Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
15-10-2010, 01:17 PM

.ppt   L1.ppt (Size: 63 KB / Downloads: 91)

Overview of Cryptography & Its Applications

People wants and needs privacy and security while communicating
In the past, cryptography is heavily used for military applications to keep sensitive information secret from enemies (adversaries). Julius Caesar used a simple shift cipher to communicate with his generals in the battlefield.
Nowadays, with the technologic progress as our dependency on electronic systems has increased we need more sophisticated techniques.
Cryptography provides most of the methods and techniques for a secure communication.
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
05-03-2011, 02:05 PM

.doc   Application of Cryptography for Military Application.doc (Size: 32 KB / Downloads: 60)
Wireless Data security using cryptography for Military applications.
We are developing this system to make our Military systems more secured using cryptography. Our system will have 3 kits.(1. Base Station, 2.Remote Station, 3. Un-authorised system)
Un-authorised system is designed to give better explanation of our task.
We are using cryptography to make secure wireless data communication between two military stations.
Data will be given from PC and controller will send it to our remote station, The transmission will be done using encrypted data. That data will be decrypted at the remote station, unauthorized system will not be able to decrypt the transmitted data.
Data transmission is done using Wireless Rf Transceiver.
Block diagram:
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
16-03-2011, 11:42 AM

.doc   synopsis_of_data_security.doc (Size: 50.5 KB / Downloads: 42)

In recent years, the importance of security in the information technology has increased significantly. To guarantee confidentiality and authenticity of information, there are software and hardware oriented algorithms. In addition to software solutions, hardware could be realized to increase security requirements. Naturally, hardware modules offer higher protection against unauthorized manipulations than software. In addition, they lead to higher processing speeds, which allow high speed applications. Compared to software and ASIC designs, FPGA platforms create a good compromise between high performance and maintaining the capability of reconfiguration.
The hardware implementations of resource protection schemes are significantly faster than their software realizations. Further, they are not affected by malicious tasks as is the case with software approach. This work proposes the development of hardware architecture for data and resource security using authenticated semaphore switching algorithms, design and on-chip hardware implementations. The algorithm and the architecture of the components are proposed to be designed and coded in Verilog, a popular Hardware Design Language (HDL).
The complete architecture is to be first coded in MATLAB in order to understand the concepts and methodologies proposed. In the next phase, results are to be obtained using Verilog implementation.
Literature review
Computer security is severely threatened by software vulnerabilities, such as buffer overrun, format string etc. A low overhead, software-only information flow tracking system called LIFT [1] minimizes run-time overhead by exploiting dynamic binary instrumentation and optimizations for detecting various types of security attacks without requiring any hardware changes. More specifically, LIFT aggressively eliminates unnecessary dynamic information flow tracking.
Secure program via dynamic information flow tracking [2] is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows at run time and restricting the usage of spurious information. On every operation, a processor determines whether the result is spurious or not based on the inputs and the type of the operation. With the tracked information flows, the processor can easily check whether an
instruction or a branch target is spurious or not, which prevents changes of control flows by potentially malicious inputs and dynamic data generated from them.
The General information flow tracking (GIFT) [3] is for C programs that allows application specific tags with input data, instruments the application to propagate these tags to all the other data that are control / data-dependent on them and invokes application specific processor on output data according to their tag values.
Raksha [4] is architecture for software security based on dynamic information flow tracking (DIFT). Raksha provides three novel features that allow for a flexible hardware/ software approach to security. First, it supports flexible and programmable security policies that enable software to direct hardware analysis towards a wide range of high-level and low-level attacks. Second, it supports multiple active security policies that can protect the system against concurrent attacks. Third, it supports low-overhead security handlers that allow software to correct, complement, or extend the hardware-based analysis without the overhead associated with operating system traps.
Architecture for self-healing Databases under Cyber Attacks [5] proposes five different architectures, for self-healing databases under malicious attacks. While traditional secure database systems rely on prevention controls, a self-healing database system can automatically estimate, locate, isolate, contain and repair damage caused by attacks in such a way that the database can ‘heal’ itself on-the-fly and continue delivering essential services in the face of attacks. With a focus on attacks by malicious transactions, Architecture1 can detect intrusions and locate and repair the damage caused by the intrusions. Architecture2 enhances Architecture1 with the ability to isolate attacks so that the database can be immunized from the damage caused by a lot of attacks. Architecture 3 enhances Architecture1 with the ability to dynamically contain the damage in such a way that no damage will leak out during the attack recovery process. Architecture4 enhances Architecture2 and 3 with the ability to adapt the self healing controls to the changing environment so that a stabilized level of healthiness can be maintained. Architecture5 enhances Architecture4 with the ability to deliver differential, quantitative services to customers.
Existing hardware and software security systems focus on memory corruption attacks using a single, fixed security policy. In this approach, instead of tracking each and every data and channel, it is proposed to design the tasks or channels with malicious code to access only the virtual copy of the resource. And also emphasizing on using mutex, binary and counting semaphores depending on the required security level.
Need for the study
Recent developments in information system technologies have resulted in computerizing many applications in various business areas. Data has become a critical resource in many organizations and therefore, efficient access to data, sharing the data, extracting information from the data and making use of the information has become an urgent need.
In modern computing systems, data security is becoming increasingly important. Computers store tremendous amounts of sensitive information. Personal and business computers store private data such as tax information, banking information, and credit card numbers. Computers used for military applications store extremely sensitive information where confidentiality is critical. Since these computers are often connected to potentially hostile public networks, such as the Internet, security mechanisms to protect the confidentiality of this data are vital.
In recent years, the importance of security in the information technology has increased significantly. As computer resources are affected by malicious attacks, to guarantee confidentiality and authenticity of information, it is necessary to protect them from tasks that cause malicious attacks.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  orange data mining tool ppt jaseelati 0 192 07-01-2015, 01:58 PM
Last Post: jaseelati
  laser security system wikipedia jaseelati 0 983 01-01-2015, 04:22 PM
Last Post: jaseelati
  air force security using thumb checker jaseelati 0 344 27-12-2014, 04:01 PM
Last Post: jaseelati
  security using colors and armstrong numbers ppt jaseelati 0 270 27-12-2014, 03:33 PM
Last Post: jaseelati
Last Post: seminar project topic
  Introduction to 2G and 3G Data Communication Standards seminar projects maker 0 518 14-09-2013, 04:32 PM
Last Post: seminar projects maker
  Physical Layer Security over Wireless Channels seminar flower 2 857 31-08-2013, 09:22 AM
Last Post: study tips
Last Post: study tips
  Security Features of ATM Report study tips 0 670 24-08-2013, 02:40 PM
Last Post: study tips
  Automation using PLCs SCADA and Telemetry Process Control and Data Acquisition pdf study tips 0 501 13-08-2013, 04:56 PM
Last Post: study tips