0% found this document useful (0 votes)
97 views32 pages

Atm MINI PROJECT EDITED

Cryptography is the art of securing communication and information. It allows for confidentiality, integrity, authentication and non-repudiation of digital data. There are two main types of cryptography - symmetric/secret key which uses the same key for encryption and decryption, and asymmetric/public key which uses separate keys. The document discusses the history and applications of cryptography, as well as the goals of the project which are to develop techniques for secure communication by ensuring confidentiality, integrity, authentication and non-repudiation of data through encryption schemes, digital signatures and secure key exchange protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views32 pages

Atm MINI PROJECT EDITED

Cryptography is the art of securing communication and information. It allows for confidentiality, integrity, authentication and non-repudiation of digital data. There are two main types of cryptography - symmetric/secret key which uses the same key for encryption and decryption, and asymmetric/public key which uses separate keys. The document discusses the history and applications of cryptography, as well as the goals of the project which are to develop techniques for secure communication by ensuring confidentiality, integrity, authentication and non-repudiation of data through encryption schemes, digital signatures and secure key exchange protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

CRYPTOGRAPHY

Chapter 1
INTRODUCTION

1.1 INTRODUCTION
Digital communication witnesses a noticeable and continuous development in
many applications in the Internet. Hence, secure communication sessions must
be provided. The security of data transmitted across a global network has
turned into a key factor on the network performance measures. So, the
confidentiality and the integrity of data are needed to prevent eavesdroppers
from accessing and using transmitted data. Steganography and Cryptography
are two important techniques that are used to provide network security. The aim
of this project is to develop a new approach to hiding a secret information in an
image, by taking advantage of benefits of combining cryptography and
steganography.

1.1.1 Cryptography

Cryptography is one of the traditional methods used to guarantee the privacy of


communication between parties. This method is the art of secret writing, which
is used to encrypt the plaintext with a key into ciphertext to be transferred
between parties on an insecure channel. Using a valid key, the ciphertext can be
decrypted to the original plaintext. Without the knowledge of the key, nobody
can retrieve the plaintext.
Cryptography plays an essential role in many factors required for secure
communication across an insecure channel, like confidentiality, privacy,
nonrepudiation, key exchange, and authentication.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 1


CRYPTOGRAPHY

1.1.1.1 Symmetric / Secret Key Cryptography

The technique of Secret key encryption can also be known as the symmetric-
key, shared key, single-key, and eventually private-key encryption. The
technique of private key uses for all sides encryption and decryption of secret
data. The original information or plaintext is encrypted with a key by the sender
side also the similarly key is used by the receiver to decrypt a message to obtain
the plaintext. the key will be known only by a people who are authorized to the
encryption/decryption. However, the technique affords the good security for
transmission but there is a difficulty with the distribution of the key. If one stole
or explore the key he can get whole data without any difficulty. An example of
Symmetric-Key is DES Algorithm.

1.1.1.2 Asymmetric / Public Key Cryptography

We can call this technique as asymmetric cryptosystem or public key


cryptosystem, this technique use two keys which are mathematically associated,
use separately for encrypting and decrypting the information. In this technique,

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 2


CRYPTOGRAPHY

when we use the private key, there are no possibilities to obtain the data or
simply discover the other key. The key used for encryption is stored public
therefore it’s called public key, and the decryption key is stored secret and
called private key. An example of Asymmetric-Key Algorithm is RSA.

1.1.2 Types of Cryptography

There are various types of Cryptography.

A. Text Files
The technique of embedding secret data inside a text is identified as
text stego. Text cryptography needs a low memory because this type
of file can only store text files. It affords fast transfer or
communication of files from a sender to receiver.
B. Image Files
It is the procedure in which we embed the information inside the
pixels of image. So, that the attackers cannot observe any change in
the cover image. LSB approach is a common image cryptography
algorithm.

C. Audio Files

It is the process in which we hide the information inside an audio.


There are many approaches to hide secret information in an audio
files for examples Phase Coding, LSB .

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 3


CRYPTOGRAPHY

A cryptography key is a parameter used in an encryption algorithm in such a


way that the encryption can not be reversed without the knowledge of the
key.Terms used in cryptography are as follows:

 Plain text: original message is known as plain text.


 Cipher text: coded message is known as cipher text.
 Encryption: the process of converting the plain text to cipher
text is known as encryption.
 Decryption: the process of restoring the plain text from the
cipher text is known as decryption.

 Crytographic systems are charactrised along three independent


dimensions

The type of operation used for transforming plain text to cipher text:

 Substitution Technique: A substitution technique is one in which letters


of plain text are replaced by other letters or by numbers or by symbols.

 Transposition Technique: In this we perform some sort of permutation on


the plaintext letters.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 4


CRYPTOGRAPHY

1.2 History

The word cryptography traces back to the Greek roots kryptos, meaning
"hidden," and graphein, meaning "to write".The first known evidence of
cryptography can be traced to the use of 'hieroglyph'. Some 4000 years ago, the
Egyptians used to communicate by messages written in hieroglyphs. In
Cryptography the techniques which are use to protect information are obtained
from mathematical concepts and a set of rule based calculations known as
algorithms to convert messages in ways that make it hard to decode it. These
algorithms are used for cryptographic key generation, digital signing,
verification to protect data privacy, web browsing on internet and to protect
confidential transactions such as credit card and debit card transactions. 8
Earlier cryptography was effectively synonymous with encryption but
nowadays cryptography is mainly based on mathematical theory and computer
science practice. Cryptography is used in many applications like banking
transactions cards, computer passwords, and e- commerce transactions,

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 5


CRYPTOGRAPHY

1.3 Problem Statement

The purpose of this project is to provide the correct data with security to the
users. For some of the users the data might be lost during the transmission
process in the network and for some, the data might be changed by the
unauthorized person in the network and there are some other security problems
in the network. Our application will give you more Security to the data present
in the network and there will be able to reduce the loss of data in the network
which will be transmitted from the sender to the receiver using the latest
technologies. Only the Authorized persons i.e., who are using our application
will be 8 there in the Network. The proposed algorithm is to hide the audio data
effectively in an image without any suspicion of the data being hidden in the
image. It is to work against the attacks by using a distinct new image that isn’t
possible to compare.

We used a method for hiding the data in a distinct image file in order to securely
send over the network without any suspicion the data being hidden. This
algorithm, though requires a distinct image which we can use as a carrier and
hide the data which is well within the limits of the threshold that the image can
hide, that will secure the data.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 6


CRYPTOGRAPHY

1.4 Aim of Project

The aim of the project cryptography is to study and implement techniques for
secure communication in the presence of adversaries. Cryptography involves
the use of mathematical algorithms and principles to protect information,
ensuring confidentiality, integrity, authenticity, and non-repudiation.

The specific objectives of a cryptography project can vary depending on the


scope and purpose, but some common goals include:

1. Confidentiality: Developing encryption schemes to ensure that information


remains private and unreadable to unauthorized individuals.

2. Integrity: Designing mechanisms to verify that data has not been tampered
with or modified during transmission or storage.

3. Authentication: Establishing techniques to verify the identity of


communicating parties, preventing impersonation and unauthorized access.

4. Non-repudiation: Providing mechanisms to prove the origin of a message or


transaction, ensuring that parties cannot deny their involvement.

5. Key management: Developing secure protocols for generating, distributing,


and storing cryptographic keys, which are essential for encryption and
decryption processes.

6. Cryptanalysis: Analyzing existing cryptographic systems to identify


vulnerabilities and weaknesses, and proposing improvements or
countermeasures.

7. Implementation and optimization: Implementing cryptographic algorithms


efficiently, considering computational complexity, resource constraints, and
performance requirements.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 7


CRYPTOGRAPHY

8. Cryptographic protocols: Designing and analyzing protocols for secure


communication, including secure channels, digital signatures, secure key
exchange, and secure multiparty computation.

Overall, the aim of a cryptography project is to contribute to the field of


information security by advancing the understanding, development, and
application of cryptographic techniques to protect sensitive information and
ensure secure communication in various domains, such as finance, e-commerce,
government communications, and online privacy.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 8


CRYPTOGRAPHY

1.5 Objective

Security measures must be incorporated into computer systems whenever they


are potential targets for malicious or mischievous attacks. This is especially for
systems which handle financial transactions or confidential, classified or other
information whose secrecy and integrity are critical. With the need to protect
the integrity and privacy of information belonging to individuals and
organizations, we have developed this system.

The objective of encryption algorithms is to allow the encryption of a message


by one person and the decryption of the message by another person .In this
project, the private key is being divided into 2n+1 parts ,that is odd number of
parts so that even if the intruder is able to detect some of the parts of the private
key, it is computationally infeasible to detect all the 2n+1 parts .

That is the encrypted message can be decrypted only if all the 2n+1 parts of the
private key is known. Here our objective is to unable the intruder identify the
message even if he succeeds in calculating one or some of the parts of the
private key because the calculation of all 2n+1 parts of the private key is a
difficult task.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 9


CRYPTOGRAPHY

1.6 Methodology

An iterative lifecycle model[5] does not attempt to start with a full specification
of requirements. Instead, development begins by specifying and implementing
just part of the software, which can then be reviewed in order to identify further
requirements. This process is then repeated, producing a new version of the
software for each cycle of the model. Consider an iterative lifecycle model
which consists of repeating the following five phases in sequence:

3.Sequence Diagram

A Requirements phase in which the requirements for the software are gathered
and analyzed. Iteration should eventually result in a requirements phase that
produces a complete and final specification of requirements.A Design phase, in
which a software solution to meet the xxix requirements is designed. This may
be a new design or an extension of earlier design.An Implementation and Test

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 10


CRYPTOGRAPHY

phase, when the software is coded, integrated and tested.A Review phase, in
which the software is evaluated, the current requirements are reviewed, and
changes and addition to the system proposed. For each cycle of the model, a
decision has to be made as to whether the software produced by the cycle will
be discarded, or kept as a starting point for the next cycle (sometimes referred to
as incremental prototyping). Eventually a point will be reached where the
requirements are complete and the software can be delivered, or it becomes
impossible to enhance the software as required, and a fresh start has to be made.

The iterative lifecycle model can be likened to producing software by


successive approximation. Drawing an analogy with mathematical methods that
use successive approximation to arrive at a final solution, the benefit of such
methods depends on how rapidly they converge on a solution. The key to
successful use of an iterative software development lifecycle is rigorous
validation of requirements, and verification (including testing) of each version
of the software against those requirements within each cycle of the model.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 11


CRYPTOGRAPHY

Chapter 2

LITERATURE SURVEY

As we said the significance of network security is increased day by day as the


size of data being transferred across the Internet. This issue pushes the
researchers to do many studies to increase the ability to solve security issues. A
solution for this issue is using the advantage of cryptography in one system.
This Project has been implemented on the basis of the requirements of security
i.e. authentication, confidentiality, and robustness.

There has been a continuous rise in the number of data security threats in the
recent past and it has become a matter of concern for the security experts.
Cryptography is the best techniques to nullify this threat. The researchers today
are proposing a blended approach of both techniques because a higher level of
security is achieved when both techniques are used together.

In proposed an encrypting technique by combining cryptography and


steganography techniques to hide the data. In cryptography process, we
proposed an effective technique for data encryption using one’s complement
method. It used an Asymmetric key method where both sender and receiver
share the Secret key for encryption and decryption. In steganography part, we
used the LSB method that is used and mostly preferred.

We present a method based on combining both the strong encrypting algorithm


and steganographic technique to make the communication of confidential
information safe, secure and extremely hard to decode. An encryption technique
is employed for encrypting a secret message into a Cipher text using the
Senders Private Key and receiver public key. The Cipher Text is finally
embedded in a suitable cover 11 image and transferred securely to deliver the

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 12


CRYPTOGRAPHY

secret information. They utilized a least significant bit method to accomplish the
digital image steganography.

At the receiver’s side, the secret data is retrieved through the decoding process.
Thus, a three-level security has been rendered for them a secret message to be
transferred.

Chapter 3
SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 13
CRYPTOGRAPHY

SOFTWARE SPECIFICATION

3.1 Software Used


3.1.1 Name of Software
The software configurations used are Operating System: Windows
10 Programming Language JAVA.

3.2 System Analysis


3.2.1 Software Requirement Specification
 JDK 1.6.0

3.3 Software Tool Used

 Windows XP

Chapter 4
SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 14
CRYPTOGRAPHY

SYSTEM DESIGN

4.1 Algorithm & Flowchart

 ALGORITHM

inputs : Image, Message, Key.

1) Intially Sender consider a Cover Image.

2) Hide the Encrypted message in the image.

3) Hidding can be done using a secret key for confidentiality.

4) After Hidding the Image is considered as a Stego-Image. Which consists of


image and data which is encrypted.

5) The Receiver will receive the Stego-Image.

6) Using the Secret Key the receiver can view the data hidden in the image.

7) Thus the receiver can receive the message safely.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 15


CRYPTOGRAPHY

 FLOWCHART

4.2 Code of Project

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 16


CRYPTOGRAPHY

import javax.swing.JButton;

import javax.swing.JFileChooser;

import javax.swing.JFrame;

import javax.swing.JOptionPane;

import javax.swing.JTextField;

import java.awt.FlowLayout;

import java.awt.Font;

import java.io.File;

import java.io.FileInputStream;

import java.io.FileOutputStream;

public class FileEncrypter {

public static void operate(int key)

JFileChooser fileChooser=new JFileChooser();

fileChooser.showOpenDialog(null);

File file=fileChooser.getSelectedFile();

//file FileInputStream

try

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 17


CRYPTOGRAPHY

FileInputStream fis=new FileInputStream(file);

byte []data=new byte[fis.available()];

fis.read(data);

int i=0;

for(byte b:data)

System.out.println(b);

data[i]=(byte)(b^key);

i++;

FileOutputStream fos=new FileOutputStream(file);

fos.write(data);

fos.close();

fis.close();

JOptionPane.showMessageDialog(null, "Done");

}catch(Exception e)

e.printStackTrace();

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 18


CRYPTOGRAPHY

public static void main(String[] args) {

System.out.println("this is testing");

JFrame f=new JFrame();

f.setTitle("File Operation");

f.setSize(400,400);

f.setLocationRelativeTo(null);

f.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);

Font font=new Font("Roboto",Font.BOLD,25);

//Creating Button

JButton button=new JButton();

button.setText("Open File");

button.setFont(font);

//creating text field

JTextField textField=new JTextField(10);

textField.setFont(font);

button.addActionListener(e->{

System.out.println("button clicked");

String text=textField.getText();
SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 19
CRYPTOGRAPHY

int temp=Integer.parseInt(text);

operate(temp);

});

f.setLayout(new FlowLayout());

f.add(button);

f.add(textField);

f.setVisible(true);

4.3 Simulation Result

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 20


CRYPTOGRAPHY

[A]. TEXT ENCRYPTION

 Step 1: Run the source code

 Step 2:Select the File

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 21


CRYPTOGRAPHY

 Step 3: Encrytion is Done

Text File (Before Encryption)

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 22


CRYPTOGRAPHY

Text File After Encryption(Unreadable Format)

[B] Image Ecryption

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 23


CRYPTOGRAPHY

 Testing process

Image Before Encryption:

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 24


CRYPTOGRAPHY

Image After Encryption:

Chapter 5

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 25


CRYPTOGRAPHY

ADVANTAGES AND APPLICATIONS

 ADVANTAGES

The main advantages of cryptography can be summarized as follows:

1. Confidentiality: Cryptography ensures that sensitive information remains


confidential by encrypting data and making it unreadable to unauthorized
individuals. Only those with the correct decryption key can access and decipher
the encrypted data.

2. Data Integrity: Cryptography helps ensure the integrity of data by providing


mechanisms to detect any modifications or tampering. Hash functions and
digital signatures verify that the data has not been altered during transmission or
storage.

3. Authentication: Cryptography enables authentication by providing methods to


verify the identity of individuals or entities involved in communication. Digital
signatures and certificates ensure that messages or documents come from
trusted sources, preventing impersonation and ensuring secure communication.

4. Non-repudiation: Cryptography provides non-repudiation, which prevents


individuals from denying their involvement in sending or receiving messages.
Digital signatures and secure key management techniques ensure that the origin
and receipt of messages can be verified, making it difficult for parties to deny
their participation.

5. Secure Communication: Cryptography enables secure communication over


untrusted networks, such as the internet. By encrypting data during
SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 26
CRYPTOGRAPHY

transmission, cryptography protects against eavesdropping and unauthorized


interception, ensuring the confidentiality of sensitive information.

6. Compliance and Legal Requirements: Cryptography helps organizations meet


legal and compliance requirements regarding data protection and privacy. By
implementing cryptographic measures, organizations can fulfill regulatory
obligations and safeguard sensitive data.

7. Trust and Confidence: Cryptography enhances trust and confidence in digital


systems and transactions. Knowing that information is protected through
encryption instills confidence in individuals, organizations, and customers,
promoting secure interactions and data exchange.

8. Secure Storage: Cryptography can be used to protect data at rest, such as stored
files or databases. Encrypting data before storage ensures that even if
unauthorized individuals gain access to the storage medium, the encrypted data
remains unreadable without the decryption key.

9. Technological Advancements: Cryptography continually evolves to address


emerging threats and advancements in technology. Algorithms and protocols are
regularly updated and strengthened to withstand new attacks and maintain
robust security.

Overall, the main advantages of cryptography include confidentiality, data


integrity, authentication, non-repudiation, compliance with legal requirements,
secure communication, trust and confidence in digital systems, secure storage,
and adaptability to technological advancements.
 APPLICATIONS

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 27


CRYPTOGRAPHY

Cryptography has numerous applications in various fields, including:

1. Secure Communication: Cryptography ensures the confidentiality, integrity, and


authenticity of communication over insecure channels. It is used to secure email
communication, messaging apps, virtual private networks (VPNs), and secure
web browsing (HTTPS).

2. Data Protection: Cryptography helps protect sensitive data at rest or in transit. It


is used to encrypt files and folders, secure databases, safeguard financial
transactions, and protect personal information in compliance with privacy
regulations.

3. Password Storage: Cryptographic techniques are employed to securely store


passwords. Hashing algorithms, such as bcrypt and scrypt, convert passwords
into irreversible hashes, making it difficult for attackers to retrieve the original
passwords.

4. Digital Signatures: Cryptography enables the creation and verification of digital


signatures, providing authenticity, integrity, and non-repudiation. Digital
signatures are used in electronic documents, software distribution, financial
transactions, and legal contracts.

5. Secure Authentication: Cryptographic protocols such as Public Key


Infrastructure (PKI), Transport Layer Security (TLS), and Secure Shell (SSH)
are used for secure authentication. They protect against identity theft, password
sniffing, and man-in-the-middle attacks.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 28


CRYPTOGRAPHY

6. Blockchain Technology: Cryptography forms the foundation of blockchain


technology. It ensures the security and integrity of transactions, provides
consensus mechanisms, and enables secure and private smart contracts.

7. Secure Storage: Cryptography is utilized to encrypt data on storage devices like


hard drives, USB drives, and cloud storage. This protects data even if the
physical device is lost or stolen.

8. Digital Rights Management (DRM): Cryptography is employed in DRM


systems to protect copyrighted content from unauthorized access, copying, and
distribution.

9. Electronic Voting: Cryptographic techniques like homomorphic encryption and


zero-knowledge proofs are used to secure electronic voting systems, ensuring
confidentiality, integrity, and verifiability.

10.Cybersecurity: Cryptography plays a crucial role in various cybersecurity


mechanisms, including secure protocols, secure key management, secure
network communication, and intrusion detection systems.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 29


CRYPTOGRAPHY

Chapter 6

CONCLUSION

In this project, we deal with the concepts of security of digital data


communication across the network. This project is designed for combining the
steganography and cryptography features factors for better performance. We
performed a new steganography method and combined it with RSA algorithm.
The data is hidden in the image so there will be no chances for the attacker to
know that data is being hidden in the image. We performed our method on
image by implementing a program written in Java language. The method
proposed has proved successful in hiding various types of text, images, audio
and videos in color images. We concluded that in our method the Image files
and RSA are better. Because of their high capacity.

This work presents a scheme that can transmit large quantities of secret
information and provides secure communication between two private parties.
Both steganography and cryptography can be woven in this scheme to make the
detection more complicated. Any kind of text data can be employed as secret
msg. The secret message employing the concept of steganography is sent over
the network. In addition, the proposed procedure is simple and easy to
implement.

The Embedding of data is done such as Audio, Video, Image is done in the
image, by choosing a distinct and new image, we can prevent the chance for the
attacker to detect the data being hidden. Results achieved indicate that our
proposed method is encouraging in terms of security, and robustness.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 30


CRYPTOGRAPHY

FUTURE SCOPE

This project aims at converting the plaintext into a form unreadable by


unauthorized people and hence can be readily transferred across the web and
decrypted at the recipient side only by authorized people.It provides an
interactive environment to encrypt , decrypt or transfer encrypted files without
compromising with the integrity and privacy of critical information .In the era
of wide area , open distributed systems , this system will help resolve various
security issues.

It can be used by the government of a country so that the task of various


national policy formulation and international trade may proceed smoothly.It can
also be used by banks so that the task of amount transfer, amount withdrawal or
balance enquiry, etc. can be done without the fear of losing the password.It can
even be used by various websites so as to keep the password and other private
entities of the user secure .It can be used by credit card companies so as to
safely send the credit card numbers on the net and avoid it‟s misuse and thus
take proper care of the customer‟s wealth.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 31


CRYPTOGRAPHY

REFERENCES

[1] D. Seth, L. Ramanathan, and A. Pandey, “Security enhancement:


cryptography ” International Journal of Computer Applications (0975–8887)
Volume, 2010.

[2] H. Abdulzahra, R. AHMAD, and N. M. NOOR, “Combining cryptography


and steganography for data hiding in images,” ACACOS, Applied
Computational Science, pp. 978–960, 2014.

[3] J. V. Karthik and B. V. Reddy, “Authentication of secret information in


image stenography,” International Journal of Computer Science and Network
Security (IJCSNS), vol. 14, no. 6, p. 58, 2014.

[4] Mr. Vikas Tyagi(2012), “Data Hiding in Image Using least significant bit
with cryptography”, International Journal of Advanced Research in computer
science and Software Engineering, Volume 2, Issue 4.

SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 32

You might also like