Cryptkit


           1
College Name


               2
HOD Name


           3
Students Name


            4
CRYPTKIT
  using
  JAVA

       5
Abstract

   The purpose of Cryptkit is to
implement a real time cryptographic
  system to enhance security over
             networks.




                                      6
Abstract
It uses various cryptographic techniques such
   as,
       TDES
       RSA
       RABIN
       PC-1


                                                7
Abstract
This is an endeavor to implement a real time
 cryptographic system to enhance security
 over the networks. There are about various
 encrypting techniques available for secure
 transmission of data. But, we use here the
 standard algorithms namely RSA, RABIN,
 TDES and PC-1 working on text messages.

                                               8
The transmission of data can be made through
conventional modems through the telephone lines
or via the internet which may be performed using
various socket programs.

We have used both symmetric and asymmetric
encryption algorithms so as to provide a large
coverage for the user. The algorithms used were
selected by keeping in mind their effectiveness and
efficiency. This project was built on JavaTM and can
be used in any operating system


                                                       9
System Configuration

Software Requirements:

Operating System : Any OS.
Language         : JAVATM .
Java Version     : JDK1.2 and higher.



                                        10
System Configuration
Hardware Requirements:

 Processor : Pentium II
 Hard disk : 4GB
 RAM       : 128MB




                             11
TDES(Triple Data Encryption Standards)

 TDES is a block cipher.
 It is a symmetric key algorithm.
 It uses 3x16 rounds for encryption.
 It is tedious to break the cipher text,since it has
 2168 possibilities.
  It uses the same key for both encryption and
 decryption.
  It is mainly used in Defense Security.


                                                       12
RSA Algorithm

RSA is a block cipher.
It is an Asymmetric algorithm,since it uses
different keys for encryption and decryption.
It uses two large prime numbers to generate the
public key and private key.
It is widely used in network security systems.




                                                  13
RABIN

This is a Block Cipher Algorithm.
 It is an Asymmetric Algorithm, since it uses
different keys for encryption and decryption.
 The Security lies on the difficulty of finding
square roots modulo of a composite number.
It is widely used in ATM and Credit Card
security systems.


                                                  14
PC-1
 It is a Stream Cipher and works on retroaction
function.
 It is a Symmetric Algorithm.
 It uses an 128 bit key and operates on 8 bit
message blocks.
It is mainly used in credit card security, military
radio’s and satellites. E.g. to encrypt the launch
code of thermonuclear missiles.

                                                      15
Advantages
 The algorithms used in this project are the most
difficult to break.
 Since our project is built in JAVA, It can run on
any Operating System.
 It has a good look and feel.
 It is simple and User Friendly.



                                                     16
Current Trends
The RSA-DES challenge was conducted in order
to develop more efficient and stronger
cryptographic algorithms.
The Finalists of the competition were
MARS,AES and TDES.
Out of these algorithms AES is widely used in
US military communications and TDES is used
in all other countries.


                                                17
Future Enhancements
• We are trying to implement our project in J2ME
  so that a secure communication can be
  established even when using mobile phones, that
  is, while messaging using mobiles.
• We are trying to add some more algorithms to
  our project, that can provide voice and image
  encryption too.



                                                    18
Screen shot




              19

Crypkit 1

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
    Abstract The purpose of Cryptkit is to implement a real time cryptographic system to enhance security over networks. 6
  • 7.
    Abstract It uses variouscryptographic techniques such as, TDES RSA RABIN PC-1 7
  • 8.
    Abstract This is anendeavor to implement a real time cryptographic system to enhance security over the networks. There are about various encrypting techniques available for secure transmission of data. But, we use here the standard algorithms namely RSA, RABIN, TDES and PC-1 working on text messages. 8
  • 9.
    The transmission ofdata can be made through conventional modems through the telephone lines or via the internet which may be performed using various socket programs. We have used both symmetric and asymmetric encryption algorithms so as to provide a large coverage for the user. The algorithms used were selected by keeping in mind their effectiveness and efficiency. This project was built on JavaTM and can be used in any operating system 9
  • 10.
    System Configuration Software Requirements: OperatingSystem : Any OS. Language : JAVATM . Java Version : JDK1.2 and higher. 10
  • 11.
    System Configuration Hardware Requirements: Processor : Pentium II Hard disk : 4GB RAM : 128MB 11
  • 12.
    TDES(Triple Data EncryptionStandards) TDES is a block cipher. It is a symmetric key algorithm. It uses 3x16 rounds for encryption. It is tedious to break the cipher text,since it has 2168 possibilities. It uses the same key for both encryption and decryption. It is mainly used in Defense Security. 12
  • 13.
    RSA Algorithm RSA isa block cipher. It is an Asymmetric algorithm,since it uses different keys for encryption and decryption. It uses two large prime numbers to generate the public key and private key. It is widely used in network security systems. 13
  • 14.
    RABIN This is aBlock Cipher Algorithm. It is an Asymmetric Algorithm, since it uses different keys for encryption and decryption. The Security lies on the difficulty of finding square roots modulo of a composite number. It is widely used in ATM and Credit Card security systems. 14
  • 15.
    PC-1 It isa Stream Cipher and works on retroaction function. It is a Symmetric Algorithm. It uses an 128 bit key and operates on 8 bit message blocks. It is mainly used in credit card security, military radio’s and satellites. E.g. to encrypt the launch code of thermonuclear missiles. 15
  • 16.
    Advantages The algorithmsused in this project are the most difficult to break. Since our project is built in JAVA, It can run on any Operating System. It has a good look and feel. It is simple and User Friendly. 16
  • 17.
    Current Trends The RSA-DESchallenge was conducted in order to develop more efficient and stronger cryptographic algorithms. The Finalists of the competition were MARS,AES and TDES. Out of these algorithms AES is widely used in US military communications and TDES is used in all other countries. 17
  • 18.
    Future Enhancements • Weare trying to implement our project in J2ME so that a secure communication can be established even when using mobile phones, that is, while messaging using mobiles. • We are trying to add some more algorithms to our project, that can provide voice and image encryption too. 18
  • 19.