Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)

Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Security Using Colors and Armstrong Numbers Report
Post: #1

Security Using Colors and Armstrong Numbers

.docx  Security Using Colors 1.docx (Size: 636.27 KB / Downloads: 20)


In real world, data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. The universal technique for providing confidentiality of transmitted data is cryptography. This paper provides a technique to encrypt the data using a key involving Armstrong numbers and colors as the password. Three set of keys are used to provide secure data transmission with the colors acting as vital security element thereby providing authentication.
In the present world scenario it is difficult to transmit data from one place to another with security. This is because hackers are becoming more powerful nowadays. To ensure secured data transmission there are several techniques being followed. One among them is cryptography which is the practice and study of hiding information.
Encryption and decryption require the use of some secret information, usually referred to as a key. The data to be encrypted is called as plain text. The encrypted data obtained as a result of encryption process is called as cipher text. Depending on the encryption mechanism used, the same key might be used for both encryption and decryption, while for other mechanisms, the keys used for encryption and decryption might be different.
Now any color is the combination of three primary colors Red, Green and Blue in fixed quantities. A color is stored in a computer in form of three numbers representing the quantities of Red, Green and Blue respectively. This representation is called RGB representation which is used in computers to store images in BMP, JPEG and PDF formats. Here each pixel is represented as values for Red, Green and Blue. Thus any color can be uniquely represented in the three dimensional RGB cube as values of Red, Green and Blue.
Therefore, in our approach we make use of colors whose values serve as a password for initial authentication and encryption decryption process.

Existing System:-

There are various types of Cryptographic algorithms. In general they are categorized based on the number of keys that are employed for encryption and decryption The three types of algorithms are depicted as follows:
1. Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption. The most common algorithms in use include Data Encryption Standard (DES), Advanced Encryption Standard (AES).
2. Public Key Cryptography (PKC): Uses one key for encryption and another for decryption. RSA (Rivest, Shamir, Adleman) algorithm is an example.
3. Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information. MD Message Digest
The existing techniques involve the use of keys involving prime numbers and the like (RSA).

Proposed System:-

In this technique the first step is to assign a unique color for each receiver. Each color is represented with a set of three values and assigns a set of three key values to each receiver. The sender is aware of the required receiver to whom the data has to be sent. So the receiver’s unique color is used as the password. The set of three key values are added to the original color values and encrypted at the sender’s side. This encrypted color actually acts as a password.
As a step further ahead let us considers a technique in which we use Armstrong numbers and colors. Further we also use a combination, substitution and permutation methods to ensure data security.
It performs the substitution process by assigning the ASCII equivalent to the characters. Permutation process is performed by using matrices as in and Armstrong number.
The reverse is performed by the receiver. And the receiver is validated by the use of his unique color.

Marked Categories : security using colors and armstrong number, message security using armstrong numbers and authentication using colors, info about security using color and armstrong number, srs for security system using amstrog number and color, user authentication using colors and data security using armstrong numbers, srs for security using colors and armstong number, security using colors and armstrong numbers, cryptography using amstrong number, security using colors and armstrong numbers related projects, cryptography using color and armstrong number ppt, http seminarprojects com thread security using colors and armstrong numbers report,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  straddle bus seminar report pdf Guest 0 0 Today 07:06 AM
Last Post: Guest
  superconducting generators seminar report pdf Sandeepkp97 0 0 Yesterday 08:42 PM
Last Post: Sandeepkp97
  ground water recharge through waste water complete seminor report in pdf Guest 0 0 Yesterday 05:01 PM
Last Post: Guest
Smile industrial visit report on royal enfield srinidhi2705 0 0 23-07-2017 10:52 PM
Last Post: srinidhi2705
  project report on 2kva automatic voltage regulator Guest 0 0 23-07-2017 08:30 PM
Last Post: Guest
Thumbs Up a project report on college alumni assosition in php ppt Guest 0 0 23-07-2017 03:43 PM
Last Post: Guest
  seminar report high rise buildings ppt Guest 0 0 22-07-2017 12:25 PM
Last Post: Guest
  project report to start a optical showroom Guest 0 0 21-07-2017 05:19 PM
Last Post: Guest
  project documentation and report restaurant management system in vb gopikank 0 0 20-07-2017 05:17 PM
Last Post: gopikank
  project report Guest 2 344 20-07-2017 05:14 PM
Last Post: gopikank
This Page May Contain What is Security Using Colors and Armstrong Numbers Report And Latest Information/News About Security Using Colors and Armstrong Numbers Report,If Not ...Use Search to get more info about Security Using Colors and Armstrong Numbers Report Or Ask Here