Network Security System: We Make Electronics Reach Out To Society
Network Security System: We Make Electronics Reach Out To Society
ABSTRACT
Is India growing?..If not, the factor is corruption…. What Our Former President
Dr.A.P.J Abdul Kalam feels is absolutely true. One among the largest of problems is in
the Public distribution system [Ration Shops]. Government provides food (ration) at
highly subsidized rates to the poor people.However, the issue of ration from ration shops
is laden with corruption. This is perhaps one of the most heinous types of corruption,
wherein poorest of the poor are deprived of their due share of food by the greedy.
Survey revealed that out of a total of 182 families that we spoke to, 142 families did
not receive a single grain of wheat during the month of June. 167 families did not receive
a single grain of rice. Out of a total of 4650 Kgs of wheat supposed to have been
distributed to the people, only 595 Kgs had actually been received by the people. The rest
87% found its way to the black market. Out of a total of 1820 Kgs of rice supposed to
have been distributed as per daily sales registers, only 110 Kgs was received by the
people. Balance 94% was siphoned off.
Government provides food (ration) at highly subsidized rates to the poor people. The
ration is distributed to the people through a chain of shops called ration shops all over the
country. The Government issues licenses to private people to run these shops. The
shopkeepers get a commission from the Government to do so.
Three types of cards are issued by the government - above Poverty Line (APL), below
Poverty Line (BPL) and Antyodaya. There is little subsidy on rations meant for APL
cards. Antyodaya cards are issued to the poorest of the poor. Rations are issued to them at
highly subsidized rates. However, the issue of ration from ration shops is laden with
corruption. People face several types of problems. The shops do not open. Even if it
opens, the usual plea of the shopkeeper is that there is no stock. Even if the stock is there,
the ration provided is so adulterated that it is unfit for human consumption. Ration issued
to a person is less than the entitled quota of that person. The rates charged are much more
than the official prescribed rates. In nutshell, a shopkeeper tries his best to prevent people
from taking ration from him, so that he is left with as much ration as possible to sell in
the black market.
Corruption takes place in records. The ration is siphoned off by making false entries in
the records. Fake thumb impressions or signatures are put by the shopkeepers in the
names of the people and their rations are siphoned off. There are several examples which
stand as evidences for corruption in Public Distribution System.
NEWSPAPER HEADLINES:
OVERVIEW OF CRASH:
The algorithm has been designed such that there are three keys n, d, e and any message
converted into a cipher text can only be accessed with keys n, d and n, e serves as the
public key. An outstanding feature of the system is that the accounts manager or the
software installer is unknown of the methods used to access another user’s code. This has
been established by separating the codes and assigning to the values n, c, d, where c
represents the cipher code.The cipher code is converted into real codes by using the keys
into n, d into which the user’s account is made. Since the codes are set as default values
and the accounts are made in real codes even the accounts manager and the software
developer cannot access another user’s account as we mentioned earlier “We maintain
automations such that Machines Maintain Secrets” .We find this a suitable method to get
rid of the most respected and reputed corrupters.
The system can be easily accessible and it is such that even a layman can do it. All
the user has to do is to just impress his finger prints or keep his/her ration card containing
the fingerprint, Put the money and go for the required amount of rice, wheat, kerosene
etc…Family bank/accounts is a record of family members codes which allows every
member of the family to access their account. Issue of ration cards with fingerprints
enables a user to access his account with a known user. Timer control and Refreshing
section are used to provide full security to a user according to the needs. Card
verification chamber maintains the distribution of right amount of things delivered to
right categories of people as already mentioned (Above Poverty Line, Below Poverty
Line, Antyodaya)
IT DOES MATTERS!
Using a set of numbers (let's say a 128-bit key, or 256-bit key), generate a
repeatable but highly randomized pseudo-random number sequence
256 entries at a time use the random number sequence to generate arrays of
"cipher translation tables" as follows:
Now, generate a specific number of 256-byte tables. Let the random number
generator continue "in sequence" for all of these tables, so that each table is different.
Next, use a "shotgun technique" to generate "de-crypt" cipher tables. Basically, if
a maps to b, then b must map to a. So, b [a[n]] = n. get it? ('n' is a value between 0 and
255). Assign these values in a loop, with a set of 256-byte 'decrypt' tables that correspond
to the 256-byte 'encrypt' tables you generated in the preceding step. Now that you have
the translation tables, the basic cipher works like this: the previous byte's encrypted value
is the index of the 256-byte translation table. Alternately, for improved encryption, you
can use more than one byte, and either uses a 'checksum' or a CRC algorithm to
generate the index byte. You can then 'mod' it with the # of tables if you use less than 256
256-byte tables. Assuming the table is a 256x256 array, it would look like this:
Where 'crypto1' is the encrypted byte and 'crypto0' is the previous byte's
encrypted value (or a function of several previous values). Naturally, the 1st byte will
need a "seed", which must be known. This may increase the total cipher size by an
additional 8 bits if you use 256x256 tables. Or, you can use the key you generated the
random list with, perhaps taking the CRC of it, or using it as a "lead in" encrypted byte
stream. Initially, we have tested this method using 16 'preceding' bytes to generate the
table index, starting with the 128-bit key as the initial seed of '16 previous bytes'.
On the decrypt, you do the same thing. Just make sure you use 'encrypted' values
as your table index both times. Or, use 'decrypted' values if you'd rather. They
must, of course, match.
int i1;
aRandom[i1] = dw3;
dw1 = dw2;
dw2 = dw3;
If you wanted to generate a list of random sequence numbers, let's say between zero and
the total number of random numbers in the list/
return(-1);
return(1);
return(0);
...
int i1;
// now sort it
// final step - offsets for pointers are placed into output array
The result in 'aResult' should be a randomly sorted (but unique) array of integers with
values between 0 and 255, inclusive.
IMPLEMENTATION OF THE SECURITY ALGORITHM IN JAVASCRIPT:
import java.math.BigInteger;
import java.security.SecureRandom;
class Rsa
private BigInteger n, d, e;
n = p.multiply(q);
BigInteger m = (p.subtract(BigInteger.ONE))
.multiply(q.subtract(BigInteger.ONE));
e = new BigInteger("3");
d = e.modInverse(m);
{
return message.modPow(d, n);
MINIATURING BIOMETRICS:
• Avoids corruption by reputed people since the accounts manager or the software
coder cannot access another user’s account.
• Maintains the right amount of things given to the right category of people. Avoids
vendors selling things outside at higher cost.
• Avoids ration goods get sold in the black market.
ADVANTAGES: