PDA

View Full Version : Draft List of Requirements for Data Encryption Compression Simulator



Xpert
11-28-2010, 02:05 AM
Security is the key concern in the current electronic era. There are multiple techniques used for data
encryption and decryption like ACK (Acknowledgement), AES(Advanced Encryption Standard), AKA
(Authentication and Key Agreement ),CBCM(Cipher Block Chaining with Output Feedback Masking),CHAP
(Challenge Handshake Authentication Protocol), DES(Data Encryption Standard )etc.
When we use encryption technique it increases the length of data as well cost of sending it. Use compression
technique to reduce its length and RSA algorithm to encrypt data to secure data. RSA (which stands for
Rivest, Shamir and Adleman who first publicly described it) involves a public key and a private key concept.
The public key known to everyone and is used for encrypting messages. Messages encrypted with the public
key can only be decrypted using the private key. Signature can be added to the message using private key
Used for authentication. Pubic key will be used to encrypt data
Following steps are involved:
 Write message.
 Check the message length.
 Convert message into fixed size packets
 Compress the message.
 Encrypt the compressed message using RSA algorithm.
 Add signature to the message.
 Send the secure message.
 Message will be extracted and decrypted using compression algo and private key at recipient
NOTE: Student may use some new compression technique to enhance the performance.

Xpert
11-28-2010, 02:08 AM
This is the next image.

Xpert
11-28-2010, 02:14 AM
If some one want the phases of this project then contact this number
03009520262