synopsis for final project
TRANSCRIPT
![Page 1: Synopsis for Final Project](https://reader036.vdocuments.us/reader036/viewer/2022071719/577cc9b91a28aba711a46ef3/html5/thumbnails/1.jpg)
INTRODUCTION TO SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY
The Domain Name System(DNS) has become a critical operational part of the Internet
Infrastructure, yet it has no strong security mechanisms to assure Data Integrity or
Authentication. Extensions to the DNS are described that provide these services to security
aware resolves are applications through the use of Cryptographic Digital Signatures. These
Digital Signatures are included zones as resource records.
The extensions also provide for the storage of Authenticated Public keys in the DNS.
This storage of keys can support general Public key distribution services as well as DNS
security. These stored keys enables security aware resolvers to learn the authenticating key
of zones, in addition to those for which they are initially configured. Keys associated with
DNS names can be retrieved to support other protocols. In addition, the security extensions
provide for the Authentication of DNS protocol transactions.
Department of Computer Science & Engineering
![Page 2: Synopsis for Final Project](https://reader036.vdocuments.us/reader036/viewer/2022071719/577cc9b91a28aba711a46ef3/html5/thumbnails/2.jpg)
PROJECT DESCRIPTION
The DNS Security is designed to provide security by combining the concept of both the
Digital Signature and Asymmetric key (Public key) Cryptography. Here the Public key is
send instead of Private key. The DNS security uses Message Digest Algorithm to compress
the Message(text file) and PRNG(Pseudo Random Number Generator) Algorithm for
generating Public and Private key. The message combines with the Private key to form a
Signature using DSA Algorithm, which is send along with the Public key.
The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature
matches with the Signature of the message received, the message is Decrypted and read
else discarded.
EXISTING SYSTEM The existing system is manually maintained.
It uses RSA Algorithm for key generation.
Since it uses RSA Algorithm it is necessary to provide two Prime numbers to generate Key Pair which results in Mathematical and Brute force attack.
It sends the Private key through the Network.
Time consumption
Low reliability
DISADVANTAGES OF EXISTING SYSTEM Error prone
Less operational speed
Low speed communication
Department of Computer Science & Engineering
![Page 3: Synopsis for Final Project](https://reader036.vdocuments.us/reader036/viewer/2022071719/577cc9b91a28aba711a46ef3/html5/thumbnails/3.jpg)
The Following function avoids the pitfalls of the existing system
Fast and efficient work Ease of access to system Manual Effort is reduced
ADVANTAGES OF THE SYSTEM
They are not limited to 1024 bits like DSA They can use hash longer than 160 bits.
Department of Computer Science & Engineering
![Page 4: Synopsis for Final Project](https://reader036.vdocuments.us/reader036/viewer/2022071719/577cc9b91a28aba711a46ef3/html5/thumbnails/4.jpg)
TESTING
Software Testing is a process of executing program within the intent of finding an error.
Software testing is a critical element of software quality assurance and represents The
ultimate review of system specification, design, coding. Testing is last chance to uncover
the error defects in the software and facilities delivery of quality system,
TESTING PRINCIPLES
The basic principles for effective software testing are follows:
A good test case is the one that has a high probability of finding an as –yet
undiscovered error.
A successful test is one that uncovers an as-yet undiscovered Error.
All tests should net race able to the customer requirements.
Tests should be planned long before testing begins.
Testing should begin in the small “and progress towards testing “in the large.
Exhaustive testing is not possible
SYSTEM TESTING REQUIREMENT
Software testing is not an activity to take up when the product is ready. An effective testing
begins with a proper plan forms the user requirement stage itself. Software testability is
the case with which a computer program is tested. Metrics can be used to measure the
testability of a product.
Department of Computer Science & Engineering
![Page 5: Synopsis for Final Project](https://reader036.vdocuments.us/reader036/viewer/2022071719/577cc9b91a28aba711a46ef3/html5/thumbnails/5.jpg)
PHASES OF THE TESTING
Several testing strategies and lead to the following generic characteristics:
Testing begins then unit level and works “outward” toward the integration of the
entire system.
Different testing techniques are appropriate at different points of software
development cycle.
UNIT TESTING
System security refers to the technical innovations and procedure applied to the hardware
and operating system to product against deliberate or accidental damage. Data security
refers to the protection of data from loss, disclosure, modification and distraction. Privacy
defines the rights of the users or organization to determine what information they willing
to share with others and protect the information to minimize the possible invasion of
privacy. To achieve all the above objectives.
Department of Computer Science & Engineering
![Page 6: Synopsis for Final Project](https://reader036.vdocuments.us/reader036/viewer/2022071719/577cc9b91a28aba711a46ef3/html5/thumbnails/6.jpg)
4.1 HARDWARE ENVIRONMENT
The minimum configuration required to run this project are:
1. Main processor : Pentium III (or) IV
2. RAM : 128MB
3. Hard Disk : 4.2GB
4. Clock Speed : 550 MHZ
5. System Bus Speed : 400 MHz
6. Cache RAM : 256 KB
4.2 SOFTWARE ENVIRONMENT
Language : JDK1.3 (or) Higher.
Front End Design : Swings
Operating System : Windows
Department of Computer Science & Engineering
![Page 7: Synopsis for Final Project](https://reader036.vdocuments.us/reader036/viewer/2022071719/577cc9b91a28aba711a46ef3/html5/thumbnails/7.jpg)
REFERENCES
Computer Networks by Tanenbaum Java 2: The Complete Reference, Fifth Edition (Paperback) by Herbert Schildt “. Java Unleashed (Unleashed S.) by Michael Morrison. Java 2 Bible by Justin Couch and Daniel H. Steinberg
Department of Computer Science & Engineering