Sei sulla pagina 1di 11

DREAM GOAL :

IMPLEMENTATION OF BIOMETRICS BASED SECURITY

SYSTEM - CRASH – WITH INTEGRATED TECHNIQUES OF

ENCAPSULATED NETWORKING

CAPTION: “WE MAKE ELECTRONICS REACH OUT TO SOCIETY”



AUTHORS : P. Soundar Rajan,
L.Maria Joseph Kingsley
OUTLOOK :
 OUR DREAM

 THE CREAM OF OUR DREAM

 THE ’SORRY’SURVEY

 THE DESIGN OF OUR PDS SYSTEM

 OVER VIEW OF CRASH


is it easy for every to log?

 INTEGRATED SECRITY PROCESSING

 A BRAND NEW “MULTI PHASE”SYSTEM

 SOFTWARE MAKE UP OF THE SYSTEM

 MINIATURING BIOMETRICS

 DIFFERIENTIATION FROM OTHER SYSTEM

 ADVANTAGES
THE CREAM OF OUR DREAM:

• This presentation deals with the service oriented dream of making technology reach out to society

•This algorithm also governs the full measure of ration rights to the fellow citizens through design of automated system

•Our main purpose through is for the bellow poverty line people to get their full measure of their ration duties

•We thrive to achieve this by means of a high network security concentrated over .here in this system by overcoming massive threats
such as fake thumb impressions, ration theft ,etc.,

• the design of a brand new algorithm that is designed in such a manner that over the vendor is clueless of how the code is accessed

A SORRY SURVEY:

•survey reveals 87% wheat and 94% rice SIPHONED OFF

•Survey revealed that out of a total of 182 families that we spoke to,142 families did not receives a single grain of
wheat during
month of June

•167 families did not receive a single grain of rice

•Out of a total of 4650 kgs of wheat supposed to have been distributed to the people, only595kgs had actually been
received by people

•The rest 87% found its way to the black market

•Out of total of 1820 kgs of rice supposed to have been distributed as per daily sales registered, only 110 kgs was
received by a people

•Balanced 94% was siphoned off


THE DESIGN OF THE PDS SYSTEM:
•The paper deals with the design of an automated system secured using public key cryption.

• the system encompasses authentication without passwords (performing either bar code reading or finger print
reading),a plotting technique
to avoid fake thumb impressions, integrating security proccessing,introduction of verification chamber that analysis
three categories(above
poverty line(APL), bellow poverty line(BPL) and antyodaya)which allows right rendered to a right citizen.

•To distort the influence of reputed corrupters, a brand new algorithm is design in such a manner that even the is clueless
of hoe to code is
accessed.

•We performed automation such that MACHINE MAINTAIN SECRETS.

•JavaScript implementations and hardware checking has been done for the analysis of encryption and decryption
techniques. the system's
the system’s usage is as easy as falling off a log and has to bar for the illiterates.

OVER VIEW OF CRASH:


 HOW CRASH WORKS:

• the details of the distribution are installed into the main system which is available in all the distribution networks
security by ENCAPTULATED IPSEC TECNOLOGY

• whenever the initial access is made the code corresponding to the user’s finger prints are set as default for the first time and saved
by the system more than one similar fingerprint are denied by the system

•The algorithm has been designed such that the three keys n,d,e &any msg converted into a cipher text can only accessed by n,d&n,e
key

•An outstanding feature of the system is that account manager or the software installer is unknown of the methods used access
another user code

•This has been established separated the code and assign to the value n,c,d, where c represented by cipher code

•The cipher code is converted by real code by using the keys n,d into which the user accounts is made

•Real code account manager cannot access another user accounts "we maintain automation such that machine maintain secrets”

•We find this a suitable methods to get rid of the most respected & reputed corrupted
INTEGRATING SECURITY SYSTEM PROCESSING:

• A high performance network-security processing IC will provided the necessary form factor and cost to be integrated into
enterprises communication equipment and access equipment

•The integration of symmetric data encryption and asymmetric tunnel –negotiation algorithms on a single device provides a
flexible solution.

•New devices with build –in flexible processing, combined with key management software ,will enable thousands of tunnels
to be set up and torn down on the fly

•A new class of network security processor optimized for the needs of the networks provided the mandatory performance and
flexible architecture

•CRASH that is now being design demands a security processing solution that is programmable,scaleable,and high
performance

•High performance can enable the same services


SOFT WARE MAKE UP OF THE SYSTEM:

• however if your at a loss for a random sequence considered a FIBBONACCI sequence ,using DWORD’s like encryption key as “seed”numbers.and possibly a
3rd DWORD as an ‘XOR’mask .

Unsigned long dw1,dw2,dw3,dwmask;

int i1;

unsigned long aRandom[256];

dw1={seed#1};

dw2={seed#2};

dwmask= {seed#3};

//this gives you 332-bits “seeds", or 96 bits total

for(i1=0;i1<256;i1++)

dw3=(dw1+dw2)^dwmask;

aRandom[i1]=dw3;

dw1=dw2;

dw2=dw3;

}
• if you wanted to generated a list of random sequence numbers, let's say between zero’s and the total number of random numbers in the
list/

Int_cdecl MySortProc(void *p1,void *p2)

Unsigned long **pp1=(unsigned long **)p1:

unsigned long **pp2=(unsigned long **)p2;

if (**pp1<**pp2)

return(-1);

else if (**pp1>*pp2)

return(1);

return(0);
}

………

int i1;

unsigned long *apRandom[256];

unsigned long aRandom[256];

int aResult[256];

for(i1=0;i1<256;i1++)
{

spRandom[i1]=aRandom+i1;

//now sort it

Qsort(apRandom,256,sizeof(*apRandom),MySortproc);

//final offset for pointer are placed into output array

for(i1=0;i1<256;i1++)

aResult[i1]=(int)(apRandom[i1]-aRandom);

The result in ‘aResult’ should be a randomly sorted array of integers with values between 0 and
255,inclusive
IMPLEMENTATION OF SECURITY ALGORITHM IN JAVASCRIPT:

import java.math.BigInteger:

import java.security.SecureRandom

Class Rsa

{
private BigInteger n,d,e;

public Rsa (int bitsecurelen)


{
SecureRandom r=new SecureRandom();

BigInteger p=new BigInteger(bitlen/2,100,r);

BigInteger q=new BigInteger(bitlen/2,100,r);

n=p.multiply(q);

BigInteger m=(p.subtract(BigInteger. ONE)).mutiply(q.subtract(bigInteger.ONE));

e=new BigInteger(“3”);

While(m.god(e).intvalue()>1)e=e.add(new BigInteger(“2”));

d=e.modInverse(m);
}
Public bigInteger decrypt(BigInteger message)
{
return message.modpow(e,n);
}
Public BigInteger decrypt(BigInteger message)
{
Return message.modpow(d,n);
}
MINIATURING BIOMETRICS

• A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that occur at miniature point

•Fingerprint scanning essentially provides an identification of a person based on the acquisition & recognition of those unique &
fingerprint

• this system comprise of a sensor for scanning a fingerprint and processor which stores fingerprint database&softwarewhich is
matches to the predefined database.

•Within database a fingerprint usually matches to a reference number & pin number which matches person name & account

•In instances of security matches is generally used to allow or disallow access, but today this can also be used for something as
simple as a time clock or payroll access

ADVANTAGES:

 very easy and quick access

 machines maintain secrets

 no need password and then uneducated people can also access

 low cost

Easy to transparent

Making the fingerprint encryption using realcodes


CONCULTION:

VISION DEDICATED TO OUR FORMER PRESIDENT’S

“EMPOWERED NATION BY 2020”

WE FEED THE UNFED…..WE FEEL THAT THIS CRASH SYSTEM MIGH


ADD TO THE STEPS WHICH DR.ABDULKALAM FEELS TO MAKE OUR
NATION A DEVELOPED ONE BY 2020

Potrebbero piacerti anche