bca final year projects in asp.net free download
BACK END - SQL SEVER 2007
MCA FINAL YEAR PROJECT Project SYNOPSIS OF ONLINE EXAMINATION SYSTEM
Final Report Of Online Examination System with full Documentation
SYNOPSIS of Project Sanatorium (Hospital Information System)
Click here to download Final report of project Hospital Information System
BCA Project 3# ONLINE AUCTION SYSTEM
FRONTEND
- C # AND .NET FRAMEWORK
BACKEND
- SQL
SERVER 2008
SYNOPSIS OF PROJECT ONLINE
AUCTION SYSTEM
FINAL REPORT WITH FULL DOCUMENTATION and SOURCE CODE OF
PROJECT ONLINE AUCTION SYSTEM
CRYPTOGRAPHY
Cryptography is the science of writing in
secret code and is an ancient art Cryptography has a long and colorful history.
It can reformat and transform your data, making it safer on its trip between
computers. Cryptography is not only the means of providing information
security, but rather one set of techniques. Crypto techniques give the right
balance of communication capabilities and security protection. Cryptography
allows people to carry over the confidence found in the physical world to the
electronic world. In data and telecommunications, cryptography is necessary
when communicating over any non trusted medium, which includes just about any
network, particularly the Internet.
Within the context of any
application-to-application communication, there are some specific security
requirements, including:
Authentication: The process of
proving one's identity.
Privacy/confidentiality: Ensuring
that no one can read the message except the intended receiver.
Integrity:
Assuring the receiver that the received message has not been altered in any way
from the original.
Non-repudiation:
A mechanism to prove that the sender really sent
this message.
Cryptography, then,
not only protects data from theft or alteration, but can also be used for user
authentication. There are, in general, three types of cryptographic schemes
typically used to accomplish these goals: secret key (or symmetric) cryptography,
public-key (or asymmetric) cryptography, and hash functions, each of which is
described below. In all cases, the initial unencrypted data is referred to as plaintext.
It is encrypted into cipher text, which will in turn (usually) be
decrypted into usable plaintext.
The following is
done, firstly
GENERATION: This part deals
with the generation of CRC for the
Actual Data. The CRC generated is stored back with the Actual Data.
VERIFICATION: At the receiving
end the CRC is calculated for the received data and then compared with the CRC
of the Actual Data. The CRC values of both the data, if match, then the data is
accepted by the receiver else it is rejected indicating that the data is
corrupted.
COMPRESSION: It compresses or packs the data in
order to reduce the file size. We shall compress the .Actual Data & the CRC
together and then transmitted. Compression in turn also leads to the automatic
Encryption of the Actual Data & CRC.
DE-COMPRESSION: The receiver receives the compressed file and performs the
decompression process in order to retrieve the actual sized file. A new file is
created that contains the CRC and the Actual Data.
EMBED: The compressed data & CRC file is appended (embed) to the end
of the image file without affecting the image data or the header information of
that image. The software stores the data in a format that is not recognizable
even when viewed from a text or document editor.
DE-EMBED: At the receiving end the module identify the location of the data
picks up the size of the file, filename and reads the data to the length of the
data file and regenerate the text file that was embedded with in the image
file.
The system deals with security during transmission of data. Commonly
used technology is cryptography. This system deals with implementing
security-using steganography.
In this technology, the
end user identifies an image which is going to act as the carrier of data. The
data file is also selected and then to achieve greater speed of transmission
the data file and image file are compressed and sent. Prior to this the data is
embedded into the image and then sent. The image if hacked or interpreted by a
third party user will open up in any image previewer but not displaying the
data. This protects the data from being invisible and hence be secure during
transmission. The user in the receiving end uses another piece of code to
retrieve the data from the image.
Steganography is the art and science of hiding that communication is
happening. Classical steganography systems depend on keeping the encoding
system secret, but modern steganography is detectable only if secret
information is known, e.g. a secret key. Because of their invasive nature,
steganography systems leave detectable traces within a medium's
characteristics. This allows an eavesdropper to detect media that has been
modified, revealing that secret communication is taking place. Although the
secrecy of the information is not degraded, its hidden nature is revealed,
defeating the main purpose of Steganography.
For JPEG
images, Outguess preserves statistics based on frequency counts. As a result,
statistical tests based on frequency counts are unable to detect the presence
of steganographic content. Before embedding data into an image, Outguess can
determine the maximum message size that can be hidden while still being able to
maintain statistics based on frequency counts.
Outguess
uses generic iterators object to select which bits in the data should be
modified. A seed can be used to modify the behavior of the iterator. It is
embedded in the data along with the rest of the message. By altering the seed,
OutGuess tries to find a sequence of bits that minimizes the number of changes
in the data that have to be made.
Compression reduces the average code length used to represent the
symbols of an alphabet. Symbols of the source alphabet which occur frequently
are assigned with short length codes. The general strategy is to allow the code
length to vary from character to character and to ensure that the frequently
occurring character have shorter codes.
CRCSET is an
anti-virus utility. Its purpose is to
protect programs from third parties manipulation .CRC set is the most effective
weapons against computer viruses. This the Cyclic Redundancy Check, or CRC, is
an error-checking algorithm used in many types of computer operations,
especially in data transfer.
Before
transmitting the data, the utility want to calculate the CRC value and attach
with data. In receiving end, the CRC is recalculated and based on that
calculated value, it will specify the acceptance or rejection.
TYPES OF CRYPTOGRAPHIC ALGORITHMS
There are several ways of
classifying cryptographic algorithms. For purposes of this paper, they will be
categorized based on the number of keys that are employed for encryption and
decryption, and further defined by their application and use. The three types
of algorithms that will be discussed are (Figure 1):
·
Secret Key Cryptography (SKC):
Uses a single key for both encryption and decryption
·
Public Key Cryptography (PKC):
Uses one key for encryption and another for decryption
·
Hash Functions: Uses a mathematical
transformation to irreversibly "encrypt" information
STEGANOGRAPHY
"Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to Cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second message present".
In a digital world, Steganography and
Cryptography are both intended to protect information from unwanted parties.
Both Steganography and Cryptography are excellent means by which to accomplish
this but neither technology alone is perfect and both can be broken. It is for
this reason that most experts would suggest using both to add multiple layers
of security.
Steganography can be used in a large
amount of data formats in the digital world of today. The most popular data
formats used are .bmp, .doc, .gif, .jpeg, .mp3, .txt and .wav.
Mainly because of their popularity on the
Internet and the ease of use of the steganographic tools that use these data
formats. These formats are also popular because of the relative ease by which
redundant or noisy data can be removed from them and replaced with a hidden
message.
Steganographic technologies are a very important part of the future
of Internet security and privacy on open systems such as the Internet.
Steganographic research is primarily driven by the lack of strength in the
cryptographic systems on their own and the desire to have complete secrecy in
open-systems environment. This menu consists of the following submenu content.
§
Embed
§
Deem bed
EMBED
This process plays the
vital role in the steganography part. Here the package accepts the Image file
name and Data file name from the user. The important point to be noted is, the
image file must be the JPEG or BMP format, the data file must be in the
compressed format (i.e., .CMP extension).
The package embed the compressed Data file with the
Image file specified by the user, in such a way that the image will not be
distributed after the embed process. The embedding process is graphically
simulated with the help of progress bar.
DE EMBED
This process plays an alternate role against the embed. Here the
package accepts the Image file name that present in the system. The important
point to be noted is, the Image file format must be JPEG or BMP format. The
process should checks for the presence of data, if the presence of data is
identified, then the process request the path of the destination file (i.e.,
Data file with .CMP extension) for the retrieval of data from the Image file.
Here all the process is graphically simulated with the help of progress bar.
EXISTING SYSTEM
In today’s dynamic and information rich environment, information
systems have become vital for any organization to survive. With the increase in
the dependence of the organization on the information system, there exists an
opportunity for the competitive organizations and disruptive forces to gain
access to other organizations information system. This hostile environment makes
information systems security issues critical to an organization. Current
information security literature either focuses on anecdotal information by
describing the information security attacks taking place in the world or it
comprises of the technical literature describing the types of security threats
and the possible security systems.
In order to secure the transmission of
data, Cryptography has to be implemented. Cryptography is the science of
devising methods that allow information to be sent in a secure form in such a
way that the only person able to retrieve this information is intended
recipient.
The
basic principle is this
A message being
sent is known as plaintext. The message is then coded using a cryptographic
algorithm. This process is called encryption, an encrypted message is known as
cipher text, and is turned back into plaintext by the process of decryption.
Encryption can be done using symmetric or asymmetric algorithms. In symmetric
algorithms only one key is used both to encrypt and decrypt the message. In
asymmetric algorithms, a key used to encrypt a message is different from the
key that is used to decrypt the message. There are several algorithms present
in the market for Cryptography. Some of
the commonly used once are Idea A, RSA and Glow fish that1 involves asymmetric
or symmetric methods and also involves private and public keys.
PROPOSED SYSTEM
The algorithms present in the existing system were some what
complicated. In Cryptography, the
meaning of data has been changed. So, it makes intention to the hacker to hack
or destroy the data. In our proposed system, we implement a new technology
called Stenography for Network security. It not only changes the meaning of data
but also hides the presence of data from the hackers.
Steganography is not actually a method of
encrypting messages, but hiding them within something else to enable them to
pass undetected. Traditionally this was achieved with invisible ink, microfilm
or taking the first letter from each word of a message. This is now achieved by
hiding the message within a graphics or sound file. For instance in a
256-greyscale image, if the least significant bit of each byte is replaced with
a bit from the message then the result will be indistinguishable to the human
eye. An eavesdropper will not even realize a message is being sent. This is not
cryptography however, and although it would fool a human, a computer would be
able to detect this very quickly and reproduce the original message.
In the case of using this technique of hiding the
data with an image file, the visibility of the image, resolution or clarity is
not being affected. The hidden data can be of length in size. To the Hacker,
only the image is make going to be visible when previewed and not a trace of
the hidden data.
If the image file is opened across a text editor, then also the data is not going to be visible as the information is stored in an encryption form, which is also binary. Hence making it difficult for the enclosure to differentiate the data to the image file.
ADVANTAGES
·
The main advantage
is we can provide seurity to data with multiple levels of security .
·
We can embed huge volumes of data with modern Steganography.
·
The hacker would
not know the presence of the confidential data inside the image being
transmitted in the first place.
·
Even if he
identifies it, we would not know that the data had been compressed.
·
Even if he
identifies the presence of compression, he would find the data as encrypted.
·
Even if he does
decrypt the data, he would not know the presence of CRC inside the data.
·
Even if he
identifies its presence he would not know which part of data is the Actual data
and which is CRC and would tamper the data.
·
The tampered data
on the receiving end would not have its CRC match with the CRC of the original
data. And the user rejects it.
·
Both Steganography and
Cryptography are excellent means by which to accomplish this but neither
technology alone is perfect and both can be broken. It is for this reason that
most experts would suggest using both to add multiple layers of security.
· Last but not least we can share huge volumes data through this system which is very advantageous.
The
system deals with providing an easy and secures files transmissions across
the network. The
data is encrypted and embedded with any container file and transmitted through
the network. At the receiving end the data is de-embedded, decrypted and
displayed.
The application can now be used in any organization that uses networks. The type of the network or protocol will not affect the application.Thus, this entire process of hacking the data becomes time-consuming and a menace to the hack. Therefore, defeating the entire purpose of hacking and hence making data transmission more secure.
No comments:
Post a Comment