Client Security Hash System Using Java
Data science projects in pondicherry
Create New

Client Security Hash System Using Java

Project period

07/01/2020 - 07/30/2020

Views

53

0



Client Security Hash System Using Java
Client Security Hash System Using Java

Client security is the safety net that safeguards business machines, server-side operating systems, and other outside devices, such as laptops, phones, and other portable devices. Each and every device that is connected to the network creates an opening for cyberthreats to enter and attack business infrastructure. Security is the freedom, or resilience against, the potential harmless caused by others. Successors of security may be persons and social communities, objects and organizations, ecosystems, or any other entity or phenomenon vulnerable to undesired change. Hashing is a single-way function where data is mapped to a fixed-length value. Hashing is primarily used for authentication. Salting is an additional step during hashing, typically seen in association with hashed passwords, that adds an additional value to the end of the password that changes the hash value produced. The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard, including SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". Cryptography is regarding communication in the presence of a conflict or dispute. It encompasses many problems like encryption, authentication, etc modern cryptography provides a theoretical study that is easily understandable by an individual what exactly these problems are, how to execute and build protocols that purport to solve them, and how to build protocols in whose security one can have confidence. With increasing digital technologies, now we can see multimedia is available widely over the internet.

Why: Problem statement

A cryptographic hash function shortens arbitrarily lengthy messages to digests of a compact and fixed length. Most of the pre-existing hash functions are designed to assess a compression function with a countable domain in a mode of operation, and the compression function itself is often structured from block ciphers or alterations. This modular design approach permits a rigorous security analysis via means of both cryptanalysis and provable security. We present a survey on the situation of the art in hash function security and modular design analysis. We focus on pre-existing security models and definitions, as well as on the security perspectives of designing secure compression functions (discursively) from either block ciphers or permutations. In all of these directions, we identify open difficulties that, once solved, would allow for increased confidence in the use of cryptographic hash functions.

How: Solution description

Open the ACME System 1 Web Application Access the Dashboard - the central location, where the user can pick a specific menu item Access the Work Items listing to view all the available tasks to be performed. For each

The activity of the type WI5 perform the following steps:

1. Open the Details page of the selected activity to retrieve the Client Details (Output data: Client Details)

2. Open the SHA1 Online Webpage - http://www.sha1- online.com/ and provide the following input: [ClientID]- [ClientName]

3. Retrieve Client Security Hash from the webpage. Go back to the Work. Item Details and select Update Work Item. Set the status to “Completed”

Multimedia applications have been used mostly and frequently and its security has become the main concern.

How is it different from competition

SHA stands for Secure Hashing Algorithm. The name itself gives the purpose of the algorithm. it's for cryptographic security. Unique meaning that two different sections of data can never produce the same hash – the next section explains why that is so important. File hash codes are really not unique identifiers. A hash code SHA-1 is of a solid length, so it cannot be unique for all possible inputs. But all before-mentioned hash functions are carefully designed to minimize the likelihood of a collision (couple distinct files with the same hash value). If you only take away individual things from this section, it should be that cryptographic hash algorithms produce irreversible also unique hashes. Irreversible meaning that if you only had a unique hash you couldn’t use that to figure out what the original piece of data obtained, therefore allowing the original data to remain protected and unknown. Unique meaning that two different pieces of data can never produce the same mixture – the subsequent segment describes why that remains so necessary.

Who are your customers

Customers of Client Security Hash are the people who are working on the online website and browsers. Client Security Hash customers should have Internet availability and a valid method of messaging to complete end-users. Higher security and personal encryption of data lead to favorable perceptions of client security. Enhanced exposure to technology also developed the probability of developing relevant attitudes towards new client security platforms.

Project Phases and Schedule

The idea: The idea of cryptography is to protect and prevent data transmitted in the presence of an adversary. A cryptographic transformation of data is a procedure by which plaintext data is used, or encrypted, resulting in a ciphertext that does not show the original input.

Planning: Cryptographic techniques are used to make secrecy and integrity of data in the presence of an adversary. Based on the security needs and the threats involved, several cryptographic methods such as symmetric-key or public-key can be used during shipping and accommodation of the data.

Designing: Modern cryptography is highly based on mathematical and computer science practice. Cryptographic algorithms are designed around computational hardness prediction, making likewise algorithms hard to break in practice by any opponent.

Testing method: The designed website is tested by different methods of testing before the use of live customers. Some of the methods of testing are Unit testing, Integration testing, Functionality testing, Usability testing, Interface testing, Compatibility, Performance, etc.

Execution: In cryptography, a timing attack is a side-wise attack in which the attacker tries to negotiate a cryptosystem by investigating the time used to execute cryptographic algorithms

Documentation process: Documentation process is a detailed description of how to implement a process. The process document outlines the exact steps needed to complete a task or process from start to finish. The section of documentation process ignites on how employee members perform the process, and not what the process is.

Resources Required

Hardware Requirement:

  • i3 Processor-Based Computer: The i3 is a dual-core computer processor, available for using both desktop and laptop. i3 processors are found as dual-core. However, a selected few high-end i3 processors are quad-core and have four cores.

  • RAM: Random-access memory(RAM) is a form of computer memory that is able to be read and changed in any order, mostly used to store working data and machine codes. A RAM device allows the data items to read or write in almost the same amount of time irrespective of the physical location of the data inside the memory

  • 50 GB Hard Disk

  • Monitor

  • Internet Connection

Software Requirement:

  • Java: Java is a high-level programming language. Java programs are interpreted by the Java Virtual Machine or JVM, which runs on various platforms. This means all Java programs are multiplatform and can run on various platforms, including Mac, Windows, and Unix systems.
  • Netbean: The NetBeans IDE allows Java developers with all the tools they need to build a professional Java SE application. The NetBeans IDE supports development for all JDK.
  • AWT: The Abstract Window Toolkit (AWT) is Java's platform-dependent, graphics, and UI widget toolkit, below Swing. The AWT is part of the Java Foundation Classes (JFC), the API for providing the graphical user interface (GUI) for Java programs.
  • MySQL: MySQL is an open-source relational database management system (RDBMS). The term "My" is the name of co-founder Michael Widenius's daughter, and "SQL", is Structured Query Language.

Comments

Leave a Comment

Post a Comment

Are you Interested in this project?


Do you need help with a similar project? We can guide you. Please Click the Contact Us button.


Contact Us

Social Sharing