"Security Framework For Distributed Database System": East West Institute of Technology
"Security Framework For Distributed Database System": East West Institute of Technology
Dept Of CSE,EWIT 2
INTRODUCTION
With the increase in the progress of the technology in the world of communication,
Cryptography has become very important for securing the information during transmission,
so it protects information against active and passive attack. The main objective of this study
is to find out a suitable algorithm for the encryption of a specific size of text file where the
experiment of each algorithm is based on encryption of different sizes of the text files,
which are in varying sizes of text files and also to calculate the time duration that each
algorithm takes to encrypt or to decrypt the particular size of each text file and display the
same.
Dept Of CSE,EWIT 3
LITERATURE SURVEY
S No Title Description Limitations
1 Effective comparison and Structure and design of both • Slow software
evaluation of DES and algorithms and advantages implementation
Rijnadael Algorithm. and disadvantages of both • Similar encryption of
the algorithms. every block.
Dept Of CSE,EWIT 4
LITERATURE SURVEY
S No Title Description Limitations
2 A comparative study of Analysis of a family of • Ciphers are at risk due to
Rivest Cipher algorithms. symmetric key algorithms easier decryption.
(International Journal of called Rivest Cipher
Information and Computation algorithms.
Technology)
Dept Of CSE,EWIT 5
LITERATURE SURVEY
S No Title Description Limitations
3 Comparative analysis of Analysis of the AES,DES RSA algorithm can be very
cryptographic algorithms in and RSA algorithms. slow in cases where large
securing data data needs to be encrypted
by the same computer.
Dept Of CSE,EWIT 6
LITERATURE SURVEY
S No Title Description Limitations
4 A study of DES and Evaluation of performance
Blowfish encryption in execution speed •Key management is
algorithm. based on different memory complicated.
sizes and compared them.
The
experimental results show
the relationship between
function run
speed and memory size.
Dept Of CSE,EWIT 7
PROBLEM STATEMENT
• Hackers always attack and destroy the data in the system through the security gaps.
• Lack of finding suitable algorithm for the encryption or decryption of a specific range of
the text file size.
• All algorithms are not suitable for the encryption or decryption of larger size text file.
• The time duration that each symmetrical algorithm takes to encrypt or decrypt different
text files is not similar.
Dept Of CSE,EWIT 8
OBJECTIVES
• To combine all the above mentioned algorithms in one program, so that the program
could select a suitable algorithm while encrypting or decrypting the text file based on
the size of the text file.
• To find out the time duration that each algorithm takes to encrypt different text files so
that the programmers need not to reinvent the wheel each time to develop a new
application.
• To display the best encryption algorithm for different sizes of .txt files
Dept Of CSE,EWIT 9
PROPOSED SYSTEM
Dept Of CSE,EWIT 10
Start
FLOWCHART
1) User authentication Data Owner Data Receiver
Yes
3) Secret key req/res
Login
Cloud Server
End
Authority
Dept Of CSE,EWIT 11
ALGORITHMS
Dept Of CSE,EWIT 12
AES Encryption Algorithm
Symmetric key block cipher
Plain text – 128 bits
Key length - 128/256 bits
The key size used for an AES
cipher specifies the number of
transformation rounds that
convert the plain text
• 10 rounds for 128-bit keys.
• 12 rounds for 192-bit keys.
• 14 rounds for 256-bit keys.
Dept Of CSE,EWIT 13
Algorithm:
Dept Of CSE,EWIT 14
DES Encryption Algorithm
Symmetric encryption algorithm
Dept Of CSE,EWIT 15
Round function of DES Encryption algorithm
Expansion Permutation Box − Since
right input is 32-bit and round key is a
48-bit, we first need to expand right
input to 48 bits.
XOR−After the expansion
permutation, DES does XOR
operation on the expanded right
section and the round key.
Substitution Boxes. − The S-boxes
carry out the real mixing (confusion).
DES uses 8 S-boxes, each with a 6-bit
input and a 4-bit output. Refer the
following illustration −
Dept Of CSE,EWIT 16
Rivest cipher (RC2) Algorithm
Input block size 64 bits
Dept Of CSE,EWIT 17
Encryption process in RC2 algorithm
Encryption steps performed on every data block: Each Mashing Round consists of four Mashing
1.Initialize the counter j to 0. operations, performed on four words of the data
2.Perform five Mixing Rounds. block:
3.Perform one Mashing Round. 1.Mashing R[0]
4.Perform six Mixing Rounds. 2.Mashing R[1]
5.Perform one Mashing Round. 3.Mashing R[2]
6.Perform five Mixing Rounds. 4.Mashing R[3]
Dept Of CSE,EWIT 18
Blowfish Algorithm
Dept Of CSE,EWIT 19
F function in blowfish encryption algorithm
Dept Of CSE,EWIT 20
Implementation
MODULES:
Module 1: Data Owner
Input: User data file for transfer.
Output: Encrypted user data file using appropriate encryption algorithm.
Dept Of CSE,EWIT 21
…cont.
Module 3: Authority
Input: Permissions from different users for encryption/decryption key
Output: Encryption Key or decryption key for user requests.
Dept Of CSE,EWIT 22
SNAPSHOTS
Dept Of CSE,EWIT 24
Data owner requests file encryption key from the Authority and
requests permission to view those files
Dept Of CSE,EWIT 25
Data owner requests Secret key from the Authority and requests permission to
provide secret key to the particular file chosen by the data owner
Dept Of CSE,EWIT 26
Data owner uploads the file and selects the algorithm to encrypt the file
Dept Of CSE,EWIT 27
Data Receiver secure log in/Register page
Dept Of CSE,EWIT 28
Data receiver requests decrypt key from the Authority(AA) and
Displays the response given by the authority
Dept Of CSE,EWIT 29
Data receiver requests Secret key from the Authority and the response given
By the authority(AA)
Dept Of CSE,EWIT 30
Once the authority provides the secret key the data receiver
enters the secret key and downloads the file
Dept Of CSE,EWIT 31
Authority(AA) log in/Register page
Dept Of CSE,EWIT 32
All the data owners requesting access to the cloud are permitted by the Authority(AA)
Dept Of CSE,EWIT 33
The Authority(AA) views all the key requests by the data owners/data recievers
and permits them to upload the file for the encryption
Dept Of CSE,EWIT 34
The Authority(AA) views all the secret key requests by the
data owners/data receivers and generates the secret key
Dept Of CSE,EWIT 35
RESULT ANALYSIS
Encryption time:
Dept Of CSE,EWIT 36
RESULT ANALYSIS
Dept Of CSE,EWIT 37
RESULT ANALYSIS
Dept Of CSE,EWIT 38
RESULT ANALYSIS
Dept Of CSE,EWIT 39
CONCLUSION
Various symmetrical cryptographic algorithms have been used and each algorithm
has been used for encryption and decryption of different sizes of the text files. The
main concept of the analysis is on the role of time duration that each algorithm takes
to encrypt and decrypt text file in particular, and the result was in the term of various
time durations. After analysis of time durations for each process, the finding was that
some algorithms are appropriate for the smaller size of the text file and others are
appropriate for bigger size of the text file and according to this result analysis, the
concept of the suitable crypt has constructed, the concept is in the terms of checking
the size of the text file before encryption and decryption process, and choose the
suitable crypt according to size of the text file, the result is analyzed by web server.
40
Dept Of CSE,EWIT
41
Dept Of CSE,EWIT