Professional Documents
Culture Documents
A project on
Bachelors of Technology
in
Computer Science and Engineering
Submitted by:
ROHIT ARORA
Enroll No. A2300911011
DECLARATION
Haryana
i
Department of Computer Science and Engineering
Amity School of Engineering and Technology
CERTIFICATE
Thisistocertifythat ROHIT ARORA (Enrollment N0. A2300911011), studentofB.Tech(C.S.E)
III semester,DepartmentofComputerScience&Engineering, ASET, Amity University Haryana, has
done his Integrated Project entitled“ADVANCED ENCRYPTION
TECHNIQUES”undermyguidanceandsupervisionduring“January 201…-June 201…”
Theworkwassatisfactory.He hasshowncompletededicationanddevotiontothegivenprojectwork.
Signature of Supervisor(s)
Date:
(MR HARISH GUPTA)
Assistant Professor
Computer Science & Engineering
ASET, Amity University, Haryana
Head
Department of Computer Science & Engineering
Amity School of Engineering and Technology
Amity University Haryana, Gurgaon
ABSTRACT
“Advanced Encryption Technique” as a working system involves a service provider and an
encryption system application. Service provider accepts the payments and provides the
downloadable application and a unique key.Term “random selection” of algorithm refers to the
selection of implementing algorithm in such a way that even the user is not going to know about
the algorithm used , while his motive of encryption is fulfilled in a efficient way.Manual mode
of operation provides the feature of intended selection of algorithm if user wishes to use particular
encryption algorithm.The whole system application is provided through a web server application
which accepts the payments for purchasing the software.As security feature is such an essence for
any communication over any network and encryption is one of the security issues, cryptanalysis is
performed for breaking the algorithm as analyst try for guessing the key or for getting the
plaintext.In “Advanced Encryption Technique” random selection of encryption algorithm
makes “cryptanalysis task more complex”, as firstly analyst will have to get knowledge of selected
algorithm which is selected by “Randomization Function” for encryption.“Randomization
function” makes the system unique in its class applications and makes it stand apart from all
traditional encryption systems.
LIST OF FIGURES
Figure 1 DFD Level 0
Figure 2 DFD Level 1
Figure 3 DFD Level 2
Figure 4 Entity Relationship Diagram
Figure 5(a),5(b) Working structure of decision function
Figure 6 DES Working
Figure 7 Block diagram for TDES
Figure 8 Fiestal structure for BlowFish
Figure 9 Screenshot for first page of AET
Figure 10 Screenshot for Registration form
Figure 11 (a), 11(b) Screenshot for Purchase page
Figure 12 Screenshot for credit card information
Figure 13 Screenshot for purchase key
Figure 14 Screenshot for generate key
Figure 15 Screenshot for home page for AET
Figure 16(a) Screenshot for login page
Figure 16(b) Screenshot for login page and key entry
Figure 17 Screenshot for registration page
Figure 18 Screenshot for AET Mode selection window
Figure 19 Screenshot for Algorithm selection mode
Figure 20 Screenshot for Dynamic mode window
Contents
Declaration i
Certificate ii
Acknowledgement iii
Abstract iv
List of Figures v
List of Tables vi
1. INTRODUCTION 1
1.1 Objective 1
1.2 Current system 2
1.3 Proposed system 3
2. BACKGROUND OF PROJECT 6
3. TECHNOLOGIES USED7
3.1. Java 7
3.1.1. AWT8
3.1.2. JDBC9
3.3. Html12
4. DESIGN OF PROJECT 15
5. IMPLEMENTATION23
5.3 DES 24
5.5 Blowfish 28
6. SCREEN SHOTS 31
8. CONCLUSION 48
9. REFERENCES 49
APPENDIX 50
Chapter 1
INTRODUCTION
Before beginning, we define some terms. An original message is known as the plaintext, while the
encoded message is called the cipher text. The process of converting from plain text to cipher text
is known as the encryption; restoring the plain text from the cipher text is decryption. The many
encryptions constitute the area of study known as cryptography. Technique used for deciphering
a message without any knowledge of the enciphering details fall into the area of cryptanalysis.
“Advance encryption technique” has been developed to automate the task involved in
encryption and decryption of any message or any other important information with
enhanced security concept. There are two modes in AET:-
Manual mode
Dynamic mode
In manual mode user selects one algorithm from given algorithms for encryption and
decryption but in dynamic mode random selection of algorithm occurs for encryption and
decryption.
It also provide two other features:
1. Message digest
2. Crypt information.
To use AET, first of all users has to register itself on service provider which provides AET
to users and has to purchase AET and a valid key to use the AET.
Using “Dynamic mode” even the user will not know that with which algorithm his data is
going to be encrypted as he/she only knows the encryption password.
1.1 Objective
The project can be used by any user who wants to encrypt any important message or any other
information. This project provides an easy to use GUI for encrypt and decrypt documents. It
improves the security of documents.
The main objective of this project is to enable all the security services. Such as-
Authentication: the assurance that the communicating entity is the one that it claims to
be.
Data integrity: theassurance that data received are exactly as sent by an authorized entity.
It is password protected, so that only authenticated user can encrypt and decrypt the data.
No password protection.
Integrity is less.
Provides flexibility.
Chapter 2
BACKGROUND OF PROJECT
Encryption is one of the essential issues of communication security over any network, in
conventional systems like: algorithm hubs, the selection of algorithm for performing encryption is
manual or static.
Manually selection based systems are not capable to be implemented in real world environment as
such system just provides a simulation of algorithms or a prototyping of real world systems.
Such systems provide first thought for the development of “advance encryption system”.
Static or single algorithm based systems which hardly relates with the real world implementation,
this deficiency also boost the existence of the “advance encryption technique.
As more complex encryption algorithms are in trend as they have their own security .Length of
encryption key is the basic security feature of any algorithm, as the long key used, the possibility
of number of existing key also increases.
In traditional systems user or agents encrypts the data with single algorithm rather the algorithm
may be complex, and such encryption systems can be thought as static encryption system.
While in “advance encryption technique” uses an idea of algo hub implementation but the selection
of algorithm is based on decision function which is implemented with the randomization functions
of java.
Number of algorithms is implemented in an algorithm chamber while there exists a decision
chamber which provides a random selection of algorithms.
Basic idea for this project is strong encryption and decryption with a unique feature of
randomization decision function. This system provides an over come from the lagging features of
traditional algo hubs and static encryption.
5. It should be easy to use by selecting what was considered the good parts of other object-
oriented languages.
3.2.1 JSP2.0
The new version of the JSP specification includes new features meant to improve programmer
productivity. Namely:
An expression language (EL) which allows developers to create velocity style
templates (among other things).
A faster/easier way to create new tags.
The original servlet specification was created by Sun Microsystems (version 1.0 was finalized in
June 1997). Starting with version 2.3, the servlet specification was developed under the java
community process. JSR 53 defined both the servlet 2.3 and java server page 1.2 specification.
JSR 154 specifies the servlet 2.4 and 2.5 specification. As of may 10, 2006, the current version of
the servlet specification is 2.5.
The java servlet API allows a software developer to add dynamic content to a web server using
the java platform. The generated content is commonly HTML, but may be other data XML.
Servlets are the java counterpart to no java dynamic web content technologies such as CGI and
ASP .NET. Servlets are maintain state across many server transaction by using HTTP cookies,
session variables or URL rewriting.
The servlet API, contain in the java package hierarchy javax.servlet, defines the expected
interactions of a web container and a servlet. A web container is essentially the container of a web
server that interacts with the servlet. The web container is responsible for managing the lifecycle
of servlets, mapping a URL to a particular servlet and ensuring that the URL requester has the
correct access rights.
3.3 HTML
Html stands for Hypertext Markup Language.
1. Hypertext is ordinary text that has been dressed up with extra features, such as formatting,
images, multimedia, and links to other documents.
2. Markup is the process of taking ordinary text and adding extra symbols. Each of the symbols
used for markup in html is a common that tells a browser how to display the text. HTML is the
predominant markup language for creation of web pages. It provides a means to describe the
structure of text based information in a document- by denoting certain text as heading, paragraph,
and lists and so on- and to supplement that text with interactive forms, embedded images, and
other objects. Html is written in the form of labels (known as tags), surrounded by less than (<)
and greater than (>) sign. Html can also describe, to some degree, the appearance and semantics
of a document, and can include embedded scripting language code which can affect the behavior
of web browsers and other HTML process. HTML is also used to refer to content to the MIME
type text/html or even more broadly as a generic term for HTML whether in its XML-descended
form or its form descended directly from SGML. TIM Burners Lee created the original HTML on
a next cube workstation using the next STEP development environment. At the time, HTML was
not a specification, but a collection of loosely defined elements to solve immediate problems: the
communication and dissemination of ongoing research between Lee burners and his colleagues.
His solution later combined with the emerging international and public internet to garner
worldwide attention. The original design of HTML was simple. The first publicly available
description of HTML was a document called HTML tags. The document describes 22 elements
that made up the initial design of HTML. Thirteen of these elements still exist in HTML 4.
CHAPTER 4
Software requirement:
Web server with jre 1.6 properties (apache tomcat 6.0.1)
Java2 development kit (1.6.0 former edition as a minimal requirement)
Java standard tag library (jsp pages deployment)
1. User interface.
Login
Registration.
2. Manual mode.
3. Dynamic mode.
4. Message Digest.
5. Crypt information.
Algorithms used:
DES.
3DES.
Blow fish
1. Registration
2. Purchase key
3. Purchase AET
IMPLEMENTATION
Triple DES is another mode of DES operation. It takes three 64-bit keys, for an overall key length
of 192 bits. In Stealth, you simply type in the entire 192-bit (24 character) key rather than entering
each of the three keys individually. The Triple DES DLL then breaks the user-provided key into
three sub keys, padding the keys if necessary so they are each 64 bits long. The procedure for
encryption is exactly the same as regular DES, but it is repeated three times, hence the name Triple
DES. The data is encrypted with the first key, decrypted with the second key, and finally encrypted
again with the third key.
Triple DES runs three times slower than DES, but is much more secure if used properly. The
procedure for decrypting something is the same as the procedure for encryption, except it is
executed in reverse. Like DES, data is encrypted and decrypted in 64-bit chunks. Although the
input key for DES is 64 bits long, the actual key used by DES is only 56 bits in length. The least
significant (right-most) bit in each byte is a parity bit, and should be set so that there are always
an odd number of 1s in every byte. These parity bits are ignored, so only the seven most significant
bits of each byte are used, resulting in a key length of 56 bits. This means that the effective key
strength for Triple DES is actually 168 bits because each of the three keys contains 8 parity bits
that are not used during the encryption process
Figure 6.2 : Block diagram of TDES
Chapter 7
SCREEN SHOTS
CONCLUSION
Encryption is the basic security need for making a secure communication happen. Number of implemented algorithms
makes the encryption more complex.
Advance encryption technique boosts the security needs of any communication channel. As this project implements
the several numbers of algorithms, with a dynamic approach.
And decision function implementation makes the system more effective and secure. As cryptanalysis is not limited
till the guessing of the key or the plain text.
“Advance encryption technique” is not just a simulation of algorithms it can be adopted for real world data encryption.
Which is supported by fully automation of algorithm selection with randomization approach?
System is quite compatible for working with real world encryption schemes. Automation is dynamic in its own class
of application, as user just only responsible for inputs and expect for encrypted text, selection of is not over to the
user.
The project can serve to be useful system for any of the, individual or organizational networks for the security of data.
REFERENCES
Books referred:
1. “Computer and networks security” by William Stallings.
Table 4:USERS_DETAIL:
Field name Data type Validation
Name Text Not null
Password Text Not null
Country Text Not null
e-mail Text Not null
Table 5: KEY:
Field name Data type
S_no Number