SlideShare a Scribd company logo
1 of 22
Title:
DATA SECURITY WITH AES ENCRYPTION,
ELLIPTIC CURVE ENCRYPTION AND SIGNATURE _
Project Supervisor & Guide _
C.Atheeq
Assistant Professor
CSE Dept,
Deccan College of
Engineering &Technology
Hyderabad.
>> Mohammed Abdul Faizan
160318733029
BEVII Sem CSE, DCET
>> Mohammed Abdul Lateef
160318733055
BEVII Sem CSE, DCET
>> Mohd Abdul Rahman
160318733057
BE VII Sem CSE, DCET
Presentation Outline_____
i. Getting to know about our Domain
ii. Current System / Literature Survey
iii.Problems in Current system
iv.Proposed System
Getting to know about our Domain-
CRYPTOGRAPHY_
• Cryptography is the study of secure communications techniques that allow only the
sender and intended recipient of a message to view its content.
• When transmitting electronic data, the most common use of cryptography is to encrypt
and decrypt email and other plain-text messages from files to databases etc.
• Cryptography redefines ACID property and Benefits of Cryptography are the
redefinition itself...
1.Authentication
2.Confidentiality
3.Impenetrable
4.Data- Integrity
Literature Survey / Current System _
• Database security is concerned with, the information security control that involves
the data protection,
stored functions protection,
the database itself ,
its servers.
• Database- used for various areas like hospital, defense, school, etc. to store the sensitive
sensitive information,
hence security of such databases is a primary concern where Cryptography comes into play.
o If a user needs to store or request the data, to do this the user needs to get
authenticated.
o When a user is authenticated, he will get key from a key generator and then
he encrypts or decrypts the data within the database.
o The basic characteristics of information that must be available in database
system is,
1. Confidentiality
2. Integrity
These are achieved in the system using AES encryption and ECDSA signature
verification.
Contd.
Fig: Key generator role for database store and retrieve - AES
Here in database,
1. AES symmetric encryption and ECC encryption, for
database Confidentiality and
2. ECC signature, for database Integrity.
are used.
Current Implementation of the System:
o There are 3 lengths of AES encryption keys: 128-bit | 192-bit | 256-bit
o Even though the key length of this encryption method varies, its block size
- 128-bits (or 16 bytes) - stays fixed.
o It all comes down to resources. For example, an app that uses AES-256
instead of AES-128 might drain your phone battery a bit faster.
o Hence key length is directly proportional to the processing resources
used.
Keys Config:
THE ECDSA _
o Elliptic Curve Digital Signature Algorithm, is one of
the public key cryptography encryption
algorithms.
o Keys are generated via ECC are smaller than the
average keys generated by other digital signing
algorithms.
o * A digital signature is an authentication method
used where a public key pair and a digital certificate
are used as a signature to verify the identity of a
recipient or sender of information.
THE 6 methods
discussed in
regards with
Database Security.
Type – 1. Rows-level encryption with AES
Type – 2. Columns- level encryption with AES
Type – 3. Elements level encryption with AES
Type – 4. Rows-level encryption with AES and ECC
Type – 5. Column level encryption with AES and ECC
Type – 6. Elements level encryption with AES and ECC
1. Rows, Column, Element-level encryption(Type 1,2,3)with AES are done
with a key binding function for generation their respective Cipher blocks.
2. Rows, Column, Element-level encryption(Type 4,5,6 )with AES and ECC
are done with a key binding function for generation their Digital
Signatures.
Brief Description of methods _
o In the current system of Database security there arises a problem, like
o While signing of the Ciphers for the Signature generation, the
authentication time is comparatively more for the receiver to decrypt the
cipher.
o This aspect is being resolved in our proposed system.
Problem in Current System _
Proposed System:
KEY AUTHENTICATION MANAGEMENT
USING CHAOS THEORY & CHEBYSHEV POLYNOMIAL
--- Guided by C.Atheeq
Objective of our Proposed system:
• To minimize the authentication time of the verification at the
receiver end & the signature generation at the sender end.
• We propose a method to provide mutual authentication
between communicating entities using chaos theory.
Directions:
o Chaos theory.
o Chaotic Cryptology.
o Chebyshev polynomial.
o Implementation procedure.
CHAOS THEORY _
• 'Chaos'- def. Some information that is extremely complicated or with an
absence of some order.
• Chaotic systems are deterministic but their long term behavior causes
difficulty in prediction with accuracy.
• Chaos theory states that the apparent(clear or open to view)
randomness of chaotic systems, there exists underlying patterns,
repetitions, self-organization etc.
CHAOTIC CRYPTOLOGY _
a) It is application of mathematical-Chaos theory for Cryptography
b) Used to privately and securely transmit the information.
c) If chaotic parameters and cryptographic keys are mapped either
symmetrically or asymmetrically they produce acceptable and functional
outputs.
d) Using this makes any intruder impossible to find the outputs without the
knowledge of inputs.
EX: Image encryption, random number generation, Hash functions.
CHEBYSHEV POLYNOMIAL...
1. Derived by Pafnuty Chebyshev, Russian mathematician for statistics,
probability and mechanics.
2. Its is a function that describes the time dependence of a point in geometric
space.
3. The Chebyshev polynomial are the sequences of major cosine functions-Tn(x)
4. Where ,n>=1;
5. There exists a semi group property of CHEBYSHEV POLYNOMIAL which is
being implemented i.e.,
, n>=1;
Q.Where exactly are these polynomials to be used..?
KEY MANAGEMENT USING CHAOS THEORY _
o By using chaos theory, the key is generated at sender as well as at receiver
side and it is compared.
o This process of mutual authentication in our proposed protocol take minimum
computational load.
o This mutual authentication gives the parameters to the Chebyshev
polynomials to generate a unique and corresponding key for the Chaotic
Cryptography.
Proof to be derived from Chaos theory and Chebyshev
polynomials :
(Sender) (Receiver
)
• Where,
m, n are public and private keys ,
x is the cipher/ message to be encrypted/ decrypted.
From the above calculations it gets clear that the sender and receiver
acquires the same secret key by using the chaos theory and does the mutual
authentication in an effective manner.
0
2000
4000
6000
8000
10000
12000
ECC Chaos 2
Comparison between RSA and Chaotic Maps
in computational time
Authentication time
taken
This protocol of minimizing the authentication time is our proposed system, so that the
authentication mechanism takes minimum computational load.
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

More Related Content

What's hot

Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2koolkampus
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogHardik Manocha
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersVaibhav Khanna
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd Iaetsd
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimediacsandit
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 

What's hot (20)

Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
 
Rc6 algorithm
Rc6 algorithmRc6 algorithm
Rc6 algorithm
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 

Similar to DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 

Similar to DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE (20)

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
E017212836
E017212836E017212836
E017212836
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 

More from Mohammed Abdul Lateef

Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Mohammed Abdul Lateef
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Mohammed Abdul Lateef
 
Analysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptxAnalysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptxMohammed Abdul Lateef
 
Blockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptxBlockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptxMohammed Abdul Lateef
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxMohammed Abdul Lateef
 

More from Mohammed Abdul Lateef (8)

Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
 
Analysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptxAnalysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptx
 
Blockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptxBlockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptx
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
 
Bio filters/ Biofilteration
Bio filters/ BiofilterationBio filters/ Biofilteration
Bio filters/ Biofilteration
 
Calorific Values
Calorific ValuesCalorific Values
Calorific Values
 
Indian Mathematician
Indian MathematicianIndian Mathematician
Indian Mathematician
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

  • 1. Title: DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE _
  • 2. Project Supervisor & Guide _ C.Atheeq Assistant Professor CSE Dept, Deccan College of Engineering &Technology Hyderabad. >> Mohammed Abdul Faizan 160318733029 BEVII Sem CSE, DCET >> Mohammed Abdul Lateef 160318733055 BEVII Sem CSE, DCET >> Mohd Abdul Rahman 160318733057 BE VII Sem CSE, DCET
  • 3. Presentation Outline_____ i. Getting to know about our Domain ii. Current System / Literature Survey iii.Problems in Current system iv.Proposed System
  • 4. Getting to know about our Domain- CRYPTOGRAPHY_ • Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its content. • When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages from files to databases etc. • Cryptography redefines ACID property and Benefits of Cryptography are the redefinition itself... 1.Authentication 2.Confidentiality 3.Impenetrable 4.Data- Integrity
  • 5. Literature Survey / Current System _ • Database security is concerned with, the information security control that involves the data protection, stored functions protection, the database itself , its servers. • Database- used for various areas like hospital, defense, school, etc. to store the sensitive sensitive information, hence security of such databases is a primary concern where Cryptography comes into play.
  • 6. o If a user needs to store or request the data, to do this the user needs to get authenticated. o When a user is authenticated, he will get key from a key generator and then he encrypts or decrypts the data within the database. o The basic characteristics of information that must be available in database system is, 1. Confidentiality 2. Integrity These are achieved in the system using AES encryption and ECDSA signature verification. Contd.
  • 7. Fig: Key generator role for database store and retrieve - AES
  • 8. Here in database, 1. AES symmetric encryption and ECC encryption, for database Confidentiality and 2. ECC signature, for database Integrity. are used. Current Implementation of the System:
  • 9. o There are 3 lengths of AES encryption keys: 128-bit | 192-bit | 256-bit o Even though the key length of this encryption method varies, its block size - 128-bits (or 16 bytes) - stays fixed. o It all comes down to resources. For example, an app that uses AES-256 instead of AES-128 might drain your phone battery a bit faster. o Hence key length is directly proportional to the processing resources used. Keys Config:
  • 10. THE ECDSA _ o Elliptic Curve Digital Signature Algorithm, is one of the public key cryptography encryption algorithms. o Keys are generated via ECC are smaller than the average keys generated by other digital signing algorithms. o * A digital signature is an authentication method used where a public key pair and a digital certificate are used as a signature to verify the identity of a recipient or sender of information.
  • 11. THE 6 methods discussed in regards with Database Security. Type – 1. Rows-level encryption with AES Type – 2. Columns- level encryption with AES Type – 3. Elements level encryption with AES Type – 4. Rows-level encryption with AES and ECC Type – 5. Column level encryption with AES and ECC Type – 6. Elements level encryption with AES and ECC
  • 12. 1. Rows, Column, Element-level encryption(Type 1,2,3)with AES are done with a key binding function for generation their respective Cipher blocks. 2. Rows, Column, Element-level encryption(Type 4,5,6 )with AES and ECC are done with a key binding function for generation their Digital Signatures. Brief Description of methods _
  • 13. o In the current system of Database security there arises a problem, like o While signing of the Ciphers for the Signature generation, the authentication time is comparatively more for the receiver to decrypt the cipher. o This aspect is being resolved in our proposed system. Problem in Current System _
  • 14. Proposed System: KEY AUTHENTICATION MANAGEMENT USING CHAOS THEORY & CHEBYSHEV POLYNOMIAL --- Guided by C.Atheeq
  • 15. Objective of our Proposed system: • To minimize the authentication time of the verification at the receiver end & the signature generation at the sender end. • We propose a method to provide mutual authentication between communicating entities using chaos theory. Directions: o Chaos theory. o Chaotic Cryptology. o Chebyshev polynomial. o Implementation procedure.
  • 16. CHAOS THEORY _ • 'Chaos'- def. Some information that is extremely complicated or with an absence of some order. • Chaotic systems are deterministic but their long term behavior causes difficulty in prediction with accuracy. • Chaos theory states that the apparent(clear or open to view) randomness of chaotic systems, there exists underlying patterns, repetitions, self-organization etc.
  • 17. CHAOTIC CRYPTOLOGY _ a) It is application of mathematical-Chaos theory for Cryptography b) Used to privately and securely transmit the information. c) If chaotic parameters and cryptographic keys are mapped either symmetrically or asymmetrically they produce acceptable and functional outputs. d) Using this makes any intruder impossible to find the outputs without the knowledge of inputs. EX: Image encryption, random number generation, Hash functions.
  • 18. CHEBYSHEV POLYNOMIAL... 1. Derived by Pafnuty Chebyshev, Russian mathematician for statistics, probability and mechanics. 2. Its is a function that describes the time dependence of a point in geometric space. 3. The Chebyshev polynomial are the sequences of major cosine functions-Tn(x) 4. Where ,n>=1; 5. There exists a semi group property of CHEBYSHEV POLYNOMIAL which is being implemented i.e., , n>=1;
  • 19. Q.Where exactly are these polynomials to be used..? KEY MANAGEMENT USING CHAOS THEORY _ o By using chaos theory, the key is generated at sender as well as at receiver side and it is compared. o This process of mutual authentication in our proposed protocol take minimum computational load. o This mutual authentication gives the parameters to the Chebyshev polynomials to generate a unique and corresponding key for the Chaotic Cryptography.
  • 20. Proof to be derived from Chaos theory and Chebyshev polynomials : (Sender) (Receiver ) • Where, m, n are public and private keys , x is the cipher/ message to be encrypted/ decrypted. From the above calculations it gets clear that the sender and receiver acquires the same secret key by using the chaos theory and does the mutual authentication in an effective manner.
  • 21. 0 2000 4000 6000 8000 10000 12000 ECC Chaos 2 Comparison between RSA and Chaotic Maps in computational time Authentication time taken This protocol of minimizing the authentication time is our proposed system, so that the authentication mechanism takes minimum computational load.