Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxx
A dissertation submitted in the partial fulfillment of the requirement
for the award of the degree of
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
Submitted by
XXXXXXX
Regn. No: XXXXXX
May 2013
BONAFIDE CERTIFICATE
Certified that this project work entitled xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx is the bonafide work of xxxxxxx (Reg.No.xxxxxx) who carried out
the research under my supervision. Certified further, that to the best of my knowledge the
work reporting herein does not form part of any other project report or dissertation on the
basis of which a degree or award was conferred on an earlier occasion on this or any other
candidate.
xxxxxxxxxxxxxxxxxxxxxxxxxxx
Assistant Professor
Project Guide
SRM University, NCR Campus
Modinagar
Internal Examiner
xxxxxxxxxxxxxxxxxxxxxxxxxx
Head of the Department
SRM University, NCR Campus
Modinagar
External Examiner
Acknowledgement
I feel an immense amount of pleasure in submitting this project report on xxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxx
as
partial
fulfillment for the award of the Degree of B.Tech in Information technology. The satisfaction
and euphoria that accompany the successful completion of any project would be incomplete
without a mention of people who made it possible and whose constant guidance and
encouragement crown all the efforts.
First and foremost, I would like to express my sincere gratitude to my advisor, xxx xxxxxx
xxxxxxxxxxxxxxxxxxxx for his invaluable guidance and cooperation throughout the work.
His constant encouragement and vision enabled me to take this new endeavor to the success
path.
I would like to express my hearty gratitude to Dr. Manoj Kumar Pandey, Director, SRM
University, NCR Campus, Ghaziabad for his support and encouragement throughout the
work and for providing the suitable environment to carry out the work.
I feel compelled to articulate my thankfulness to Mr Madan kumar, HOD, Department of
Information technology, SRM University for his encouragement which was a source of
inspiration.
I am also extend my heartfelt gratitude to Mr Dinesh Kumar, Project Coordinator, whose
constant motivation and support made me enthusiastic throughout the work.
In the last but not least I am indebted to all the teaching and non-teaching staff members of
our college for helping me directly or indirectly by all means throughout the course of my
study and project work.
Declaration
I, xxxxxxxxx (Reg.No.xxxxxxxxxxx) hereby declare that the work which is being presented
in the dissertation xxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx is the
record of authentic work carried out by me under the supervision of
Mr.
in Information
Technology. This work has not been submitted to any other University or Institute for the
award of any Degree/Diploma.
xxxxxxxxxxxxx
Abstract
The basic concept of providing the data to the user should be based on the key management
such as in electronic subscription and pay channel systems. The cryptographic keys are
access according to access the information. The key management scheme so that a higher
class can retrieve data content that a lower class is authorized to access, but not in vice-versa.
The time bound is accessed for the user with access the information for a particular period of
time. The user key can be updated periodically. This schemes causes the computational load
and implementation cost.
In the proposed system, we are keeping the master key as a secret so that data should be
organized and then it should be broadcast to the users providing them with some privileges
and the data are to be stored in the Tamper-Resistant Devices. It should be managed in
efficient way by using Elliptical curve cryptographic key algorithms.
An ideal time-bound key management scheme should be able to perform the task in an
efficient fashion and minimize the storage and communication of keys. Elliptic-Curve
Cryptography (ECC) is deployed in this scheme to overcome large computational load, high
implementation cost and also enhance security and efficiency. The secret key can be changed
for the subscribers by the request to the providers. The counter measures against that
collision attack. So, the data are encoded and it sends to the broadcast. The users can change
the secret keys and update the master key by the vendors that off line attackers cannot to
perform these operations.
TABLE OF CONTENTS
Contents
Page no.
Abstract
Contents
vi
List of figures
viii
ix
1. Introduction
1.1TamperResistantDevices
2. Basics of Cryptography
3
4
3. Literature Survey
4. System Study
9
14
14
14
15
5. Description of modules
15
17
17
18
20
21
6. Algorithm Used
6.1 Elliptic Curve Cryptography (ECC)
7. System Design
7.1 Data Flow Diagram
24
25
25
27
27
27
28
7.1.3 1-Level DFD for Client Registration under normal ECC Server
29
30
7.1.5 1-Level DFD for Client Registration under Enhanced ECC Server
31
8. Implementation
32
32
36
9. Results
41
67
68
11.1 Conclusion
68
68
References
LIST OF FIGURES
Figure
Figure Name
Page no.
2.2
4.3
15
5.1
17
5.2
19
5.3
21
5.4
22
5.5
24
7.1.1
27
7.1.2
28
7.1.3
29
7.1.4
30
7.1.5
31
8.1
32
Website: www.gbu.ac.in
Website: www.theCommune.info