SlideShare a Scribd company logo
1 of 32
A Practical Public Key Encryption
Scheme Based on Learning Parity
with Noise
Under the Guidance of
Mrs. K. Sailaja Kumar
External Guide
Mr. Raghavendra G
By
Abhishek Ojah
1MS17MCA02
Introduction
• Requirement of practical public key encryption scheme.
• Big data faces many security risks in various aspects bringing problems
regarding disclosure of private data.
• To meet the increasing needs we proposed a single bit public key
encryption scheme.
• This scheme solved encoding error rate problems of existing public key
scheme.
Problem Definition
• Security is the top most priority in the digital world.
• Data transfer security must be maintained at any point.
• Problem arises when the data transfer has no security.
• Above reasons led to the proposal of the idea of a secure transferring of
data from one end to another.
System Requirements
• H/W System Configuration:-
• Processor : Intel (R) Pentium (R)
• Speed : 1.1 Ghz
• RAM : 2GB
• Hard Disk : 57 GB
• Key Board : Standard Windows Keyboard
• Mouse : Two or Three Button Mouse
• Monitor : SVGA
• S/W System Configuration
• Operating System : Windows 8/7/95/98/2000/XP
• Application Server : Tomcat5.0/6.X/8.X
• Front End : HTML, Java, Jsp
• Scripts : JavaScript.
• Server side Script : Java Server Pages.
• Database Connectivity : Mysql.
• Java Version : jdk 1.8
Existing System
• The creation and calculation of Learning Parity with Noise(LPN) instances are very simple, but
it is very difficult to solve the DLPN problem. Damaged proposed a public key encryption
scheme based on decisional LPN problem but also a public-key encryption scheme based on
a ring-LPN problem. damaged proved the security of these schemes. Meanwhile, these
schemes are practical compared some practical public key encryption algorithms such as RSA
for computational efficiency, public key size and cipher text. Although the RSA algorithm does
not have an anti-quantum offensive, the performance comparison is meaningful. However,
non-negligible encoding error exists in all existing public key schemes based on an LPN
variant. To solve this problem, we designed a new public-key encryption scheme.
Proposed System
• Public key cryptography under DLPN assumption have advantages such as shorter
public key and cipher text, faster encryption and decryption.
• Existing system has decryption error.
• We proposed single-bit and multi-bit public key encryption scheme.
• Unlike the existing system, there is increase in only a small amount of cipher text
space and computing overhead.
• Our scheme not only withstand quantum attacks, but also provides strong practical
security at the same time.
Architecture
Modules
• User function
• In our project we can try to develop a device data protection mechanism to send
and receiving the data. It is easy and powerful program to use. So any user can
easily use with user have a basic knowledge of storage and basic user can use it. In
our project we organize new concept that is device authority for decrypting a file.
And then planning to develop a revoking the device. In this project plan to
implement for sending a encrypted file and then decrypt a file use a particular
keys. And then implement for searching a file then send a key for that file.
• Admin Functions
• On the bases of the survey we collect a requirement for implementing a admin
login Sheet, before login the owner can register the login into the Sheets. In that
Sheet the we try to plan the admin will login into the Sheet. Using name and a Pass
word. The upload a file according to the user needs. The information will be
collect and design according to this plan
• User Login
• The user will login in into the system in order the deal with the transfer of file from
data owner to the receiver.
• Register
• There are two different registrations in this specific module. The user will register
the details with a valid email id which will be used in the second registration. In
the second registration the user will register the details just like the earlier
registration provided, the user will receive a private key that will be sent to the
email of the particular user. The same key will be used to transfer the file safely
and securely to the receiver.
• File Share
• The files to be shared will be uploaded in this page and following the
encryption schemes of Deffihellmen Algorithm the files will be encrypted sent
to the receiver for download.
• File Search
In this module the receiver of the file will search for the particular encrypted
file uploaded by the data owner/sender after which the receiver will use its
public key and the common key to decrypt and download the file that was
uploaded
• Encryption and Decryption
• Encryption is a kind of security that changes over information, projects, pictures or
other data into indistinguishable figure. This is finished by utilizing an assortment
of complex calculations to the first substance implied for encryption. Symmetric
types of encryption frameworks utilize a solitary secret phrase to fill in as both
decryptor and encryptor. Symmetric sorts use calculations that are sheltered.
Open awry encryption frameworks utilize exceptionally secure calculations too,
however utilizing an alternate procedure for encryption and unscrambling. The
hilter kilter encryption technique utilizes two keys, alluded to as a key pair. One is
an open key, and the other one is a private key. The open key can be uninhibitedly
shared among different clients as it is just implied for encryption. The private key
isn't shared, and is utilized to unscramble whatever was scrambled by the open
key.
Data Flow Diagram
Used Case Diagram
(a) Sharing of Files
(b) Search and Download
Activity Diagram
Sequence Diagram
Snapshots
Welcome page
Registration with details
Login into the system
Sharing of file
Receiver Login
Search the file
Get the cipher Key
Decrypt and Download the file
Future Enhancement
• In the near future along with the updates of the encryption techniques, latest
encryption techniques would be applied time to time.
• Face recognition facility instead of the password protection will be implemented.
• Simpler codes will be used.
• Structuring open key cryptography that fulfills CCA security is additionally one of
our future works.
• Using the big data in future much bigger files will be transferred.
Conclusion
• The Practical Encryption Scheme project hence, enables the data owner to upload
its file securely from where the sender the encrypt the file with certain
unbreakable encryption schemes and send it to the receiver where he/she can
download it provided he/she has the access to the decryption key and obtain the
plain text data. Contrasted with existing plans, there is an expansion in just a
modest quantity of cipher text space and figuring overhead in our plan. Our plan
not exclusively can withstand quantum assault yet in addition gives solid down to
earth security simultaneously. Later on, we will structure an open key plan based
DLPN with high security, littler open key and cipher text size, and littler
computational overhead.
Sql_DG_presentation.pptx

More Related Content

Similar to Sql_DG_presentation.pptx

IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...IEEEFINALSEMSTUDENTPROJECTS
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionKeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionSREEPRAVALLIKABHANDA
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Cryptology for security
Cryptology for securityCryptology for security
Cryptology for securityManish Kumar
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
 Attribute Based Storage Supporting Secure    Deduplication  of  Encrypted  D... Attribute Based Storage Supporting Secure    Deduplication  of  Encrypted  D...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...Prasadu Peddi
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 

Similar to Sql_DG_presentation.pptx (20)

IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionKeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Cryptology for security
Cryptology for securityCryptology for security
Cryptology for security
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
 Attribute Based Storage Supporting Secure    Deduplication  of  Encrypted  D... Attribute Based Storage Supporting Secure    Deduplication  of  Encrypted  D...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 

Recently uploaded

꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 

Recently uploaded (20)

꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 

Sql_DG_presentation.pptx

  • 1. A Practical Public Key Encryption Scheme Based on Learning Parity with Noise Under the Guidance of Mrs. K. Sailaja Kumar External Guide Mr. Raghavendra G By Abhishek Ojah 1MS17MCA02
  • 2. Introduction • Requirement of practical public key encryption scheme. • Big data faces many security risks in various aspects bringing problems regarding disclosure of private data. • To meet the increasing needs we proposed a single bit public key encryption scheme. • This scheme solved encoding error rate problems of existing public key scheme.
  • 3. Problem Definition • Security is the top most priority in the digital world. • Data transfer security must be maintained at any point. • Problem arises when the data transfer has no security. • Above reasons led to the proposal of the idea of a secure transferring of data from one end to another.
  • 4. System Requirements • H/W System Configuration:- • Processor : Intel (R) Pentium (R) • Speed : 1.1 Ghz • RAM : 2GB • Hard Disk : 57 GB • Key Board : Standard Windows Keyboard • Mouse : Two or Three Button Mouse • Monitor : SVGA
  • 5. • S/W System Configuration • Operating System : Windows 8/7/95/98/2000/XP • Application Server : Tomcat5.0/6.X/8.X • Front End : HTML, Java, Jsp • Scripts : JavaScript. • Server side Script : Java Server Pages. • Database Connectivity : Mysql. • Java Version : jdk 1.8
  • 6. Existing System • The creation and calculation of Learning Parity with Noise(LPN) instances are very simple, but it is very difficult to solve the DLPN problem. Damaged proposed a public key encryption scheme based on decisional LPN problem but also a public-key encryption scheme based on a ring-LPN problem. damaged proved the security of these schemes. Meanwhile, these schemes are practical compared some practical public key encryption algorithms such as RSA for computational efficiency, public key size and cipher text. Although the RSA algorithm does not have an anti-quantum offensive, the performance comparison is meaningful. However, non-negligible encoding error exists in all existing public key schemes based on an LPN variant. To solve this problem, we designed a new public-key encryption scheme.
  • 7. Proposed System • Public key cryptography under DLPN assumption have advantages such as shorter public key and cipher text, faster encryption and decryption. • Existing system has decryption error. • We proposed single-bit and multi-bit public key encryption scheme. • Unlike the existing system, there is increase in only a small amount of cipher text space and computing overhead. • Our scheme not only withstand quantum attacks, but also provides strong practical security at the same time.
  • 9. Modules • User function • In our project we can try to develop a device data protection mechanism to send and receiving the data. It is easy and powerful program to use. So any user can easily use with user have a basic knowledge of storage and basic user can use it. In our project we organize new concept that is device authority for decrypting a file. And then planning to develop a revoking the device. In this project plan to implement for sending a encrypted file and then decrypt a file use a particular keys. And then implement for searching a file then send a key for that file.
  • 10. • Admin Functions • On the bases of the survey we collect a requirement for implementing a admin login Sheet, before login the owner can register the login into the Sheets. In that Sheet the we try to plan the admin will login into the Sheet. Using name and a Pass word. The upload a file according to the user needs. The information will be collect and design according to this plan
  • 11. • User Login • The user will login in into the system in order the deal with the transfer of file from data owner to the receiver. • Register • There are two different registrations in this specific module. The user will register the details with a valid email id which will be used in the second registration. In the second registration the user will register the details just like the earlier registration provided, the user will receive a private key that will be sent to the email of the particular user. The same key will be used to transfer the file safely and securely to the receiver.
  • 12. • File Share • The files to be shared will be uploaded in this page and following the encryption schemes of Deffihellmen Algorithm the files will be encrypted sent to the receiver for download. • File Search In this module the receiver of the file will search for the particular encrypted file uploaded by the data owner/sender after which the receiver will use its public key and the common key to decrypt and download the file that was uploaded
  • 13. • Encryption and Decryption • Encryption is a kind of security that changes over information, projects, pictures or other data into indistinguishable figure. This is finished by utilizing an assortment of complex calculations to the first substance implied for encryption. Symmetric types of encryption frameworks utilize a solitary secret phrase to fill in as both decryptor and encryptor. Symmetric sorts use calculations that are sheltered. Open awry encryption frameworks utilize exceptionally secure calculations too, however utilizing an alternate procedure for encryption and unscrambling. The hilter kilter encryption technique utilizes two keys, alluded to as a key pair. One is an open key, and the other one is a private key. The open key can be uninhibitedly shared among different clients as it is just implied for encryption. The private key isn't shared, and is utilized to unscramble whatever was scrambled by the open key.
  • 16. (a) Sharing of Files (b) Search and Download
  • 21.
  • 22. Login into the system
  • 28.
  • 29.
  • 30. Future Enhancement • In the near future along with the updates of the encryption techniques, latest encryption techniques would be applied time to time. • Face recognition facility instead of the password protection will be implemented. • Simpler codes will be used. • Structuring open key cryptography that fulfills CCA security is additionally one of our future works. • Using the big data in future much bigger files will be transferred.
  • 31. Conclusion • The Practical Encryption Scheme project hence, enables the data owner to upload its file securely from where the sender the encrypt the file with certain unbreakable encryption schemes and send it to the receiver where he/she can download it provided he/she has the access to the decryption key and obtain the plain text data. Contrasted with existing plans, there is an expansion in just a modest quantity of cipher text space and figuring overhead in our plan. Our plan not exclusively can withstand quantum assault yet in addition gives solid down to earth security simultaneously. Later on, we will structure an open key plan based DLPN with high security, littler open key and cipher text size, and littler computational overhead.