Ilovepdf Merged PDF
Ilovepdf Merged PDF
Ilovepdf Merged PDF
on
iTWIN TECHNOLOGY
Submitted in partial fulfillment of the requirements for the award of the Degree of
BACHELOR OF TECHNOLOGY
In
COMPUTER SCIENCE AND ENGINEERING
by
U.SUMAN SRI LAKSHMI
(16FE1A05F0)
Under the guidance of
Associate Professor
Vadlamudi-522213
CERTIFICATE
This is to certify that the seminar report entitled “iTWIN TECHNOLOGY” is a bonafide work
done by U. SUMANA SRI LAKSHMI (16FE1A05F0) submitted in fulfillment of the
requirements for the award of the degree of Bachelor of Technology in COMPUTER
SCIENCE AND ENGINEERING from JAWAHARLAL NEHRU TECHNOLOGICAL
UNIVERSITY, KAKINADA. The work embodied in this seminar report is not submitted to
any University or Institution for the award of any Degree or diploma.
The satisfaction that accompanies with the successful completion of any task would be
incomplete without the mention of people whose ceaseless cooperation made it possible, whose
constant guidance and encouragement crown all efforts with success.
I also express my sincere thanks to our beloved Chairman Dr. LAVU RATHAIAH for
providing support and stimulating environment for developing the seminar report.
I also place my floral gratitude to all other teaching and lab technicians for their constant support
and advice throughout the seminar.
I hereby declare that the project report entitled “iTWIN TECHNOLOGY” is a record of an
original work done by me under the guidance of Dr. S .V .S . Santhi , Associate
Professor of Computer Science and Engineering and this seminar report is submitted in the
fulfillment of the requirements for the award of the Degree of Bachelor of Technology in
Computer Science and Engineering. The results embodied in this seminar report are not
submitted to any other University or Institute for the award of any Degree or Diploma.
Place : Vadlamudi
Date : (Signature)
ABSTRACT
iTwin is a 'limitless' secure USB device that enables users to access, edit & share all
their files & media between any two online computers anywhere in the world. The only limit is
the size of your computer’s hard drive. iTwin is an innovative solution that allows remote file
access without the security and privacy risks of the cloud and USB flash drives. It’s very easy to
access as a USB device and no special installation is required. iTwin uses thoroughly analyzed
crypto protocols and algorithms (AES 256 bit encryption). It has features like bi-directional file
access, no temp files, remote disable, smart key generation, password support and twintrust
authentication.
i
CONTENTS
1. Introduction to iTwin 01
2. Need of iTwin 02
2.1 Differences between iTwin and Cloud Storage
2.2 iTwin vs Flash drive
5. Uses of iTwin 07
5.1 Remotely edit files
5.2 Like a limitless capacity secure USB files
5.3 iTwin for muti collaboration
6. Security provided by iTwin 09
6.1 What is Malware
6.2 Effects of Malware
6.3 Protection from Malware
6.4 Twin Trust Authentication
6.5 Twin Factor Authentication
7. Environment Required for iTwin technology 12
ii
LIST OF FIGURES
3 Features of iTwin 06
7 Various Malware 09
8 Spyware 10
9 Trojan Horse 10
iii
CHAPTER 1
INTRODUCTION
iTwin is like the two ends of a cable , without the cable . iTwin is a revolutionary
new file sharing and remote access device brought to you by a company called iTwin . It's like
two ends of a cable , without the cable . It's as simple to use as a flash drive . It's literally plug
and play.
iTwin can connect any two online computers anywhere in the world . iTwin enables
you to have access to any or all of your home computer's files and folders while you're on-the-
go you can also use iTwin to access to any or all of your office computer's files and folders
There's no in-built limit to the amount of storage you can access with iTwin .
iTwin is a 'limitless' secure USB device that enables users to access, edit & share
all their files & media between any two online computers anywhere in the world. The only
limit is the size of your computer’s hard drive.
1
CHAPTER 2
NEED OF iTWIN
Transferring data from one PC to another can be difficult, especially if it's a large
amount of data. For example, if you want to send some data to somebody in another country,
you’re going to have to go through the hassle of either sending it via e-mail, or upload it to
some file hosting service. Chances are, if your file is too large, you’ll probably need to buy
more storage.
Enter iTwi, This new USB dongle/USB drive allows users to remotely access data
from anywhere in the world. It’s a one time investment
Cloud storage is a cloud computing model that stores data on the Internet
through a cloud computing provider who manages and operates data storage as a
service. It’s delivered on demand with just-in-time capacity and costs, and eliminates
buying and managing your own data storage infrastructure. This gives you agility,
global scale and durability, with “anytime, anywhere” data access .
Cloud storage is purchased from a third party cloud vendor who owns and
operates data storage capacity and delivers it over the Internet in a pay-as-you-go
model. These cloud storage vendors manage capacity, security and durability to
make data accessible to your applications all around the world.
Time to Deployment
Information Management
2
iTWIN vs Cloud Storage :
The following table shows the differences between iTWIN and Flash Drives
3
CHAPTER 3
4
CHAPTER 4
Password support:
iTwin even provides password support. Passwords of any length can be set. Unlike other
web services, iTwin's password is stored on itself, not on any server. If you forget your
password, simply pair both halves of your iTwin, plug them into a computer and set a new
password. No need for tech support!
When using iTwin, the connection between the 2 computers is completely symmetrical.
Access, copy, backup & remotely edit files on computer A from computer B, and on B
from A. You will have access to files on both A and B.
iTwin is just like a wireless device connecting two systems and securely transferring data
between them.
Multi-language support
No storage limitations
5
Fig no – 3: Features of iTwin
6
CHAPTER 5
USES OF iTwin
7
Directly share the files between two Share the files through the cloud storage by
Computers without using a cloud. securing the files with in iTwin secure box.
You can plug in multiple iTwin devices into a single computer and use your computer
as centralized shared storage place for the files shared in group of people.
You can update the files in storage place and the whole group will have to access to
latest set of files.
8
CHAPTER 6
iTwin doesn't store any data on itself. It just enables a secure connection between
two computers. Your remote data can only be accessed if you have the physical iTwin with
you. Additionally, you can set up your iTwin to require a password. iTwin is a secure USB
device providing Two-Factor Authentication (hardware device + password).We also allow
you to remotely disable iTwin with our remote disable feature. So you can rest assured that
your data is safe, even if you lose your iTwin device.
Malware, short for malicious software, consists of programming (code, scripts, active content,
and other software). It is designed to disrupt or deny operation, gather information that leads
to loss of privacy or exploitation, or gain unauthorized access to system resources, or that
otherwise exhibits abusive behavior. Malware is disguised as genuine software, and may
come from an official site. Therefore, some security programs, such as McAfee may call
malware "potentially unwanted programs" or "PUP".
Spyware is a piece of software that collects and sends information (such as browsing patterns
in the more benign case or credit card numbers in more serious ones) on users. They usually
work and spread like Trojan horses. The category of spyware is sometimes taken to include
9
adware of the less-forthcoming sort. Trojan horses are similar to viruses in that they get
executed by being part of an otherwise useful piece of software.To spread, Trojan horses rely
on the useful features of the host software, which trick users to install them.
Spyware :
Spyware is unwanted software that infiltrates your computing device, stealing your internet
usage data and sensitive information. Spyware is classified as a type of malware — malicious
software designed to gain access to or damage your computer, often without your knowledge.
Spyware gathers your personal information and relays it to advertisers, data firms, or external
users.
Fig no - 8 : Spyware
Trojan horse:
A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but
can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in
general inflict some other harmful action on your data or network.
iTwin does not facilitate malware distribution. Malware spreads through regular USB
drives, when a malicious program executes and writes itself to the USB drive automatically
(without your permission or without you even realizing it). When the infected USB drive is
plugged into another computer, the software may be able to automatically run. There are two
necessary conditions for malware spread.
1) Infected File should be copied to a new computer.
2) Infected File should executed on the new computer.
With iTwin, you explicitly select the files that needs to be copied. And the iTwin device does
not store any unauthorized files on itself - it only stores iTwin application files. Malicious
files cannot trick iTwin into copying files automatically. However, if you use iTwin (or any
file transfer system) to knowingly copy suspicious files on to your computer and you execute
them (by clicking on them) you might be opening malware.
Before allowing any data transfer, every iTwin is authenticated by iTwin's TwinTrust
servers.
All communication between iTwin and TwinTrust is secured using industry strength
HTTPS (RSA 1024 bit, 128 bit RC4) protocol.
After successful authentication by TwinTrust, TwinTrust assist iTwin to discover its
other half.
After authenticating with TwinTrust, two halves of iTwin mutually authenticate each
other using their pre-shared AES 256 bit crypto key.
If password is set, then password verification is performed on both iTwins before data
transfer is initiated between two iTwins .
11
CHAPTER 7
Software Requirements:
When you plug iTwin into a computer for the first time iTwin software gets
installed in the computer.
Requires 15MB hard-disk space.
USB 2.0 port
Requires a broad-band internet access 1Mbps upload speed recommended.
Automatic updates.
Hardware Requirements:
Length: 3.54 inches (90 mm).
Width: 0.82 inch (21 mm).
Depth: 0.314 inch (8.0 mm).
Weight: 0.11 pound (50g).
Operating Requirements:
Operating temperature: 32° to 158° F (0° to 70° C).
Relative humidity: 5% to 95% non-condensing.
Maximum operating altitude: 10,000 feet (3000 m).
12
CHAPTER 8
ALGORITHM USED BY iTWIN
The algorithm used by iTwin is Advanced Encryption Standard 256 bit
crypto algorithm . Let’s take a look at AES 256 bit crypto algorithm.
Advannced Encryption Standard 256 bit crypto algorithm:
AES is an iterative rather than Feistel cipher. It is based on ‘substitution–
permutation network’. It comprises of a series of linked operations, some of which
involve replacing inputs by specific outputs (substitutions) and others involve
shuffling bits around (permutations). AES uses 10 rounds for 128-bit keys, 12
rounds for 192-bit keys and 14 rounds for 256-bit keys. Each of these rounds uses a
different 128-bit round key, which is calculated from the original AES key.
Encryption Process:
Here, we restrict to description of a typical round of AES encryption. Each round
comprise of four sub-processes. The first round process is depicted below –
13
Byte Substitution (SubBytes):
The 16 input bytes are substituted by looking up a fixed table (S-box) given in design.
The result is in a matrix of four rows and four columns.
Shiftrows:
Each of the four rows of the matrix is shifted to the left. Any entries that ‘fall off’ are re-
inserted on the right side of row. Shift is carried out as follows −
The result is a new matrix consisting of the same 16 bytes but shifted with respect
to each other.
MixColumns:
Each column of four bytes is now transformed using a special mathematical function.
This function takes as input the four bytes of one column and outputs four completely
new bytes, which replace the original column. The result is another new matrix
consisting of 16 new bytes. It should be noted that this step is not performed in the last
round.
Addroundkey:
The 16 bytes of the matrix are now considered as 128 bits and are XORed to the 128 bits
of the round key. If this is the last round then the output is the ciphertext. Otherwise, the
resulting 128 bits are interpreted as 16 bytes and we begin another similar round.
Decryption Process:
14
Add round key
Mix columns
Shift rows
Byte substitution
Since sub-processes in each round are in reverse manner, unlike for a Feistel Cipher, the
encryption and decryption algorithms needs to be separately implemented, although they
are very closely related.
AES features:
The selection process for the new symmetric key algorithm was fully open to public
scrutiny and comment; this ensured a thorough, transparent analysis of the designs
submitted.
NIST specified the new Advanced Encryption Standard algorithm must be a block cipher
capable of handling 128-bit blocks, using keys sized at 128, 192, and 256 bits; other
criteria for being chosen as the next Advanced Encryption Standard algorithm included:
15
CHAPTER 9
CONCLUSION
iTwin - A fantastic solution for the home users who want to access and change
their files remotely and securely. The iTwin is simple & inexpensively solves
the limitations. For those who want to keep files up to date between two
computers iTwin is for you. It has a few drawbacks like A Bit expensive, Ends
are not protected by caps and Not compatible with Linux.
16
CHAPTER 10
REFERENCES
https://www.itwin.com
https://www.tekgoblin.com/2012/02/05/itwin-review/#ixzz1lqklcjMy
https://twitter.com
17