Documente Academic
Documente Profesional
Documente Cultură
for Inter-organization
Communication
Pilla Dinesh
Under the guidance of
K. Vamsee Krishna
Sreenidhi Institute of Science and Technology
Abstract
This research was completely a novel approach involving
image processing as well as basic cryptography.
With the advent of technology and complex processing end
systems, the attackers are decrypting the encrypted messages
in a stipulated time.
To avoid that situation, we use image as a key to encrypt the
message and also a time server to limit the data exposure for a
certain amount of time.
Problem
We are estimating that 2048-RSA algorithm will survive up to
2020.
-RSA Security LLC
If this is the case one or the other time the legal information will
fall in the false hands.
Existing system
The system use an asset like an RSA token for
authentication in banking and to connect to VPNs.
The system uses external certificates for additional
security.
Proposed System
The proposed system requires image Data Base (File System in our case).
Time Extraction is used to extract a number that provides the relaxation for the
decryption.
Both these properties are used to select an image and the properties of the images
System Architecture
(Key Generation using Image DB for Inter-organization Communication)
From the Server time the numbers were collected in the same
order leaving the others from half part of the minutes as
follows 57159150517174, which helps in providing the
relaxation time for decrypting the text.
Now manipulate the data in such a way that it will produce a
7-digit decimal number.
The example of the unique number that is generated from the
UNG algorithm
The Unique number generated with the Time server with the IP
129.6.15.30 is as follows:
6233089
Key Generation
The image serves as the source for the key generation and the
and all the nine properties are calculated for each and every
pixel in the image and the order of the services is generated by
the time extraction algorithm.
The size of the property extracted using the image is 8 bit and
hence the size of the key is 8 bits and number of keys is as
follows
size of the image number of properties extracted using the image
Complexity Analysis
The complexity of the algorithm lies in two areas first one is
the complexity in calculating the keys from the image and the
other is the encryption algorithm used in this algorithm the
complexity is as follows:
9*O(P)+O(C)
Where P is the number of pixels in the image and C is the
number of characters present on the image.
Conditions
The image database must be exchanged in person.
The max and min time to decrypt is
Max time : 20min execution time to encrypt.
Min time : 10min
Hardware Requirements
Operating systems: Windows XP
RAM: 1 GB
Processor : Intel Atom processor 1.6GHZ
Programming language: JDK 1.8
Other requirements: Image database
Any
Queries?