0% found this document useful (0 votes)
12 views

Final

Uploaded by

Malik Furkan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Final

Uploaded by

Malik Furkan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

A PROJECT REPORT

ON
“CRYPTOGRAPHIC ALGORITHM DETECTION USING
MACHINE LEARNING”
SUBMITTED IN PARTIAL FULLFILLMENT OF THE
REQUIREMENTS OF DEGREE OF
BACHELOR OF ENGINEERING
BY
DHRUV BALWAL
FURKAN MUSTAFA
TANMAY MAHAJAN

SUPERVISOR

Ms. SRIJITA BHATTACHARJEE

DEPARTMENT OF COMPUTER ENGINEERING

PILLAI HOC COLLEGE OF ENGINEERING AND TECHNOLOGY,


PILLAI’SHOC EDUCATIONAL CAMPUS, HOCL COLONY,
RASAYANI, TAL: KHALAPUR, DIST: RAIGAD – 410 207
UNIVERSITY OFMUMBAI
[2024-25]
Mahatma Education Society’s
Pillai HOC College of Engineering and
Technology, Rasayani – 410 207
[2024-25]

Certificate
This is to certify that the Major Project-I entitled “CRYPTOGRAPHIC

ALGORITHM DETECTION USING MACHINE LEARNING”is a

bonafide work of DHRUV BALWAL, TANMAY MAHAJAN, FURKAN

MUSTAFA submitted to the University of Mumbai in partial fulfilment of the

requirement for the award of the degree of “Undergraduate” in “Computer

Engineering”.

_____________________ ________________________
Ms.Srijita Bhattacharjee Ms. Srijita Bhattacharjee
(Supervisor) (Project Coordinator)

_____________________ ________________________
Dr. Rajashree Gadhave Dr. J. W. Bakal
(Head of Department) (Principal)
Project Report Approval for B.E

This project report entitled “Cryptographic Algorithm Detection


Using Machine Learning” submitted by “Dhruv Balwal, Furkan
Mustafa, Tanmay Mahajan” is approved for the degree of Bachelor
of Engineering in Computer Engineering.

Examiners

1.

2.

Date
:

Place:
Declaration
We declare that this written submission represents our ideas in our
own words and where others ideas or words have been included. We have
adequately cited and referenced the original sources. We also declare that
we have adhered to all principles of academic honesty and integrity and
have not misrepresented or fabricated or falsified any idea/data/fact/source
in our submission. We understand that any violation of the above will
because for disciplinary action by the Institute and can also evoke penal
action from the sources which have thus not been properly cited or from
whom proper permission has not been taken when needed.

Dhruv Balwal

Furkan Mustafa

Tanmay Mahajan

Date:
Abstract

This project focuses on developing a machine learning system to classify cryptographic


algorithms based on their hash values. Cryptography plays a critical role in securing
digital communication, and identifying the algorithm used in encryption helps enhance
the system’s security and auditing. The system extracts features from cryptographic
hash values and uses a Random Forest classifier to predict the underlying algorithm
with high accuracy. The proposed solution automates the classification process and
ensures faster, more reliable analysis of cryptographic data. The system can be applied
in various areas, including cybersecurity and digital forensics.

Keywords: Cryptographic algorithms, Hash values, Machine learning, Random forest


classifier, Cybersecurity
Abbreviations

1. GSM – Global System for Mobile Communication

ii
List of Figures

Figure Figure Name Page


No.
No.
Figure 3.1 Arduino UNO Pin Diagram 11
Figure 3.2 Raspberry Pi Model B+ 13
Figure 3.3 GSM MODULE SIM800L 14
Figure 3.4 MQ Gas Sensor 16

iii
List of Tables

Table
Name of Table Page No.
No.

Table 2.1 7

Table 4.1 23

iv
TABLE OF CONTENTS

Content Page No.

Abstract i

Abbreviations ii

List of Figures iii

List of Tables iv

1. Introduction 1

1.1 Background 2

1.2 Motivation 2

1.3 Organization of the report 2

2. Literature Survey 3

2.1 Fundamental Concepts 4

2.2 Existing Systems 4

2.3 Problem Statement 5

2.4 Scope of the Project 6

3. Planning and Requirement Gathering 8

3.1 Software and Hardware Requirements 9

3.2 Project Plan (Gantt chart) 10

3.3 Cost Estimation 11

4. Project Analysis 24

4.1 Data Flow Diagram 25

4.2 Use Case Diagram 25

4.3 Sequence Diagram 26


v
5. Project Design 27

5.1 State Transition Diagram 28

5.2 Swim Lane Diagram 29

6. Proposed System 21

6.1 Proposed System Architecture 22

6.2 Methodology 22

7. Conclusion 36

References 38

vi
IOT based Fire Detection System Using Image Processing

Chapter 1

Introduction

Pillai HOC College of Engineering and Technology ,Rasayani 1


IOT based Fire Detection System Using Image Processing

Cryptography is an essential tool in ensuring the privacy, integrity, and authenticity of


data in today's digital age. The use of hash functions is central to many cryptographic algorithms,
including digital signatures and message integrity checks. Identifying the algorithm behind a
cryptographic process can aid in security auditing, research, and reverse engineering. Existing
systems either rely on manual inspection or slow, inefficient methods for algorithm classification.

This project proposes an automated system to classify cryptographic algorithms based on


their hash values using machine learning. The Random Forest algorithm is employed to learn
patterns from extracted hash features, enabling rapid and accurate predictions.

1.1 Background

1.2 Motivation

1.3 Organizations of Report

Pillai HOC College of Engineering and Technology ,Rasayani 1


IOT based Fire Detection System Using Image Processing

Chapter 2

Literature Survey

Pillai HOC College of Engineering and Technology, Rasayani 3


IOT based Fire Detection System Using Image Processing

2.1 Fundamental Concepts


1.Data Preprocessing: Load the dataset of hash values and perform necessary
preprocessing steps to extract useful features from the data.
2.Feature Extraction: Implement a feature extraction function that processes
each hash value and extracts relevant cryptographic features.
3.Model Training: Use a Random Forest classifier for training on the
extracted features.
4.Prediction Module: This module takes new input hash values and predicts
the corresponding cryptographic algorithm.
5.User Interface: A simple web-based interface using Flask where users can
upload hash values for classification.

2.2 Existing system


Current cryptographic algorithm classification methods often rely on:

 Manual Analysis: Human experts analyzing cryptographic data, which is


time-consuming and error-prone.

 Heuristic Techniques: These involve predefined rules for determining the


algorithm, which may lack scalability and flexibility.

 Pre-built Tools: There are tools available for cryptographic analysis, but they
lack automation and efficient real-time processing.

Pillai HOC College of Engineering and Technology, Rasayani 6


IOT based Fire Detection System Using Image Processing

Disadvantages of Existing System

 Time-consuming: Manual analysis of cryptographic algorithms is slow and


labor-intensive.

 Prone to errors: Human errors can occur, leading to misclassifications or


missed insights.

 Lack of scalability: Existing tools cannot easily adapt to new cryptographic


algorithms or variations of existing ones.

 Low efficiency: Current methods may not provide real-time results,


making them unsuitable for large-scale applications

2.3 Problem Statement


2.4 Scope of the Project

Pillai HOC College of Engineering and Technology, Rasayani 6


IOT based Fire Detection System Using Image Processing

Chapter 3

Planning and Requirement Gathering

Pillai HOC College of Engineering and Technology, Rasayani 8


IOT based Fire Detection System Using Image Processing

3.1 Software and Hardware Requirements


Here we will discuss everything we will need in order to execute. Below we list the necessary
hardware and software requirements.
1. Software Requirements:
 Operating System -Windows 10/11 or Linux (Ubuntu preferred)
macOS (optional)
 Programming Languages- Python 3.x
 Libraries/Frameworks- Pandas, Scikit-learn, Flask, NumPy, Joblib,
Jinja2, Seaborn
 Development Environment- Visual Studio Code, PyCharm, or Jupyter
Notebook
 Browser- Google Chrome or Mozilla Firefox for testing the Flask web
application.
 Python Packages-Flask, pandas, scikit-learn, joblib, numPy

2. Hardware Requirements:
 Processor- Minimum: Intel i5 or AMD Ryzen 5

 Memory (RAM)-Minimum: 8 GB

 Storage- Minimum: 256 GB SSD

 Graphics Processing Unit (GPU)- GTX 1660, RTX 3060, or higher

 Display- Resolution: 1366x768 or higher

3.2 Project Plan (Gantt chart)


Pillai HOC College of Engineering and Technology, Rasayani 9
IOT based Fire Detection System Using Image Processing

3.3 Cost Estimation

This study is being conducted to determine the system's economic impact on


the organisation. The amount of money the corporation can invest in system
research and development is limited. It is necessary to justify spending. As a result,
the produced system came in under budget, which was possible because the
majority of the technologies used were freely available. Only the customised items
have to be bought.

Pillai HOC College of Engineering and Technology, Rasayani 9


IOT based Fire Detection System Using Image Processing

Pillai HOC College of Engineering and Technology, Rasayani 20


IOT based Fire Detection System Using Image Processing

Chapter 4

Project Analysis

Pillai HOC College of Engineering and Technology, Rasayani 21


IOT based Fire Detection System Using Image Processing

4.1 Data Flow Diagram

4.2 Use Case Diagram

Pillai HOC College of Engineering and Technology, Rasayani 22


IOT based Fire Detection System Using Image Processing

4.3 Sequence Diagram

Pillai HOC College of Engineering and Technology, Rasayani 22


IOT based Fire Detection System Using Image Processing

Chapter 5

Project Design

Pillai HOC College of Engineering and Technology, Rasayani 24


IOT based Fire Detection System Using Image Processing

5.1 State Transition Diagram

5.2 Swim Lane Diagram

Pillai HOC College of Engineering and Technology, Rasayani 26


IOT based Fire Detection System Using Image Processing

Chapter 6

Proposed System

Pillai HOC College of Engineering and Technology, Rasayani 27


IOT based Fire Detection System Using Image Processing

6.1 Proposed System Architecture


System Architecture

6.2 Methodology

 Data Collection: Collect a dataset of hash values generated using various


cryptographic algorithms.

 Feature Engineering: Extract specific features from the hash values, such as
entropy, bit patterns, etc.

 Model Selection: Random Forest is chosen due to its robustness and ability
to handle complex feature sets.

 Model Evaluation: Split the dataset into training and testing sets. Evaluate
model performance using accuracy and confusion matrices.

Pillai HOC College of Engineering and Technology, Rasayani 29


IOT based Fire Detection System Using Image Processing

Chapter 7

Conclusion

Pillai HOC College of Engineering and Technology, Rasayani 36


IOT based Fire Detection System Using Image Processing

Conclusion
Few years back the fire is detected through sensors or any other method or by smoke. But these
This project provides an efficient and accurate machine learning-based solution to
the problem of cryptographic algorithm classification. By automating the process, it
reduces the time and effort required for cryptographic analysis. The system shows
promising results in terms of accuracy and can easily be expanded to accommodate
additional algorithms or features

Pillai HOC College of Engineering and Technology, Rasayani 37


IOT based Fire Detection System Using Image Processing

References
[1] AachalRamteke,. “IoT Based Forest Fire Detection System Using Raspberry PI and GSM”
International Journal of Advanced Research in Science, Communication and Technology,
Volume: 4, Issue: 3,June 2020.
[1] Kelsey, J., Schneier, B., & Wagner, D. (1997). "A Survey on Cryptographic Hash Functions".

[2] Breiman, L. (2001). "Random Forests". Machine Learning, 45(1), 5-32.

[3] Phua, C., Lee, V., Smith, K., & Gayler, R. (2010). "Machine Learning Applications in
Cybersecurity". Computational Intelligence, 26(3), 293-311.

Pillai HOC College of Engineering and Technology, Rasayani 40

You might also like