0% found this document useful (0 votes)
549 views12 pages

Security Systems Using Dns Cryptography

The document discusses a proposed security system for DNS using cryptography. It describes how digital signatures and asymmetric key cryptography can be combined to authenticate and verify messages. The system would use message digest and PRNG algorithms to generate keys and signatures. When a message is sent with a signature, the receiver can use the public key to generate a signature to verify it matches what was received to authenticate the message. The system aims to provide security to DNS by combining these cryptographic concepts.

Uploaded by

Hari Sumanth
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
549 views12 pages

Security Systems Using Dns Cryptography

The document discusses a proposed security system for DNS using cryptography. It describes how digital signatures and asymmetric key cryptography can be combined to authenticate and verify messages. The system would use message digest and PRNG algorithms to generate keys and signatures. When a message is sent with a signature, the receiver can use the public key to generate a signature to verify it matches what was received to authenticate the message. The system aims to provide security to DNS by combining these cryptographic concepts.

Uploaded by

Hari Sumanth
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 12

SECURITY SYSTEM FOR DNS

USING
CRYPTOGRAPHY

HARI
SUMANTH
CSE~518
Overview of DNS
• The DNS translates Internet domain and
host names to IP address.

• DNS automatically converts the names we


type in our Web browser address bar to the
IP addresses of Web servers hosting those
sites.
• The mapping or binding of IP addresses to
host names became a major problem in
the rapidly growing Internet and the higher
level binding effort went through.

• We got the different stages of


development up to the currently used
Domain Name System (DNS).
Digital Signatures
• The DNS Security is designed to provide security by combining
the concept of both the Digital Signature and Asymmetric key
(Public key) Cryptography.

• A digital signature is a mathematical scheme for


demonstrating the authenticity of a digital message or
document.

• A valid digital signature gives a recipient reason to believe that


the message was created by a known sender, and that it was
not altered in transit.
Asymmetric key
• The asymmetric key algorithms are used to
create a mathematically related key pair: a
secret private key and a published public key.

• Each user has a pair of a public encryption key


and a private decryption key.

• The practice of cryptography begin in 1970's.


Message Digest Algorithm
 The DNS security uses Message Digest
Algorithm to compress the Message(text file)
and PRNG(Pseudo Random Number
Generator) Algorithm for generating Public
and Private key .

 In cryptography, Message-Digest algorithm is


a widely used cryptographic hash function
with a 128-bit hash value.
pseudo-random number generator

• A pseudo-random number generator is a deterministic


algorithm to generate a sequence of numbers with little
or no discernible pattern in the numbers, except for
broad statistical properties.

• The sequence is not truly random in that it is completely


determined by a relatively small set of initial values,
called the PRNG's state.

• The message combines with the Private key to form a


Signature using DSA Algorithm, which is send along
with the Public key.
• The receiver uses the Public key and DSA Algorithm to
form a Signature.

• If this Signature matches with the Signature of the


message received, the message is Decrypted and read
else discarded.

• By combining the concept of both the Digital Signature


and Asymmetric key (Public key) Cryptography we get
additional security.
Software Requirements

• Language : JDK1.3 (or)


Higher.

• Front End Design : Swings

• Operating System : Windows


Hardware Requirements
 Main processor : Pentium III (or) IV

 RAM : 128MB

 Hard Disk : 4.2GB

 Clock Speed : 550 MHZ

 System Bus Speed : 400 MHz

 Cache RAM : 256 KB

You might also like