SlideShare a Scribd company logo
OVERVIEW OF DNS
□ The DNS translates Internet domain and host
names to IP address. DNS automatically converts
the names we type in our Web browser address
bar to the IP addresses of Web servers hosting
those sites.
□ The mapping or binding of IP addresses to host
names became a major problem in the rapidly
growing Internet and the higher level binding
effort went through.
□ We got the different stages of development up to
the currently used Domain Name System.
DNS ARCHITECTURE
EXISTING SYSTEM
The existing system is manually maintained. It uses RSA
Algorithm for key generation.
Since it uses RSA Algorithm it is necessary to provide two Prime numbers to
generate Key Pair which results in Mathematical and Brute force attack.
It sends the Public key through the Network. Time
consumption
Low reliability
➢
➢
➢
➢
➢
➢
DISADVANTAGES
➢
➢
➢
Error prone
Less operational speed
Low speed communication
THE FOLLOWING FUNCTION AVOIDS THE
PITFALLS OF THE EXISTING SYSTEM
➢ Fast and efficient work
➢ Ease of access to system
➢ Manual Effort is reduced
PROPOSED SYSTEM
➢
➢
➢
➢
Taking the security into consideration the best solution is
using Pseudo Random Number Generator for generating
Key Pair in a quick and more secured manner.
Use of MD5 (or) Message Digest and Compressing the
message.
Signature is created using Private Key and Message
Digest which is transmitted along with the Public Key.
The transfer of the packets from each System to System
is shown using Graphical User Interface (GUI).
ADVANTAGES OF PROPOSED SYSTEM
➢ They are not limited to 1024 bits like DSA
➢ They can use hash longer than 160 bits.
OVERALL DIAGRAM
ENCRYPTION,
KEY GENERATION,
SIGNATURE
GENERATION,
SIGNATURE
VERIFICATION,
DECRYPTION
SENDER
RECEIVER
ORIGINAL
MESSAGE
ORIGINAL
MESSAGE
IMPLEMENTATION
➢
➢
➢
➢
➢
Authentication
Message Encryption using Message Digest
Algorithm
Key Generation using PRNG Algorithm
Signature Generation
Verifying Signature and Decrypting
MODULES
➢ Key Generation
➢ Encryption and Decryption
➢ Signature Creation
➢ Signature Verification
MODULE DESCRIPTION
KEY GENERATION
➢ Taking two prime numbers
➢ Generating random numbers
➢ Generating public and private keys
➢ The key pair (public and private key) is generated
using the Cryptography PRNG (Pseudo Random
Number Generator) Algorithm.
KEY GENERATION
MODULE DESIGN
PRNG ALGORITHM
CALL THE METHOD IN
THE CODING
GENERATE TWO RANDOM NUMBERS
(PUBLIC AND PRIVATE KEY)
DISPLAY THE KEYS IN THE
BACK END
GENERATE SIGNATURE
AND SEND
AUTHENTICATION
ENTER THE USER NAME AND
PASSWORD
AUTHENTICATION
VERIFY TEXT FILE
LOGIN
SEND MESSAGE OR ATTACHMENT
MESSAGE ENCRYPTION
MESSAGE DIGEST ALGORITHM
CONVERT EACH CHARACTER
TO ASCII CODE
CONVERT THE ASCII CODE
TO HEX CODE
ENCRYPTED MESSAGE
READ CHARACTER BY
CHARACTER
SIGNATURE GENERATION
DSAALGORITHM
PRIVATE KEY + ENCRYPTED
TEXT FILE
GENERATE SIGNATURE
PUBLIC KEY + SIGNATURE
SEND THROUGH THE
NETWORK
VERIFYING SIGNATURE AND
DECRYPTING
DESTINATION
PUBLIC KEY ,SIGNATURE
FROM THE SENDER
GENERATE SIGNATURE USING
DSA ALGORITHM
DECRYPT THE MESSAGE
OR FILE
REPLY TO THE SOURCE
VERIFY THE SIGNATURE
IF MATCHES
DISCARD
NO MATCH
ATTACK ON ROOTSERVER
➢ OCTOBER 23, 2012
➢ Attack on root servers
➢ 9 out of 13 servers were down
➢ Slowdown after 8 or more servers are down
➢ No noticeable slowdown observed by users
ATTACK ON MICROSOFT
➢
➢
➢
➢
➢
➢
22.5 hour outage of web sites
Series of attacks on Name servers, Jan 2001
Reasons – attack or misconfiguration
Intermittent access to Microsoft.com,
MSN.com
$200 million advertising campaign
Microsoft Web sites drew 54 million unique
visitors in December
DNS SECURITY EXTENSION
➢ Idea: Add a digital signature to each Name
➢ Information
– Signing with the zone’s private key
– Authenticating with the zone’s public key
➢ Main issue
– Key genereation
– DNS as Public Key Infrastructure
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS
➢
➢
➢
PROCESSOR III AND ABOVE
20 GB HARD DISK
256 DDR RAM
SOFTWARE REQUIREMENTS
➢
➢
➢
MICROSOFT.NET FRAMEWORK 1.1
INTERNET INFORMATION SERVER
BROWSER(I E OR NETSCAPE)
CONCLUSION:
The security threats for DNS
was overcome by using public key validation
and it was implemented and executed
successfully
THANK YOU

More Related Content

Similar to DNS.pptx

Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
BU
 
FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
Muhammad Moinur Rahman
 
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Priyanka Aash
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 
Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashKerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-Hash
Ankit Mehta
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
Ashok Panwar
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
Migrating Printing from SNA to TCP/IP
Migrating Printing from SNA to TCP/IPMigrating Printing from SNA to TCP/IP
Migrating Printing from SNA to TCP/IP
webhostingguy
 
[Note]x509
[Note]x509[Note]x509
[Note]x509
Yu-Ting Chen
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
Arpit Agarwal
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
iplotnikov
 
SSL Primer
SSL PrimerSSL Primer
SSL Primer
Mahadev Gaonkar
 
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side EncryptionSID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
Amazon Web Services
 
TLS/SSL Protocol Design
TLS/SSL Protocol DesignTLS/SSL Protocol Design
TLS/SSL Protocol Design
Nate Lawson
 
The new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiThe new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pki
Nathan Winters
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
Nick Owen
 
The History of DNS
The History of DNSThe History of DNS
The History of DNS
Michael McLean
 
Improving password-based authentication
Improving password-based authenticationImproving password-based authentication
Improving password-based authentication
Frank Denis
 
Towards Securing Computer Network Environment By Using Kerberos-based Network...
Towards Securing Computer Network Environment By Using Kerberos-based Network...Towards Securing Computer Network Environment By Using Kerberos-based Network...
Towards Securing Computer Network Environment By Using Kerberos-based Network...
FATIN FAZAIN MOHD AFFANDI
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
Slawomir Jasek
 

Similar to DNS.pptx (20)

Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
 
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Kerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-HashKerberos, NTLM and LM-Hash
Kerberos, NTLM and LM-Hash
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Migrating Printing from SNA to TCP/IP
Migrating Printing from SNA to TCP/IPMigrating Printing from SNA to TCP/IP
Migrating Printing from SNA to TCP/IP
 
[Note]x509
[Note]x509[Note]x509
[Note]x509
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
SSL Primer
SSL PrimerSSL Primer
SSL Primer
 
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side EncryptionSID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
 
TLS/SSL Protocol Design
TLS/SSL Protocol DesignTLS/SSL Protocol Design
TLS/SSL Protocol Design
 
The new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiThe new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pki
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
The History of DNS
The History of DNSThe History of DNS
The History of DNS
 
Improving password-based authentication
Improving password-based authenticationImproving password-based authentication
Improving password-based authentication
 
Towards Securing Computer Network Environment By Using Kerberos-based Network...
Towards Securing Computer Network Environment By Using Kerberos-based Network...Towards Securing Computer Network Environment By Using Kerberos-based Network...
Towards Securing Computer Network Environment By Using Kerberos-based Network...
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 

Recently uploaded

morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
Yasser Mahgoub
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 

Recently uploaded (20)

morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 

DNS.pptx

  • 1.
  • 2. OVERVIEW OF DNS □ The DNS translates Internet domain and host names to IP address. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. □ The mapping or binding of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through. □ We got the different stages of development up to the currently used Domain Name System.
  • 4. EXISTING SYSTEM The existing system is manually maintained. It uses RSA Algorithm for key generation. Since it uses RSA Algorithm it is necessary to provide two Prime numbers to generate Key Pair which results in Mathematical and Brute force attack. It sends the Public key through the Network. Time consumption Low reliability ➢ ➢ ➢ ➢ ➢ ➢ DISADVANTAGES ➢ ➢ ➢ Error prone Less operational speed Low speed communication
  • 5. THE FOLLOWING FUNCTION AVOIDS THE PITFALLS OF THE EXISTING SYSTEM ➢ Fast and efficient work ➢ Ease of access to system ➢ Manual Effort is reduced
  • 6. PROPOSED SYSTEM ➢ ➢ ➢ ➢ Taking the security into consideration the best solution is using Pseudo Random Number Generator for generating Key Pair in a quick and more secured manner. Use of MD5 (or) Message Digest and Compressing the message. Signature is created using Private Key and Message Digest which is transmitted along with the Public Key. The transfer of the packets from each System to System is shown using Graphical User Interface (GUI).
  • 7. ADVANTAGES OF PROPOSED SYSTEM ➢ They are not limited to 1024 bits like DSA ➢ They can use hash longer than 160 bits.
  • 9. IMPLEMENTATION ➢ ➢ ➢ ➢ ➢ Authentication Message Encryption using Message Digest Algorithm Key Generation using PRNG Algorithm Signature Generation Verifying Signature and Decrypting
  • 10. MODULES ➢ Key Generation ➢ Encryption and Decryption ➢ Signature Creation ➢ Signature Verification
  • 11. MODULE DESCRIPTION KEY GENERATION ➢ Taking two prime numbers ➢ Generating random numbers ➢ Generating public and private keys ➢ The key pair (public and private key) is generated using the Cryptography PRNG (Pseudo Random Number Generator) Algorithm.
  • 12. KEY GENERATION MODULE DESIGN PRNG ALGORITHM CALL THE METHOD IN THE CODING GENERATE TWO RANDOM NUMBERS (PUBLIC AND PRIVATE KEY) DISPLAY THE KEYS IN THE BACK END GENERATE SIGNATURE AND SEND
  • 13. AUTHENTICATION ENTER THE USER NAME AND PASSWORD AUTHENTICATION VERIFY TEXT FILE LOGIN SEND MESSAGE OR ATTACHMENT
  • 14. MESSAGE ENCRYPTION MESSAGE DIGEST ALGORITHM CONVERT EACH CHARACTER TO ASCII CODE CONVERT THE ASCII CODE TO HEX CODE ENCRYPTED MESSAGE READ CHARACTER BY CHARACTER
  • 15. SIGNATURE GENERATION DSAALGORITHM PRIVATE KEY + ENCRYPTED TEXT FILE GENERATE SIGNATURE PUBLIC KEY + SIGNATURE SEND THROUGH THE NETWORK
  • 16. VERIFYING SIGNATURE AND DECRYPTING DESTINATION PUBLIC KEY ,SIGNATURE FROM THE SENDER GENERATE SIGNATURE USING DSA ALGORITHM DECRYPT THE MESSAGE OR FILE REPLY TO THE SOURCE VERIFY THE SIGNATURE IF MATCHES DISCARD NO MATCH
  • 17. ATTACK ON ROOTSERVER ➢ OCTOBER 23, 2012 ➢ Attack on root servers ➢ 9 out of 13 servers were down ➢ Slowdown after 8 or more servers are down ➢ No noticeable slowdown observed by users
  • 18. ATTACK ON MICROSOFT ➢ ➢ ➢ ➢ ➢ ➢ 22.5 hour outage of web sites Series of attacks on Name servers, Jan 2001 Reasons – attack or misconfiguration Intermittent access to Microsoft.com, MSN.com $200 million advertising campaign Microsoft Web sites drew 54 million unique visitors in December
  • 19. DNS SECURITY EXTENSION ➢ Idea: Add a digital signature to each Name ➢ Information – Signing with the zone’s private key – Authenticating with the zone’s public key ➢ Main issue – Key genereation – DNS as Public Key Infrastructure
  • 20. SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS ➢ ➢ ➢ PROCESSOR III AND ABOVE 20 GB HARD DISK 256 DDR RAM SOFTWARE REQUIREMENTS ➢ ➢ ➢ MICROSOFT.NET FRAMEWORK 1.1 INTERNET INFORMATION SERVER BROWSER(I E OR NETSCAPE)
  • 21. CONCLUSION: The security threats for DNS was overcome by using public key validation and it was implemented and executed successfully