crash antony
TRANSCRIPT
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 1/20
IMPLEMENTATION OF ´CRASHµUSING
NETWORK SECURITY TECHNIQUES
JEPPIAAR ENGINEERING COLLEGE
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 2/20
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 3/20
Government provides food at highly subsidized rates to the poor people.
Three types of cards are issued by the government - Above Poverty Line
(APL), Below Poverty Line (BPL) and Antyodaya. There is little subsidy on
rations meant for APL cards. Antyodaya cards are issued to the poorest of
the poor. Rations are issued to them at highly subsidized rates.
³ SURVEY REVEALS 87%WHEAT AND 94%RICE SIPHONED OFF ́
Survey revealed that out of a total of 182 families , 142 families did not
receive a single grain of wheat during the month of June. 167 families did
not receive a single grain of rice.
Out of a total of 4650 Kgs of wheat supposed to have been distributed to the
people, only 595 Kgs had actually been received by the people. The rest 87%found its way to the black market.
Out of a total of 1820 Kgs of rice supposed to have been distributed as per
daily sales registers, only 110 Kgs was received by the people. Balance 94%
was siphoned off.
BELIEVE IT OR NOT«!IT·S 94% CORRUPTION««
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 4/20
Have u experienced it before??? The issue of ration from ration shops is laden with corruption. People
face several types of problems.
The shops do not open. Even if it opens, the usual plea of the shopkeeper
is that there is no stock.
Ration issued to a person is less than the entitled quota of that person.
Rates charged are much more than the official prescribed rates. In
nutshell, a shopkeeper tries his best to prevent people from taking ration
from him, so that he is left with as much ration as possible to sell in the
black market.
Corruption takes place in records. The ration is siphoned off by making
false entries in the records. Fake thumb impressions or signatures are
put by the shopkeepers in the names of the people and their rations are
siphoned off.
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 5/20
We have the solution for this«
CRASH
Fighting Corruption«.(C orruption Reduction using Automated Systems with Handprint access)
´We limit crores corrupted
We let the most live
We connect to evolve««.µ
C onnecting to evolve««
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 6/20
Distribution Network
Main Memory
Display on items present
Main Network
Code Generation&
Split Circuit Code Scanner
Fingerprint Access Controller
Timer Control
Refreshing section Decryption circuit
n c d
110010101
101001010
Real code Processor
Transactions
Validity Chamber
Load Counter+Price List
QTYcontroller..O/P
Accounts
Verification Chamber
Card ³A´ ³B´ ³C´
Availability check of the user
A
A
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 7/20
THE LANGUAGE OF CRYPTOGRAPHY
symmetric key: crypto: shared secret key (eB=dB).
public-key: crypto: Bob has a public encryption key
and a matching private decryption key
plaintext plaintextciphertext
eB
encryption
algorithm
decryption
algorithm
Key to encryptto Bob
Key Bob usesto decrypt
dB
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 8/20
Symmetric key cryptography
Substitution cipher: substituting one thing for
another
monoalphabetic cipher: substitute one letter for another
plaintext: abcdefghijklmnopqrstuvwxyz
ciphertext: mnbvcxzasdfghjklpoiuytrewq
Plaintext: bob. i love you. aliceciphertext: nkn. s gktc wky. mgsbc
E.g.:
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 9/20
Publ
ic key cryptography
Asymmetric, Public Key Cryptosystem (PKCS): Alice knows only Bob¶s public key eB, Bob knows private key dB.
Betterthan symmetric (shared) key cryptosystems.
plaintextmessage, m
ciphertextencryptionalgorithm
decryptionalgorithm
Bob·s publickey
plaintextmessageK (m)
B
+
KB
+
Bob·s privatekey
KB
-
m = K (K (m))B
+
B
-
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 10/20
Algorithm for the decryption circuit
1. Choose two large prime numbers p, q .(e.g., 1024 bits each)
2. Compute n = pq , z = (p-1)(q-1)
3. Choose e (with e<n) that has no common factorswith z . (e, z are ´relatively primeµ).
4. Choose d such that ed-1 is exactly divisible by z .(in other words: ed mod z = 1 ).
5. P ublic key is (n,e). P rivate key is (n,d ).
KB+
KB-
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 11/20
Is
there a lock without a key?Gue ss«.
0. Given (n,e) and (n,d) as computed above.
1. T o encrypt bit pattern, m, compute
c = m mod n
e (i.e., remainder when m is divided by n)e
2. T o decrypt received bit pattern, c, compute
m = c mod nd (i.e., remainder when c is divided by n)d
m = (m mod n)e mod ndMagichappens!
c
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 12/20
Examine @@@@ it«««Bob chooses p=5 , q=7 . T hen n=35 , z=24 .
e=5 (so e, z relatively prime).
d= 29 (so ed -1 exactly d ivisible by z .
letter m me c = m mod ne
l 12 1524832 17
c m = c mod nd
17 481968572106750915091411825223071697 12
cd letter
l
encrypt:
decrypt:
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 13/20
IMPLEMENTATION OF THE ALGORITHM IN JAVASCRIPT
import java.math.BigInteger;
import java.security.SecureRandom;
class key{
private BigInteger n, d, e;
public key(int bitlen)
{
SecureRandom r = new SecureRandom();
BigInteger p = new BigInteger(bitlen / 2, 100, r);
BigInteger q = new BigInteger(bitlen / 2, 100, r);
n = p.multiply(q);
BigInteger m = (p.subtract(BigInteger.ONE))
.multiply(q.subtract(BigInteger.ONE));e = new BigInteger("3");
while(m.gcd(e).intValue() > 1) e = e.add(new BigInteger("2"));
d = e.modInverse(m);
}
public BigInteger encrypt(BigInteger message)
{
return message.modPow(e, n);
}
public BigInteger decrypt(BigInteger message)
{
return message.modPow(d, n);}
}
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 14/20
Bio-Metric Access
Difference makes an aspect«««« A fingerprint is made up of a pattern of ridges
and furrows as well as characteristics that
occur at Minutiae points (ridge bifurcation or
a ridge ending)Fingerprint scanning essentially provides an
identification of a person based on the
acquisition and recognition of those unique
patterns and ridges in a fingerprint
The actual fingerprint identification processwill change slightly between products and
systems. The basis of identification, however,
is nearly the same
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 15/20
As easy as time clock or payroll accessª..
C heck it out? Standard systems are comprised of a sensor for scanning a fingerprint
and a processor which stores the fingerprint database and software
which compares and matches the fingerprint to the predefined database.
Within the database, a fingerprint is usually matched to a reference
number, or PIN number which is then matched to a person.s name or
account.
In instances of security the match is generally used to allow or disallowaccess, but today this can also be used for something as simple as a time
clock or payroll access.
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 16/20
Integrated security processing A high-performance network-security processing IC will provide the
necessary form factor and cost to be integrated into enterprise
communication equipment and access equipment.
Although the number of simultaneous tunnels and maximumthroughput for each tunnel is an important factor, the time to create and
tear down tunnels will become a major issue as the number of tunnels
for branch-to-branch and remote access increases.
The integration of symmetric data encryption and asymmetric tunnel-
negotiation algorithms on a single device provides a flexible solution .
CRASH that is now being designed demands a security processing
solution that is programmable, scaleable, and high performance .
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 17/20
We maintain automations such that
´Machines Maintain secretsµ ADVANTAGES:
VERY EASY AND QUICK TO BE ACCCESSED.
MACHINES MAINTAIN SECRETS
NO NEED OF PASSWORDS OR ANY KEYS TO ACCESS AN ACCOUNT
WHICH IS APPLICABLE TO THE ILLITERATES(POOR PEOPLE). IT SAVES NEARLY 300 CRORES CORRUPTED PER YEAR.
IMPLEMENTATION COST IS CHEAP.
STOCKS MAINTANENCE WILL BE EASY ANDTRANSPERANT.ENORMOUSLY LARGE QUEUES IN RATION SHOPS ARE
AVOIDED.
MAKING THE FINGERPRINT AS THE KEY TO ENCRYPT THEIR REAL
CODES. LAST BUT NOT THE LEAST,THE MATERIALS ALLOTED BY THE
GOVERNMENT DIRECTLY GOES TO THE PUBLIC.
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 18/20
We feed the Unfed««.
OUR SYSTEM ELIMINATES THE FOLLOWING:
AVOIDS CORRUPTION BY REPUTED PEOPLE SINCE THE ACCOUNTS MANAGER OR THE SOFTWARE CODER CANNOT
ACCESS ANOTHER USER¶S ACCOUNT.
MAINTAINS THE RIGHT AMOUNT OF THINGS GIVEN TO THE RIGHT CATEGORY OF PEOPLE.
AVOIDS VENDORS SELLING THINGS OUTSIDE AT HIGHER
COST.
AVOIDS RATION GOODS GET SOLD IN THE BLACK MARKET.
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 19/20
VISION DEDICATED TO OUR PRESIDENT¶S
³EMPOWERED NATION BY 2020´
WE FEED THE UNFED««.WE FEEL THAT THIS
CRASH SYSTEM MIGHT ADD TO THE STEPS WHICH
DR.A.P.J.ABDUL KALAM FEELS TO MAKE OUR
NATION A DEVELOPED ONE BY 2020.
8/8/2019 Crash Antony
http://slidepdf.com/reader/full/crash-antony 20/20
Queries«
?