHAMIR-ADLEMAN (RSA) ALGORITHM FOR PUBLIC-KEY CRYPTOGRAPHY THE BASIC IDEA: The RSA algorithm named after Ron Rivest, Adi Shamir, and Leonard Adleman is based on a property of positive integers that we describe below When n is a product of two primes, in arithmetic operations modulo n, the exponents behave modulo the totient φ(n) of n n = a modulus for modular arithmetic φ(n) = the totient of n e = an integer that is relatively prime to φ(n) [T his guarantees that e will possess a multiplicative inverse modulo φ(n)] d = an integer that is the multiplicative inverse of e modulo φ(n) The RSA Algorithm Putting to Use the Basic Idea The basic idea described in the previous subsection can be used to create a confidential communication channel in the manner described here An individual A who wishes to receive messages confidentially will use the pair of integers {e, n} as his/her public key At the same time, this individual can use the pair of integers {d, n} as the private key The definitions of n, e, and d are as in the previous subsection Another party B wishing to send a message M to A confidentially will encrypt M using A s public key {e, n} to create ciphertext C Subsequently, only A will be able to decrypt C using his/her private key {d, n} If the plaintext message M is too long, B may choose to use RSA as a block cipher for encrypting the message meant for A As explained by our toy example in Section 124, when RSA is used as a block cipher, the block size is likely to be half the number of bits required to represent the modulus n If the modulus required, say, 1024 bits for its representation, message encryption would be based on 512-bit blocks The important theoretical question here is as to what conditions if any must be satisfied by the modulus n for this M C M transformation to work? How to Choose the Modulus for the RSA Algorithm With the definitions of d and e as presented in Section 122, the modulus n must be selected in such a manner that the following is guaranteed: Me ) d Med M (mod n) We want this guarantee because C = Me mod m is the encrypted form of the message integer M and decryption is carried out by C d mod n It was shown by Rivest, Shamir, and Adleman that we have this guarantee when n is a product of two prime numbers: n = p q for some prime p and prime q (1) The above factorization is needed because the proof of the algorithm, presented in the next subsection, depends on the following two properties of primes and coprimes: (a) If two integers p and q are coprimes (meaning, relatively IJCST Vo l 6, Is s u e 1, Ja n - Ma r c h 2015 prime to each other), the following equivalence holds for any two integers a and b: {a b (mod p) and a b (mod q)} {a b (mod pq)} (2) This equivalence follows from the fact a b (mod p) implies a b = k1p for some integer k1 But since we also have a b (mod q) implying a b = k2q, it must be the case that k1 = k3 q for some k3 Therefore, we can write a b = k3 p q, which establishes the equivalence (Note that this argument breaks down if p and q have common factors other than 1) (b) In addition to needing p and q to be coprimes, we also want p and q to be individually primes It is only when p and q are individually prime that we can decompose the totient of n into the product of the totients of p and q That is φ(n) = φ(p) φ(q) = (p 1) (q 1) (3) See Section 113 of Lecture 11 for a proof of this So that the cipher cannot be broken by an exhaustive search for the prime factors of the modulus n, it is important that both p and q be very large primes Finding the prime factors of a large integer is computationally harder than determining its primality We also need to ensure that n is not factorizable by one of the modern integer factorization algorithms Computational Steps For Key Generation in Rsa Cryptography The computational steps for key generation are 1 Generate two different primes p and q 2 Calculate the modulus n = p q 3 Calculate the totient φ(n) = (p 1) (q 1) 4 Select for public exponent an integer e such that 1 < e < φ(n) and gcd(φ(n), e) = 1 5 Calculate for the private exponent a value for d such that d = e 1 mod φ(n) 6 Public Key = [e, n] 7 Private Key = [d, n] B Encrypting Messages Alice transmits her public key ( & ) to Bob and keeps the private key secret Bob then wishes to send message M to Alice He first turns M into a number < by using an agreed-upon reversible protocol known as a padding scheme He then computes the ciphertext corresponding to: This can be done quickly using the method of exponentiation by squaring Bob then transmits to Alice C Decrypting Messages Alice can recover from by using her private key in the following procedure: Given, she can recover the original message M The decryption procedure works because Now, since and wwwijcstcom International Journal of Computer Science And Technology 175

IJCST Vo l 6, Is s u e 1, Ja n - Ma r c h 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fermat s little theorem yields and Since and are distinct prime numbers, applying the Chinese remainder theorem to these two congruences yields Thus, V System Analysis System analysis focuses on specifying for what the system or the application is required to do It allows the individuals to see the logical elements (what the system should do) apart from the physical components it uses (computers, terminals and storage system) It is the process of gathering and interpreting facts, diagnosing problems and using the information to recommend improvements to the system A Existing System The existing system is a normal manual system which leads to an error It is time consuming process Generating the reports or producing the reports to a person is difficult Scheme reports can be changed and do malpractice Manual entry is the main disadvantage of in this system The factors like efficiency, accuracy, productivity are very less in this system It takes more time to complete to a simple task Manual work will be more than a machine work Expenditure will be more for using papers/ manual scripts and for the payment of labor Time delay is the main drawback of this system Covering the drawbacks of this system, a proposed system is introduced B Proposed System Proposed system is designed by covering the limitations and drawbacks of existing system The permanent solutions to the problems (which are occurred in the existing system) are provided The main goal of this system is to speed up the transactions Generating reports made easy with system Any task can be performed efficiently with high accuracy and good productivity Everything is converted into computerized and work becomes very easy to perform It is a less time consuming process All the online services are just a click of button away Dozens of companies are in the race to convince auction and bidding that a pot of Policy s awaits those who conduct their business on the Internet In this fast race of business and moneymaking, no country, no company and no individual want to fall back Everyone wants to lead the group Hence, everyone is trying to make the best use of Internet C Feasibility Study An analysis and evaluation of a proposed project to determine 1 It is technically feasible, 2 It is feasible within the estimated cost, and 3 Will be profitable 4 Less time consuming, 5 More efficiency, accuracy and productivity etc 176 International Journal of Computer Science And Technology VI Conclusion and Future and Future Scope Online java coding and compiling can be done in this project Debugging is also performed in online The server is provided with the java development kit and the client is connected to the server Therefore server executes the java code and sends appropriate response to the client We can develop the application using online program References [1] [Online] Available: http://wwwfreejavaguidecom/virtual_ machinehtml [2] [Online] Available: http://wwwenwikipediaorg/wiki/ Platform_technology [3] [Online] Available: http://wwwjavaaboutcom/od/a/g/api htm [4] [Online] Available: http://wwwijiteeorg/attachments/file/ v2i2/b0386012213pdf [5] [Online] Available: http://wwwijiteeorg/attachments/file/ v2i2/b0386012213pdf [6] [Online] Available: http://wwwcsswarthmoreedu/~newhall/ unixhelp/debuggingtips_javahtml [7] [Online] Available: http://docsoraclecom/javase/6/docs/ api/ [8] [Online] Available: http://wwwjavamexcom/tutorials/ cryptography/rsa_encryptionshtml [9] Aamir Nizam Ansari, Siddharth Patil, Arundhati N avada, Aditya Peshave, Venkatesh Borole,"Online C/C++ Compiler using Cloud Computing", Multimedia Technology (ICMT), July 2011 International Conference, pp 3591-3594 [10] [Online] Available: http://wwwgoldenpackagebyanuj blogspotin/2013/10/rsa-encryption-descryptionalgorithm-in-javahtml [11] [Online] Available: http://wwwijesitcom/volume%201/ Issue%202/IJESIT201211_17pdf ISurya Prabha Working as an Associate Professor in the stream of Information and Technology at Institute of Aeronautical Engineering, Dundigal, Hyderabad She received her Master Degree in Computer Application in the year 2000, from Osmania University, and Master Degree in Computer Science and Engineering in the year 2011, from JNTUH G Prabhakar Reddy pursuing Master of Technology in the stream of Computer Science and Engineering from Institute of Aeronautical Engineering, Dundigal, Hyderabad and Received his Bachelor of technology degree in the stream of Computer Science and Engineering from St Peters Engineering College, Hyderabad, in 2013 His research papers are A Model for Traitor Detection with Appraising Approach in International Journal of Computer Applications(IJCA), Maintaining User Search Accounts using Page Rank Algorithm in International Journal of Latest Trends in wwwijcstcom

ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) IJCST Vo l 6, Is s u e 1, Ja n - Ma r c h 2015 Engineering and Technology (IJLTET), Fit Assist Step count and Calorie Estimator using Accelerometer in International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vol 3, Issue 9, September 2014 YDeepika pursuing Master of Technology in the stream of Computer Science and Engineering form Institute of Aeronautical Engineering, Hyderabad and Received her Bachelor of technology degree in the stream of Information Technology from JBIT Engineering College, Hyderabad, in 2012 Her research paper is Security of Vulnerable Wireless Network Systems and its attacks on Jamming in International Journal of Advanced Research in Computer and Communication Engineering(IJARCCE) Vol 3, Issue 7, July 2014 wwwijcstcom International Journal of Computer Science And Technology 177