SlideShare a Scribd company logo
1 of 1
Network Security has a significant role in securing the vital information.
Stream ciphers, which are the most important class of symmetric
algorithms are widely used in protecting the digital information. However,
these days variety of attacks (algebraic and so on) are encountered in
stream cipher which is creating problem in providing security to the
information. This is the main motivation behind our research.
Our main research goal is to describe and analyze design of stream cipher in
network security.
INTRODUCTION PROCEDURE
Design of proposed Stream cipher is done through the analysis of
 Algebraic immunity (AI) of Boolean functions
 S-Boxes (usually called substitution box or substitution cipher).
 Thus in process of designing stream cipher, cryptographic properties of
non-linear transformations have been used.
 There are many LFSR based stream ciphers which use non-linear Boolean
function which destroy linearity of LFSR output. Even these were broken
by algebraic attacks. Thus, we analyze new and significant class of non-
linear Boolean functions for LFSR based stream ciphers resistance to
algebraic attacks. This is shown as a practical example to show the
effectiveness of our design.
 Over GSM, communication is on air, so data can be attacked easily. In
order to send original data without attacks, we are analyzing on how the
stream cipher can be used to protect the data.
SECTION 3
From the analysis done so far, we have found that the new stream cipher can be implemented to securely
send the data through the network. This can be done by using non linear S-box, LFSRs and algebraic
immunity. Also, information shared over air can be made more secure by using stream ciphers in the GSM
network. This further analysis serves as future scope of our research.
DISCUSSION AND CONCLUSION
ACKNOWLEDGEMENTS
DESIGN AND ANALYSIS OF STREAM CIPHER FOR
NETWORK SECURITY
TEJASRI SALADI
Text

More Related Content

What's hot

PhD Thesis NS2 Projects
PhD Thesis NS2 ProjectsPhD Thesis NS2 Projects
PhD Thesis NS2 ProjectsPhdtopiccom
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...WilliamY3
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
Network Simulation Tools Projects
Network Simulation Tools ProjectsNetwork Simulation Tools Projects
Network Simulation Tools ProjectsPhdtopiccom
 
Project Topics in Information Technology
Project Topics in Information TechnologyProject Topics in Information Technology
Project Topics in Information TechnologyPhdtopiccom
 
Network Engineering Projects in NS3
 Network Engineering Projects in NS3 Network Engineering Projects in NS3
Network Engineering Projects in NS3Phdtopiccom
 
PhD-Guidance-in-Computer-Networking
PhD-Guidance-in-Computer-NetworkingPhD-Guidance-in-Computer-Networking
PhD-Guidance-in-Computer-NetworkingPhdtopiccom
 
Bt0088 cryptography and network security2
Bt0088 cryptography and network security2Bt0088 cryptography and network security2
Bt0088 cryptography and network security2Techglyphs
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvrtechnologies Nellore
 
Bachelor Studies Project Details
Bachelor Studies Project DetailsBachelor Studies Project Details
Bachelor Studies Project DetailsAlpana Chaphalkar
 
Project Topics Information Technology
Project Topics Information TechnologyProject Topics Information Technology
Project Topics Information TechnologyPhdtopiccom
 
Mobile Networking Projects
Mobile Networking ProjectsMobile Networking Projects
Mobile Networking ProjectsPhdtopiccom
 

What's hot (20)

Conclusion
ConclusionConclusion
Conclusion
 
Security Research Projects Guidance
Security Research Projects GuidanceSecurity Research Projects Guidance
Security Research Projects Guidance
 
PhD Thesis NS2 Projects
PhD Thesis NS2 ProjectsPhD Thesis NS2 Projects
PhD Thesis NS2 Projects
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
Research
ResearchResearch
Research
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
Network Simulation Tools Projects
Network Simulation Tools ProjectsNetwork Simulation Tools Projects
Network Simulation Tools Projects
 
Project Topics in Information Technology
Project Topics in Information TechnologyProject Topics in Information Technology
Project Topics in Information Technology
 
Network Engineering Projects in NS3
 Network Engineering Projects in NS3 Network Engineering Projects in NS3
Network Engineering Projects in NS3
 
PhD-Guidance-in-Computer-Networking
PhD-Guidance-in-Computer-NetworkingPhD-Guidance-in-Computer-Networking
PhD-Guidance-in-Computer-Networking
 
Bt0088 cryptography and network security2
Bt0088 cryptography and network security2Bt0088 cryptography and network security2
Bt0088 cryptography and network security2
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titles
 
Bachelor Studies Project Details
Bachelor Studies Project DetailsBachelor Studies Project Details
Bachelor Studies Project Details
 
MeckBenResume
MeckBenResumeMeckBenResume
MeckBenResume
 
23
2323
23
 
Project Topics Information Technology
Project Topics Information TechnologyProject Topics Information Technology
Project Topics Information Technology
 
36
3636
36
 
Mobile Networking Projects
Mobile Networking ProjectsMobile Networking Projects
Mobile Networking Projects
 
52
5252
52
 
Java 2015 2016 ieee project list-(v)
Java 2015 2016 ieee project list-(v)Java 2015 2016 ieee project list-(v)
Java 2015 2016 ieee project list-(v)
 

Similar to 543 poster

Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secureIJNSA Journal
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSIJNSA Journal
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016tsysglobalsolutions
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesEditor Jacotech
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsijcisjournal
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorIRJET Journal
 

Similar to 543 poster (20)

[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secure
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
 
H0154448
H0154448H0154448
H0154448
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
D0371028039
D0371028039D0371028039
D0371028039
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
 

543 poster

  • 1. Network Security has a significant role in securing the vital information. Stream ciphers, which are the most important class of symmetric algorithms are widely used in protecting the digital information. However, these days variety of attacks (algebraic and so on) are encountered in stream cipher which is creating problem in providing security to the information. This is the main motivation behind our research. Our main research goal is to describe and analyze design of stream cipher in network security. INTRODUCTION PROCEDURE Design of proposed Stream cipher is done through the analysis of  Algebraic immunity (AI) of Boolean functions  S-Boxes (usually called substitution box or substitution cipher).  Thus in process of designing stream cipher, cryptographic properties of non-linear transformations have been used.  There are many LFSR based stream ciphers which use non-linear Boolean function which destroy linearity of LFSR output. Even these were broken by algebraic attacks. Thus, we analyze new and significant class of non- linear Boolean functions for LFSR based stream ciphers resistance to algebraic attacks. This is shown as a practical example to show the effectiveness of our design.  Over GSM, communication is on air, so data can be attacked easily. In order to send original data without attacks, we are analyzing on how the stream cipher can be used to protect the data. SECTION 3 From the analysis done so far, we have found that the new stream cipher can be implemented to securely send the data through the network. This can be done by using non linear S-box, LFSRs and algebraic immunity. Also, information shared over air can be made more secure by using stream ciphers in the GSM network. This further analysis serves as future scope of our research. DISCUSSION AND CONCLUSION ACKNOWLEDGEMENTS DESIGN AND ANALYSIS OF STREAM CIPHER FOR NETWORK SECURITY TEJASRI SALADI Text