Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
522 views

Network Security System: We Make Electronics Reach Out To Society

The document describes a proposed automated system for securing India's Public Distribution System of ration shops using biometrics and encryption techniques. The system would use fingerprint authentication instead of passwords. It would prevent fake fingerprints and securely store distribution records. The system is designed to be easy to use, even for illiterates, by imprinting fingerprints on ration cards to access personal accounts. The system would verify the category of users (such as Below Poverty Line) and ensure the correct allotment of food supplies. Encryption keys would be used such that even administrators could not access other users' accounts, reducing corruption.

Uploaded by

psr.ss
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
522 views

Network Security System: We Make Electronics Reach Out To Society

The document describes a proposed automated system for securing India's Public Distribution System of ration shops using biometrics and encryption techniques. The system would use fingerprint authentication instead of passwords. It would prevent fake fingerprints and securely store distribution records. The system is designed to be easy to use, even for illiterates, by imprinting fingerprints on ration cards to access personal accounts. The system would verify the category of users (such as Below Poverty Line) and ensure the correct allotment of food supplies. Encryption keys would be used such that even administrators could not access other users' accounts, reducing corruption.

Uploaded by

psr.ss
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 10

Download the original attachment

NETWORK SECURITY SYSTEM


IMPLEMENTATION OF BIOMETRICS BASED
SECURITY SYSTEM-CRASH -WITH
INTEGRATED TECHNIQUES OF
ENCAPSULATED NETWORKING.
We make Electronics reach out to
society
P.Soundar Rajan
L. Maria Joseph Kingsley

ABSTRACT

Is India growing?..If not, the factor is corruption…. What Our Former President
Dr.A.P.J Abdul Kalam feels is absolutely true. One among the largest of problems is in
the Public distribution system [Ration Shops]. Government provides food (ration) at
highly subsidized rates to the poor people.However, the issue of ration from ration shops
is laden with corruption. This is perhaps one of the most heinous types of corruption,
wherein poorest of the poor are deprived of their due share of food by the greedy.

“Survey reveals 87% wheat and 94% rice Siphoned off.

Survey revealed that out of a total of 182 families that we spoke to, 142 families did
not receive a single grain of wheat during the month of June. 167 families did not receive
a single grain of rice. Out of a total of 4650 Kgs of wheat supposed to have been
distributed to the people, only 595 Kgs had actually been received by the people. The rest
87% found its way to the black market. Out of a total of 1820 Kgs of rice supposed to
have been distributed as per daily sales registers, only 110 Kgs was received by the
people. Balance 94% was siphoned off.

We don’t believe in words changing these corrupted minds, We believe in technology


changing situations
The paper deals with the design of an automated system secured using public key
cryption. The system encompasses authentication without passwords (performing either
bar code reading or finger print reading), a plotting technique to avoid fake thumb
impressions, Integrated security processing ,introduction of verification chamber that
analyses three categories (Above Poverty Line (APL), Below Poverty Line (BPL) and
Antyodaya) which allows rights rendered to a right citizen. To distort the influence of
reputed corrupters,a brand new algorithm is designed in such a manner that even the
vendor is clueless of how the code is accessed .We perform automations such that
Machines maintain secrets. JavaScript implementations and hardware checking has been
done for the analysis of encryption and decryption techniques. The system’s usage is as
easy as falling off a log and has no bar for the illiterates.

PUBLIC DISTRIBUTION SYSTEM

Government provides food (ration) at highly subsidized rates to the poor people. The
ration is distributed to the people through a chain of shops called ration shops all over the
country. The Government issues licenses to private people to run these shops. The
shopkeepers get a commission from the Government to do so.

Three types of cards are issued by the government - above Poverty Line (APL), below
Poverty Line (BPL) and Antyodaya. There is little subsidy on rations meant for APL
cards. Antyodaya cards are issued to the poorest of the poor. Rations are issued to them at
highly subsidized rates. However, the issue of ration from ration shops is laden with
corruption. People face several types of problems. The shops do not open. Even if it
opens, the usual plea of the shopkeeper is that there is no stock. Even if the stock is there,
the ration provided is so adulterated that it is unfit for human consumption. Ration issued
to a person is less than the entitled quota of that person. The rates charged are much more
than the official prescribed rates. In nutshell, a shopkeeper tries his best to prevent people
from taking ration from him, so that he is left with as much ration as possible to sell in
the black market.

Corruption takes place in records. The ration is siphoned off by making false entries in
the records. Fake thumb impressions or signatures are put by the shopkeepers in the
names of the people and their rations are siphoned off. There are several examples which
stand as evidences for corruption in Public Distribution System.

NEWSPAPER HEADLINES:

“Triveni starts getting proper rations after several months”

“109 people file RTI applications demanding ration records”

“Parivartan workers beaten up when they go to inspect records”

“People terrorized and pressurized into withdrawing their RTI applications”


“Some shopkeepers start giving rations - Two ration shops suspended”

OVERVIEW OF CRASH:

HOW CRASH WORKS:


The details of the distribution are installed into the main system which is available
in all the distribution networks secured by Encapsulated Ipsec technology. Whenever the
initial access is made the codes corresponding to the user’s Finger prints are set as default
values for the first time and saved by the system .More than one similar fingerprint are
denied by the system. Once the code is saved by the system it is ready to be automatically
accessed.

The algorithm has been designed such that there are three keys n, d, e and any message
converted into a cipher text can only be accessed with keys n, d and n, e serves as the
public key. An outstanding feature of the system is that the accounts manager or the
software installer is unknown of the methods used to access another user’s code. This has
been established by separating the codes and assigning to the values n, c, d, where c
represents the cipher code.The cipher code is converted into real codes by using the keys
into n, d into which the user’s account is made. Since the codes are set as default values
and the accounts are made in real codes even the accounts manager and the software
developer cannot access another user’s account as we mentioned earlier “We maintain
automations such that Machines Maintain Secrets” .We find this a suitable method to get
rid of the most respected and reputed corrupters.

IT’S AS EASY AS FALLING OFF A LOG!

The system can be easily accessible and it is such that even a layman can do it. All
the user has to do is to just impress his finger prints or keep his/her ration card containing
the fingerprint, Put the money and go for the required amount of rice, wheat, kerosene
etc…Family bank/accounts is a record of family members codes which allows every
member of the family to access their account. Issue of ration cards with fingerprints
enables a user to access his account with a known user. Timer control and Refreshing
section are used to provide full security to a user according to the needs. Card
verification chamber maintains the distribution of right amount of things delivered to
right categories of people as already mentioned (Above Poverty Line, Below Poverty
Line, Antyodaya)

IT DOES MATTERS!

Whenever the user impresses his/her thumbprint the corresponding code is


activated and the separated cipher code is decrypted using the keys n,d.This points to the
real code into which the user’s account has been made. As soon as the money is inserted
into the transaction section the account gets activated and the control is transferred to the
verification chamber. if the real code has not been actually saved by the system, it
indicates wheather the user is a valid user or not .The verification chamber verifies the
categories of the people and it checks the availability of the user with the availability of
materials in the main memory, before which the load counter is being activated for the
required material with required quantity. As soon as the output is given, the system is
refreshed according to the desired needs either enabled by a time counter or at the access
of the next user.

INTEGRATED SECURITY PROCESSING

A high-performance network-security processing IC will provide the necessary


form factor and cost to be integrated into enterprise communication equipment and access
equipment. Although the number of simultaneous tunnels and maximum throughput for
each tunnel is an important factor, the time to create and tear down tunnels will become a
major issue as the number of tunnels for branch-to-branch and remote access increases.
The integration of symmetric data encryption and asymmetric tunnel-negotiation
algorithms on a single device provides a flexible solution. New devices with built-in
flexible processing, combined with key management software, will enable thousands of
tunnels to be set up and torn down on the fly. A new class of network security processor
optimized for the needs of the network provides the mandatory performance and flexible
architecture. CRASH that is now being designed demands a security processing solution
that is programmable, scaleable, and high performance.

A highly programmable architecture enables the same device to be used across a


range of platforms where the requirements can vary widely. This may be an important
factor for customers who want to maintain a security solution and minimize the impact of
adding new algorithms or adopting new protocols.

A BRAND NEW 'MULTI-PHASE' METHOD

Using a set of numbers (let's say a 128-bit key, or 256-bit key), generate a
repeatable but highly randomized pseudo-random number sequence

256 entries at a time use the random number sequence to generate arrays of
"cipher translation tables" as follows:

• Fill an array of integers with 256 random numbers.


• Sort the numbers using a method (like pointers) that lets you know the
original position of the corresponding number
• Using the original positions of the now-sorted integers, generate a table
of randomly sorted numbers between 0 and 255.

Now, generate a specific number of 256-byte tables. Let the random number
generator continue "in sequence" for all of these tables, so that each table is different.
Next, use a "shotgun technique" to generate "de-crypt" cipher tables. Basically, if
a maps to b, then b must map to a. So, b [a[n]] = n. get it? ('n' is a value between 0 and
255). Assign these values in a loop, with a set of 256-byte 'decrypt' tables that correspond
to the 256-byte 'encrypt' tables you generated in the preceding step. Now that you have
the translation tables, the basic cipher works like this: the previous byte's encrypted value
is the index of the 256-byte translation table. Alternately, for improved encryption, you
can use more than one byte, and either uses a 'checksum' or a CRC algorithm to
generate the index byte. You can then 'mod' it with the # of tables if you use less than 256
256-byte tables. Assuming the table is a 256x256 array, it would look like this:

crypto1 = a [crypto0] [value]

Where 'crypto1' is the encrypted byte and 'crypto0' is the previous byte's
encrypted value (or a function of several previous values). Naturally, the 1st byte will
need a "seed", which must be known. This may increase the total cipher size by an
additional 8 bits if you use 256x256 tables. Or, you can use the key you generated the
random list with, perhaps taking the CRC of it, or using it as a "lead in" encrypted byte
stream. Initially, we have tested this method using 16 'preceding' bytes to generate the
table index, starting with the 128-bit key as the initial seed of '16 previous bytes'.

On the decrypt, you do the same thing. Just make sure you use 'encrypted' values
as your table index both times. Or, use 'decrypted' values if you'd rather. They
must, of course, match.

SOFTWARE MAKE UP OF THE SYSTEM


However, if you're at a loss for a random sequence consider a FIBBONACCI sequence,
using DWORD's (like from your encryption key) as "seed" numbers, and possibly a 3rd
DWORD as an 'XOR' mask. An algorithm for generating a random sequence of numbers,
not necessarily connected with encrypting data, might look as follows:

unsigned long dw1, dw2, dw3, dwMask;

int i1;

unsigned long aRandom[256];

dw1 = {seed #1};

dw2 = {seed #2};

dwMask = {seed #3};

// this gives you 3 32-bit "seeds", or 96 bits total


for(i1=0; i1 < 256; i1++)

dw3 = (dw1 + dw2) ^ dwMask;

aRandom[i1] = dw3;

dw1 = dw2;

dw2 = dw3;

If you wanted to generate a list of random sequence numbers, let's say between zero and
the total number of random numbers in the list/

int __cdecl MySortProc(void *p1, void *p2)

unsigned long **pp1 = (unsigned long **)p1;

unsigned long **pp2 = (unsigned long **)p2;

if(**pp1 < **pp2)

return(-1);

else if(**pp1 > *pp2)

return(1);

return(0);

...
int i1;

unsigned long *apRandom[256];

unsigned long aRandom[256]; // same array as before, in this case

int aResult[256]; // results go here

for(i1=0; i1 < 256; i1++)

apRandom[i1] = aRandom + i1;

// now sort it

qsort(apRandom, 256, sizeof(*apRandom), MySortProc);

// final step - offsets for pointers are placed into output array

for(i1=0; i1 < 256; i1++)

aResult[i1] = (int)(apRandom[i1] - aRandom);

The result in 'aResult' should be a randomly sorted (but unique) array of integers with
values between 0 and 255, inclusive.
IMPLEMENTATION OF THE SECURITY ALGORITHM IN JAVASCRIPT:

import java.math.BigInteger;

import java.security.SecureRandom;

class Rsa

private BigInteger n, d, e;

public Rsa(int bitlen)

SecureRandom r = new SecureRandom();

BigInteger p = new BigInteger(bitlen / 2, 100, r);

BigInteger q = new BigInteger(bitlen / 2, 100, r);

n = p.multiply(q);

BigInteger m = (p.subtract(BigInteger.ONE))

.multiply(q.subtract(BigInteger.ONE));

e = new BigInteger("3");

while(m.gcd(e).intValue() > 1) e = e.add(new BigInteger("2"));

d = e.modInverse(m);

public BigInteger encrypt(BigInteger message)

return message.modPow(e, n);

public BigInteger decrypt(BigInteger message)

{
return message.modPow(d, n);

MINIATURING BIOMETRICS:

A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that


occur at Minutiae points. Fingerprint scanning essentially provides an identification of a
person based on the acquisition and recognition of those unique patterns and ridges in a
fingerprint. This system comprise of a sensor for scanning a fingerprint and a processor
which stores the fingerprint database and software which compares and matches the
fingerprint to the predefined database. Within the database, a fingerprint is usually
matched to a reference number, or PIN number which is then matched to a person’s name
or account. In instances of security the match is generally used to allow or disallow
access, but today this can also be used for something as simple as a time clock or payroll
access.

OUR SYSTEM ELIMINATES THE FOLLOWING:

• Avoids corruption by reputed people since the accounts manager or the software
coder cannot access another user’s account.
• Maintains the right amount of things given to the right category of people. Avoids
vendors selling things outside at higher cost.
• Avoids ration goods get sold in the black market.

ADVANTAGES:

• Very easy and quick to be accessed.


• Machines maintain secrets
• No need of passwords or any keys to access an account which is applicable to the
poor people
• Implementation cost is cheap
• Stocks maintenance will be easy and transparent.
• Enormously large queues in ration shops are avoided.
• Making the fingerprint as the key to encrypt their real codes.
• Last but not the least, the materials allotted by the government directly goes to
the public.
VISION DEDICATED
TO OUR FORMER PRESIDENT’S

“EMPOWERED NATION BY 2020”

WE FEED THE UNFED…….WE FEEL THAT THIS CRASH


SYSTEM MIGHT ADD TO THE STEPS WHICH DR.ABDUL
KALAM FEELS TO MAKE OUR NATION A DEVELOPED ONE
BY 2020.

You might also like