Sei sulla pagina 1di 9

A Project Report on

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxx
A dissertation submitted in the partial fulfillment of the requirement
for the award of the degree of
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
Submitted by
XXXXXXX
Regn. No: XXXXXX

Under the guidance of


XXXXXXXXXXXXX
Assistant Professor
Department of Information technology

May 2013

DEPARTMENT OF INFORMATION TECHNOLOGY


SRM UNIVERSITY, NCR CAMPUS, MODINAGAR-201204
GHAZIABAD, UTTAR PRADESH

BONAFIDE CERTIFICATE
Certified that this project work entitled xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx is the bonafide work of xxxxxxx (Reg.No.xxxxxx) who carried out
the research under my supervision. Certified further, that to the best of my knowledge the
work reporting herein does not form part of any other project report or dissertation on the
basis of which a degree or award was conferred on an earlier occasion on this or any other
candidate.

xxxxxxxxxxxxxxxxxxxxxxxxxxx
Assistant Professor
Project Guide
SRM University, NCR Campus
Modinagar

Internal Examiner

xxxxxxxxxxxxxxxxxxxxxxxxxx
Head of the Department
SRM University, NCR Campus
Modinagar

External Examiner

Acknowledgement
I feel an immense amount of pleasure in submitting this project report on xxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxx

as

partial

fulfillment for the award of the Degree of B.Tech in Information technology. The satisfaction
and euphoria that accompany the successful completion of any project would be incomplete
without a mention of people who made it possible and whose constant guidance and
encouragement crown all the efforts.
First and foremost, I would like to express my sincere gratitude to my advisor, xxx xxxxxx
xxxxxxxxxxxxxxxxxxxx for his invaluable guidance and cooperation throughout the work.
His constant encouragement and vision enabled me to take this new endeavor to the success
path.
I would like to express my hearty gratitude to Dr. Manoj Kumar Pandey, Director, SRM
University, NCR Campus, Ghaziabad for his support and encouragement throughout the
work and for providing the suitable environment to carry out the work.
I feel compelled to articulate my thankfulness to Mr Madan kumar, HOD, Department of
Information technology, SRM University for his encouragement which was a source of
inspiration.
I am also extend my heartfelt gratitude to Mr Dinesh Kumar, Project Coordinator, whose
constant motivation and support made me enthusiastic throughout the work.
In the last but not least I am indebted to all the teaching and non-teaching staff members of
our college for helping me directly or indirectly by all means throughout the course of my
study and project work.

Declaration
I, xxxxxxxxx (Reg.No.xxxxxxxxxxx) hereby declare that the work which is being presented
in the dissertation xxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx is the
record of authentic work carried out by me under the supervision of

Mr.

xxxxxxxxxxxxxxxxxxxxxxxxx in the Department of Information Technology, SRM


University, NCR Campus, Modinagar, Ghaziabad(UP) and submitted in the partial
fulfillment for the award of the degree of bachelor of Technology

in Information

Technology. This work has not been submitted to any other University or Institute for the
award of any Degree/Diploma.

xxxxxxxxxxxxx

Abstract
The basic concept of providing the data to the user should be based on the key management
such as in electronic subscription and pay channel systems. The cryptographic keys are
access according to access the information. The key management scheme so that a higher
class can retrieve data content that a lower class is authorized to access, but not in vice-versa.
The time bound is accessed for the user with access the information for a particular period of
time. The user key can be updated periodically. This schemes causes the computational load
and implementation cost.
In the proposed system, we are keeping the master key as a secret so that data should be
organized and then it should be broadcast to the users providing them with some privileges
and the data are to be stored in the Tamper-Resistant Devices. It should be managed in
efficient way by using Elliptical curve cryptographic key algorithms.
An ideal time-bound key management scheme should be able to perform the task in an
efficient fashion and minimize the storage and communication of keys. Elliptic-Curve
Cryptography (ECC) is deployed in this scheme to overcome large computational load, high
implementation cost and also enhance security and efficiency. The secret key can be changed
for the subscribers by the request to the providers. The counter measures against that
collision attack. So, the data are encoded and it sends to the broadcast. The users can change
the secret keys and update the master key by the vendors that off line attackers cannot to
perform these operations.

TABLE OF CONTENTS
Contents

Page no.

Abstract

Contents

vi

List of figures

viii

Publication Related to thesis work

ix

1. Introduction

1.1TamperResistantDevices

2. Basics of Cryptography

3
4

2.1 Purpose of Cryptography

2.2 Types of Cryptographic Algorithms

2.2.1 Symmetric key cryptography

2.2.2 Public key cryptography

2.2.3 Hash Functions

3. Literature Survey
4. System Study

9
14

4.1 Issues in the Previous Work

14

4.2 Existing Work

14

4.3 Proposed Work

15

4.3.1 Advantages of Proposed Work

5. Description of modules

15
17

5.1 Server working with Normal ECC Mode

17

5.2 Client Registration under normal ECC Server

18

5.3 Server working with Enhanced ECC Mode

20

5.4 Client Registration under Enhanced ECC Server

21

5.5 Overall Block Diagram

6. Algorithm Used
6.1 Elliptic Curve Cryptography (ECC)

7. System Design
7.1 Data Flow Diagram

24
25
25
27
27

7.1.1 Context Flow Diagram

27

7.1.2 1-Level DFD for Server working with Normal ECC

28

7.1.3 1-Level DFD for Client Registration under normal ECC Server

29

7.1.4 1-Level DFD for Server working with Enhanced ECC

30

7.1.5 1-Level DFD for Client Registration under Enhanced ECC Server

31

8. Implementation

32

8.1 Overall Implementation Design

32

8.2 Sample Code

36

9. Results

41

10. System Requirements

67

11. Conclusion and Future Work

68

11.1 Conclusion

68

11.2 Future work

68

References

LIST OF FIGURES
Figure

Figure Name

Page no.

2.2

Three types of Cryptographic algorithms

4.3

Enhanced working model

15

5.1

Server working with Normal ECC

17

5.2

Client Registration under normal ECC Server

19

5.3

Server working with Enhanced ECC Mode

21

5.4

Client Registration under Enhanced ECC Server

22

5.5

Overall Block Diagram

24

7.1.1

Context Flow Diagram

27

7.1.2

DFD for Server working with Normal ECC

28

7.1.3

DFD for Client Registration under normal ECC Server

29

7.1.4

DFD for Server working with Enhanced ECC Mode

30

7.1.5

DFD for Client Registration under Enhanced ECC Server

31

8.1

Overall Implementation Design

32

PUBLICATION RELATED TO THESIS WORK

xxxxxxxxxxxxxxx, Huffman Based Lossless Compression For Dental X-Ray Images,


Commune CACCS 2011, National Conference on Advancements in Communication,
Computing and Signal Processing, 16-17 April, 2011,(issn 451-214-36) School of
Information & Communication Technology, Gautam Buddha University, Greater Noida
(UP), Commune CACSS.

Website: www.gbu.ac.in
Website: www.theCommune.info

Potrebbero piacerti anche