SlideShare a Scribd company logo
Title:
DATA SECURITY WITH AES ENCRYPTION,
ELLIPTIC CURVE ENCRYPTION AND SIGNATURE _
Project Supervisor & Guide _
C.Atheeq
Assistant Professor
CSE Dept,
Deccan College of
Engineering &Technology
Hyderabad.
>> Mohammed Abdul Faizan
160318733029
BEVII Sem CSE, DCET
>> Mohammed Abdul Lateef
160318733055
BEVII Sem CSE, DCET
>> Mohd Abdul Rahman
160318733057
BE VII Sem CSE, DCET
Presentation Outline_____
i. Getting to know about our Domain
ii. Current System / Literature Survey
iii.Problems in Current system
iv.Proposed System
Getting to know about our Domain-
CRYPTOGRAPHY_
• Cryptography is the study of secure communications techniques that allow only the
sender and intended recipient of a message to view its content.
• When transmitting electronic data, the most common use of cryptography is to encrypt
and decrypt email and other plain-text messages from files to databases etc.
• Cryptography redefines ACID property and Benefits of Cryptography are the
redefinition itself...
1.Authentication
2.Confidentiality
3.Impenetrable
4.Data- Integrity
Literature Survey / Current System _
• Database security is concerned with, the information security control that involves
the data protection,
stored functions protection,
the database itself ,
its servers.
• Database- used for various areas like hospital, defense, school, etc. to store the sensitive
sensitive information,
hence security of such databases is a primary concern where Cryptography comes into play.
o If a user needs to store or request the data, to do this the user needs to get
authenticated.
o When a user is authenticated, he will get key from a key generator and then
he encrypts or decrypts the data within the database.
o The basic characteristics of information that must be available in database
system is,
1. Confidentiality
2. Integrity
These are achieved in the system using AES encryption and ECDSA signature
verification.
Contd.
Fig: Key generator role for database store and retrieve - AES
Here in database,
1. AES symmetric encryption and ECC encryption, for
database Confidentiality and
2. ECC signature, for database Integrity.
are used.
Current Implementation of the System:
o There are 3 lengths of AES encryption keys: 128-bit | 192-bit | 256-bit
o Even though the key length of this encryption method varies, its block size
- 128-bits (or 16 bytes) - stays fixed.
o It all comes down to resources. For example, an app that uses AES-256
instead of AES-128 might drain your phone battery a bit faster.
o Hence key length is directly proportional to the processing resources
used.
Keys Config:
THE ECDSA _
o Elliptic Curve Digital Signature Algorithm, is one of
the public key cryptography encryption
algorithms.
o Keys are generated via ECC are smaller than the
average keys generated by other digital signing
algorithms.
o * A digital signature is an authentication method
used where a public key pair and a digital certificate
are used as a signature to verify the identity of a
recipient or sender of information.
THE 6 methods
discussed in
regards with
Database Security.
Type – 1. Rows-level encryption with AES
Type – 2. Columns- level encryption with AES
Type – 3. Elements level encryption with AES
Type – 4. Rows-level encryption with AES and ECC
Type – 5. Column level encryption with AES and ECC
Type – 6. Elements level encryption with AES and ECC
1. Rows, Column, Element-level encryption(Type 1,2,3)with AES are done
with a key binding function for generation their respective Cipher blocks.
2. Rows, Column, Element-level encryption(Type 4,5,6 )with AES and ECC
are done with a key binding function for generation their Digital
Signatures.
Brief Description of methods _
o In the current system of Database security there arises a problem, like
o While signing of the Ciphers for the Signature generation, the
authentication time is comparatively more for the receiver to decrypt the
cipher.
o This aspect is being resolved in our proposed system.
Problem in Current System _
Proposed System:
KEY AUTHENTICATION MANAGEMENT
USING CHAOS THEORY & CHEBYSHEV POLYNOMIAL
--- Guided by C.Atheeq
Objective of our Proposed system:
• To minimize the authentication time of the verification at the
receiver end & the signature generation at the sender end.
• We propose a method to provide mutual authentication
between communicating entities using chaos theory.
Directions:
o Chaos theory.
o Chaotic Cryptology.
o Chebyshev polynomial.
o Implementation procedure.
CHAOS THEORY _
• 'Chaos'- def. Some information that is extremely complicated or with an
absence of some order.
• Chaotic systems are deterministic but their long term behavior causes
difficulty in prediction with accuracy.
• Chaos theory states that the apparent(clear or open to view)
randomness of chaotic systems, there exists underlying patterns,
repetitions, self-organization etc.
CHAOTIC CRYPTOLOGY _
a) It is application of mathematical-Chaos theory for Cryptography
b) Used to privately and securely transmit the information.
c) If chaotic parameters and cryptographic keys are mapped either
symmetrically or asymmetrically they produce acceptable and functional
outputs.
d) Using this makes any intruder impossible to find the outputs without the
knowledge of inputs.
EX: Image encryption, random number generation, Hash functions.
CHEBYSHEV POLYNOMIAL...
1. Derived by Pafnuty Chebyshev, Russian mathematician for statistics,
probability and mechanics.
2. Its is a function that describes the time dependence of a point in geometric
space.
3. The Chebyshev polynomial are the sequences of major cosine functions-Tn(x)
4. Where ,n>=1;
5. There exists a semi group property of CHEBYSHEV POLYNOMIAL which is
being implemented i.e.,
, n>=1;
Q.Where exactly are these polynomials to be used..?
KEY MANAGEMENT USING CHAOS THEORY _
o By using chaos theory, the key is generated at sender as well as at receiver
side and it is compared.
o This process of mutual authentication in our proposed protocol take minimum
computational load.
o This mutual authentication gives the parameters to the Chebyshev
polynomials to generate a unique and corresponding key for the Chaotic
Cryptography.
Proof to be derived from Chaos theory and Chebyshev
polynomials :
(Sender) (Receiver
)
• Where,
m, n are public and private keys ,
x is the cipher/ message to be encrypted/ decrypted.
From the above calculations it gets clear that the sender and receiver
acquires the same secret key by using the chaos theory and does the mutual
authentication in an effective manner.
0
2000
4000
6000
8000
10000
12000
ECC Chaos 2
Comparison between RSA and Chaotic Maps
in computational time
Authentication time
taken
This protocol of minimizing the authentication time is our proposed system, so that the
authentication mechanism takes minimum computational load.
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

More Related Content

What's hot

Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
cns 2marks
cns 2markscns 2marks
cns 2marks
ilakiyadinesh
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Hardik Manocha
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
IDES Editor
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
prashantdahake
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
koolkampus
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
Hardik Manocha
 
Rc6 algorithm
Rc6 algorithmRc6 algorithm
Rc6 algorithm
Chethan Chetu
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
ranjit banshpal
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
Vaibhav Khanna
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
csandit
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
 

What's hot (20)

Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
 
Rc6 algorithm
Rc6 algorithmRc6 algorithm
Rc6 algorithm
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 

Similar to DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
GIT
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
Editor IJCATR
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
E017212836
E017212836E017212836
E017212836
IOSR Journals
 
82 86
82 8682 86
82 86
82 8682 86
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
aniruddh Tyagi
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
aniruddh Tyagi
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
Aniruddh Tyagi
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 

Similar to DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE (20)

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
E017212836
E017212836E017212836
E017212836
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 

More from Mohammed Abdul Lateef

Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Mohammed Abdul Lateef
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Mohammed Abdul Lateef
 
Analysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptxAnalysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptx
Mohammed Abdul Lateef
 
Blockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptxBlockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptx
Mohammed Abdul Lateef
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
Mohammed Abdul Lateef
 
Bio filters/ Biofilteration
Bio filters/ BiofilterationBio filters/ Biofilteration
Bio filters/ Biofilteration
Mohammed Abdul Lateef
 
Calorific Values
Calorific ValuesCalorific Values
Calorific Values
Mohammed Abdul Lateef
 
Indian Mathematician
Indian MathematicianIndian Mathematician
Indian Mathematician
Mohammed Abdul Lateef
 

More from Mohammed Abdul Lateef (8)

Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
 
Analysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptxAnalysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptx
 
Blockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptxBlockchain Smart Contract Fortification presentation.pptx
Blockchain Smart Contract Fortification presentation.pptx
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
 
Bio filters/ Biofilteration
Bio filters/ BiofilterationBio filters/ Biofilteration
Bio filters/ Biofilteration
 
Calorific Values
Calorific ValuesCalorific Values
Calorific Values
 
Indian Mathematician
Indian MathematicianIndian Mathematician
Indian Mathematician
 

Recently uploaded

New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 

Recently uploaded (20)

New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 

DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

  • 1. Title: DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE _
  • 2. Project Supervisor & Guide _ C.Atheeq Assistant Professor CSE Dept, Deccan College of Engineering &Technology Hyderabad. >> Mohammed Abdul Faizan 160318733029 BEVII Sem CSE, DCET >> Mohammed Abdul Lateef 160318733055 BEVII Sem CSE, DCET >> Mohd Abdul Rahman 160318733057 BE VII Sem CSE, DCET
  • 3. Presentation Outline_____ i. Getting to know about our Domain ii. Current System / Literature Survey iii.Problems in Current system iv.Proposed System
  • 4. Getting to know about our Domain- CRYPTOGRAPHY_ • Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its content. • When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages from files to databases etc. • Cryptography redefines ACID property and Benefits of Cryptography are the redefinition itself... 1.Authentication 2.Confidentiality 3.Impenetrable 4.Data- Integrity
  • 5. Literature Survey / Current System _ • Database security is concerned with, the information security control that involves the data protection, stored functions protection, the database itself , its servers. • Database- used for various areas like hospital, defense, school, etc. to store the sensitive sensitive information, hence security of such databases is a primary concern where Cryptography comes into play.
  • 6. o If a user needs to store or request the data, to do this the user needs to get authenticated. o When a user is authenticated, he will get key from a key generator and then he encrypts or decrypts the data within the database. o The basic characteristics of information that must be available in database system is, 1. Confidentiality 2. Integrity These are achieved in the system using AES encryption and ECDSA signature verification. Contd.
  • 7. Fig: Key generator role for database store and retrieve - AES
  • 8. Here in database, 1. AES symmetric encryption and ECC encryption, for database Confidentiality and 2. ECC signature, for database Integrity. are used. Current Implementation of the System:
  • 9. o There are 3 lengths of AES encryption keys: 128-bit | 192-bit | 256-bit o Even though the key length of this encryption method varies, its block size - 128-bits (or 16 bytes) - stays fixed. o It all comes down to resources. For example, an app that uses AES-256 instead of AES-128 might drain your phone battery a bit faster. o Hence key length is directly proportional to the processing resources used. Keys Config:
  • 10. THE ECDSA _ o Elliptic Curve Digital Signature Algorithm, is one of the public key cryptography encryption algorithms. o Keys are generated via ECC are smaller than the average keys generated by other digital signing algorithms. o * A digital signature is an authentication method used where a public key pair and a digital certificate are used as a signature to verify the identity of a recipient or sender of information.
  • 11. THE 6 methods discussed in regards with Database Security. Type – 1. Rows-level encryption with AES Type – 2. Columns- level encryption with AES Type – 3. Elements level encryption with AES Type – 4. Rows-level encryption with AES and ECC Type – 5. Column level encryption with AES and ECC Type – 6. Elements level encryption with AES and ECC
  • 12. 1. Rows, Column, Element-level encryption(Type 1,2,3)with AES are done with a key binding function for generation their respective Cipher blocks. 2. Rows, Column, Element-level encryption(Type 4,5,6 )with AES and ECC are done with a key binding function for generation their Digital Signatures. Brief Description of methods _
  • 13. o In the current system of Database security there arises a problem, like o While signing of the Ciphers for the Signature generation, the authentication time is comparatively more for the receiver to decrypt the cipher. o This aspect is being resolved in our proposed system. Problem in Current System _
  • 14. Proposed System: KEY AUTHENTICATION MANAGEMENT USING CHAOS THEORY & CHEBYSHEV POLYNOMIAL --- Guided by C.Atheeq
  • 15. Objective of our Proposed system: • To minimize the authentication time of the verification at the receiver end & the signature generation at the sender end. • We propose a method to provide mutual authentication between communicating entities using chaos theory. Directions: o Chaos theory. o Chaotic Cryptology. o Chebyshev polynomial. o Implementation procedure.
  • 16. CHAOS THEORY _ • 'Chaos'- def. Some information that is extremely complicated or with an absence of some order. • Chaotic systems are deterministic but their long term behavior causes difficulty in prediction with accuracy. • Chaos theory states that the apparent(clear or open to view) randomness of chaotic systems, there exists underlying patterns, repetitions, self-organization etc.
  • 17. CHAOTIC CRYPTOLOGY _ a) It is application of mathematical-Chaos theory for Cryptography b) Used to privately and securely transmit the information. c) If chaotic parameters and cryptographic keys are mapped either symmetrically or asymmetrically they produce acceptable and functional outputs. d) Using this makes any intruder impossible to find the outputs without the knowledge of inputs. EX: Image encryption, random number generation, Hash functions.
  • 18. CHEBYSHEV POLYNOMIAL... 1. Derived by Pafnuty Chebyshev, Russian mathematician for statistics, probability and mechanics. 2. Its is a function that describes the time dependence of a point in geometric space. 3. The Chebyshev polynomial are the sequences of major cosine functions-Tn(x) 4. Where ,n>=1; 5. There exists a semi group property of CHEBYSHEV POLYNOMIAL which is being implemented i.e., , n>=1;
  • 19. Q.Where exactly are these polynomials to be used..? KEY MANAGEMENT USING CHAOS THEORY _ o By using chaos theory, the key is generated at sender as well as at receiver side and it is compared. o This process of mutual authentication in our proposed protocol take minimum computational load. o This mutual authentication gives the parameters to the Chebyshev polynomials to generate a unique and corresponding key for the Chaotic Cryptography.
  • 20. Proof to be derived from Chaos theory and Chebyshev polynomials : (Sender) (Receiver ) • Where, m, n are public and private keys , x is the cipher/ message to be encrypted/ decrypted. From the above calculations it gets clear that the sender and receiver acquires the same secret key by using the chaos theory and does the mutual authentication in an effective manner.
  • 21. 0 2000 4000 6000 8000 10000 12000 ECC Chaos 2 Comparison between RSA and Chaotic Maps in computational time Authentication time taken This protocol of minimizing the authentication time is our proposed system, so that the authentication mechanism takes minimum computational load.