Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Sql_DG_presentation.pptx
1. A Practical Public Key Encryption
Scheme Based on Learning Parity
with Noise
Under the Guidance of
Mrs. K. Sailaja Kumar
External Guide
Mr. Raghavendra G
By
Abhishek Ojah
1MS17MCA02
2. Introduction
• Requirement of practical public key encryption scheme.
• Big data faces many security risks in various aspects bringing problems
regarding disclosure of private data.
• To meet the increasing needs we proposed a single bit public key
encryption scheme.
• This scheme solved encoding error rate problems of existing public key
scheme.
3. Problem Definition
• Security is the top most priority in the digital world.
• Data transfer security must be maintained at any point.
• Problem arises when the data transfer has no security.
• Above reasons led to the proposal of the idea of a secure transferring of
data from one end to another.
4. System Requirements
• H/W System Configuration:-
• Processor : Intel (R) Pentium (R)
• Speed : 1.1 Ghz
• RAM : 2GB
• Hard Disk : 57 GB
• Key Board : Standard Windows Keyboard
• Mouse : Two or Three Button Mouse
• Monitor : SVGA
5. • S/W System Configuration
• Operating System : Windows 8/7/95/98/2000/XP
• Application Server : Tomcat5.0/6.X/8.X
• Front End : HTML, Java, Jsp
• Scripts : JavaScript.
• Server side Script : Java Server Pages.
• Database Connectivity : Mysql.
• Java Version : jdk 1.8
6. Existing System
• The creation and calculation of Learning Parity with Noise(LPN) instances are very simple, but
it is very difficult to solve the DLPN problem. Damaged proposed a public key encryption
scheme based on decisional LPN problem but also a public-key encryption scheme based on
a ring-LPN problem. damaged proved the security of these schemes. Meanwhile, these
schemes are practical compared some practical public key encryption algorithms such as RSA
for computational efficiency, public key size and cipher text. Although the RSA algorithm does
not have an anti-quantum offensive, the performance comparison is meaningful. However,
non-negligible encoding error exists in all existing public key schemes based on an LPN
variant. To solve this problem, we designed a new public-key encryption scheme.
7. Proposed System
• Public key cryptography under DLPN assumption have advantages such as shorter
public key and cipher text, faster encryption and decryption.
• Existing system has decryption error.
• We proposed single-bit and multi-bit public key encryption scheme.
• Unlike the existing system, there is increase in only a small amount of cipher text
space and computing overhead.
• Our scheme not only withstand quantum attacks, but also provides strong practical
security at the same time.
9. Modules
• User function
• In our project we can try to develop a device data protection mechanism to send
and receiving the data. It is easy and powerful program to use. So any user can
easily use with user have a basic knowledge of storage and basic user can use it. In
our project we organize new concept that is device authority for decrypting a file.
And then planning to develop a revoking the device. In this project plan to
implement for sending a encrypted file and then decrypt a file use a particular
keys. And then implement for searching a file then send a key for that file.
10. • Admin Functions
• On the bases of the survey we collect a requirement for implementing a admin
login Sheet, before login the owner can register the login into the Sheets. In that
Sheet the we try to plan the admin will login into the Sheet. Using name and a Pass
word. The upload a file according to the user needs. The information will be
collect and design according to this plan
11. • User Login
• The user will login in into the system in order the deal with the transfer of file from
data owner to the receiver.
• Register
• There are two different registrations in this specific module. The user will register
the details with a valid email id which will be used in the second registration. In
the second registration the user will register the details just like the earlier
registration provided, the user will receive a private key that will be sent to the
email of the particular user. The same key will be used to transfer the file safely
and securely to the receiver.
12. • File Share
• The files to be shared will be uploaded in this page and following the
encryption schemes of Deffihellmen Algorithm the files will be encrypted sent
to the receiver for download.
• File Search
In this module the receiver of the file will search for the particular encrypted
file uploaded by the data owner/sender after which the receiver will use its
public key and the common key to decrypt and download the file that was
uploaded
13. • Encryption and Decryption
• Encryption is a kind of security that changes over information, projects, pictures or
other data into indistinguishable figure. This is finished by utilizing an assortment
of complex calculations to the first substance implied for encryption. Symmetric
types of encryption frameworks utilize a solitary secret phrase to fill in as both
decryptor and encryptor. Symmetric sorts use calculations that are sheltered.
Open awry encryption frameworks utilize exceptionally secure calculations too,
however utilizing an alternate procedure for encryption and unscrambling. The
hilter kilter encryption technique utilizes two keys, alluded to as a key pair. One is
an open key, and the other one is a private key. The open key can be uninhibitedly
shared among different clients as it is just implied for encryption. The private key
isn't shared, and is utilized to unscramble whatever was scrambled by the open
key.
30. Future Enhancement
• In the near future along with the updates of the encryption techniques, latest
encryption techniques would be applied time to time.
• Face recognition facility instead of the password protection will be implemented.
• Simpler codes will be used.
• Structuring open key cryptography that fulfills CCA security is additionally one of
our future works.
• Using the big data in future much bigger files will be transferred.
31. Conclusion
• The Practical Encryption Scheme project hence, enables the data owner to upload
its file securely from where the sender the encrypt the file with certain
unbreakable encryption schemes and send it to the receiver where he/she can
download it provided he/she has the access to the decryption key and obtain the
plain text data. Contrasted with existing plans, there is an expansion in just a
modest quantity of cipher text space and figuring overhead in our plan. Our plan
not exclusively can withstand quantum assault yet in addition gives solid down to
earth security simultaneously. Later on, we will structure an open key plan based
DLPN with high security, littler open key and cipher text size, and littler
computational overhead.