Secure Communication With DNS Through Cloud
Secure Communication With DNS Through Cloud
Volume: 3 Issue: 6
ISSN: 2321-8169
3481 - 3486
_______________________________________________________________________________________________
Mohanesh B.M.
Assistant Professor
Computer Science And Engineering
The National Institute Of Engineering
Mysore-570008
Abstract: Internet in todays world has become one of the most prominent ways to communicate through text, voice, pictures, video and many
more ways. Millions of MB of data is exchanged over internet in a single day all over the world. And lots of those data is sensitive and private.
Thus internet provides as point to intrude in someones private life or intercept some sensitive data. With the increasing use of Smartphone, a big
amount of data is being stored and exchange through the application running on its operating system.
This have only increased the data exchange over the network. Thats why the importance of security over the exchange as well as storage of data
has increased dramatically over the past few years. For providing security many different methods or ways are taken. Over those methods use of
cryptography is one of the widely used methods.
Our application is designed to provide secure transmission of data like text or image over the network with the help of cryptographic algorithm.
This application can be easily run on the android operating Smartphone as well as the computer with other operating system. Through this
application the user can also encrypt the file or image and store it in the system memory as well as over the cloud and retrieve it whenever
needed.
__________________________________________________*****_________________________________________________
in RSA Algorithm, the length of keys used for both public
and private keys are usually kept greater than 1024 bits.
I.
CRYPTOGRAPHY
Consider two exponents, e and d where e is public and d is
private
and p being plaintext and c being ciphertext. Let us
Cryptography is the study of information hiding and
consider
the case where Alice has to send some message to
verification. The term cryptography is derived from the
Bob
by
RSA
algorithm, Alice uses public key to convert its
Greek words Kryptos which means hidden and
plaintext
to
ciphertext
i.e. c=p mod n. Likewise Bob uses
graphein which means to write or can be said the art of
his
private
key
to
invert
back the ciphertext to plaintext i.e.
hidden writing. The use of cryptography can date back to
p=c
mod
n.
Let
the
selected
prime numbers p, q be very
thousands of years of history. Communication between
kings was done by different cryptographic methods.
Cryptography emphases have evolved from linguistic to
other, with extensive use of technical areas of mathematics,
especially those areas collectively known as discrete
mathematics.
When information is transformed from useful form of
understanding to non-useful (opaque) way of understanding,
it is called encryption and inverting this data back to useful
message is called decryption. The person who has the
knowledge of certain secret piece can only decrypt the
message. This ensures the authorized use of message. The
secret piece/knowledge is called key. Hence we can say
cryptographic methods are used for secured communication.
II.
RSA ALGORITHM
Alic
e p
Bob
c= p mod n
p = c mod n
_______________________________________________________________________________________
ISSN: 2321-8169
3481 - 3486
_______________________________________________________________________________________________
are needed for generation of public and private key. In RSA,
V.
_______________________________________________________________________________________
ISSN: 2321-8169
3481 - 3486
_______________________________________________________________________________________________
they inbox and sentbox and old device id will be removed ,
this way security of data will be ensured after the device lost
or theft.
5.3 Hardware Requirements
Processor
: Pentium IV or above.
RAM: 512 MB RAM or more.
Hard Disk Space: Minimum of 1 GB.
5.4 Software Requirements
Operating System : Windows XP or above.
Language
: Java and J2EE
Java Software: JDK 1.6 or above.
: Eclipse , Android studio
VI.
FEASIBILITY STUDY
VII.
SYSTEM DESIGN
Compose a mail.
3484
IJRITCC | June 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
3481 - 3486
_______________________________________________________________________________________________
7.2 Activity Diagram
CONCLUSION
[1] Milan
Markovic,
Goran
Dordevic,
On
implementation Aspects of Standard Asymmetric
and Symmetric Cryptographic Algorithms on T1
Signal processors.
[2] F.Ayoub, K.Singh, Cryptographic techniques and
network security.
[3] Mohammad Zakir Hossain Sarkar, Md Shafir
Parvlz,a cost efficient symmetric key cryptographic
algorithm for small amount of data.
[4] Sean OMelia, Adam J. Elbirt, Enhancing the
Performance of Symmetric-Key Cryptography
via Instruction Set Extensions.
[5] HoWon Kim, Sunggu Lee, Design and
Implementation of a Private and Public Key Crypto
Processor and Its Application to a Security System.
3485
IJRITCC | June 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
3481 - 3486
_______________________________________________________________________________________________
[6] Ying-Yu
Cao,Chong
Fu,An
implementation of RSA digital
Algorithm.
efficient
Signature
[7] Min-Shiang Hwang, Eric Jui-Lin Lu and IuonChang Lin, A Practical (t, n) Threshold Proxy
Signature Scheme Based on the RSA
Cryptosystem.
[8] FIPS PUB 197: Advanced Encryption Standard
(AES).
[9] ISO/IEC 18033-3: Information technology
Security techniques.
[10] 2008 International Conference on Intelligent
Computation technology and Automation.
3486
IJRITCC | June 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________