Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)

Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Security Using Colors and Armstrong Numbers Report
Post: #1

Security Using Colors and Armstrong Numbers

.docx  Security Using Colors 1.docx (Size: 636.27 KB / Downloads: 21)


In real world, data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. The universal technique for providing confidentiality of transmitted data is cryptography. This paper provides a technique to encrypt the data using a key involving Armstrong numbers and colors as the password. Three set of keys are used to provide secure data transmission with the colors acting as vital security element thereby providing authentication.
In the present world scenario it is difficult to transmit data from one place to another with security. This is because hackers are becoming more powerful nowadays. To ensure secured data transmission there are several techniques being followed. One among them is cryptography which is the practice and study of hiding information.
Encryption and decryption require the use of some secret information, usually referred to as a key. The data to be encrypted is called as plain text. The encrypted data obtained as a result of encryption process is called as cipher text. Depending on the encryption mechanism used, the same key might be used for both encryption and decryption, while for other mechanisms, the keys used for encryption and decryption might be different.
Now any color is the combination of three primary colors Red, Green and Blue in fixed quantities. A color is stored in a computer in form of three numbers representing the quantities of Red, Green and Blue respectively. This representation is called RGB representation which is used in computers to store images in BMP, JPEG and PDF formats. Here each pixel is represented as values for Red, Green and Blue. Thus any color can be uniquely represented in the three dimensional RGB cube as values of Red, Green and Blue.
Therefore, in our approach we make use of colors whose values serve as a password for initial authentication and encryption decryption process.

Existing System:-

There are various types of Cryptographic algorithms. In general they are categorized based on the number of keys that are employed for encryption and decryption The three types of algorithms are depicted as follows:
1. Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption. The most common algorithms in use include Data Encryption Standard (DES), Advanced Encryption Standard (AES).
2. Public Key Cryptography (PKC): Uses one key for encryption and another for decryption. RSA (Rivest, Shamir, Adleman) algorithm is an example.
3. Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information. MD Message Digest
The existing techniques involve the use of keys involving prime numbers and the like (RSA).

Proposed System:-

In this technique the first step is to assign a unique color for each receiver. Each color is represented with a set of three values and assigns a set of three key values to each receiver. The sender is aware of the required receiver to whom the data has to be sent. So the receiver’s unique color is used as the password. The set of three key values are added to the original color values and encrypted at the sender’s side. This encrypted color actually acts as a password.
As a step further ahead let us considers a technique in which we use Armstrong numbers and colors. Further we also use a combination, substitution and permutation methods to ensure data security.
It performs the substitution process by assigning the ASCII equivalent to the characters. Permutation process is performed by using matrices as in and Armstrong number.
The reverse is performed by the receiver. And the receiver is validated by the use of his unique color.

Marked Categories : security using colors and armstrong number, message security using armstrong numbers and authentication using colors, info about security using color and armstrong number, srs for security system using amstrog number and color, user authentication using colors and data security using armstrong numbers, srs for security using colors and armstong number, security using colors and armstrong numbers, cryptography using amstrong number, security using colors and armstrong numbers related projects, cryptography using color and armstrong number ppt, http seminarprojects com thread security using colors and armstrong numbers report,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Ultrasonic Trapping In Capillaries For Trace-Amount Bi (Download Full Seminar Report) Computer Science Clay 2 6,345,353 Today 11:59 AM
Last Post: dhanabhagya
  fuel from plastic waste full report seminar presentation 25 96,187,886 Today 10:40 AM
Last Post: dhanabhagya
  Mini project report on SHADOW ALARM project girl 5 11,060 Today 03:50 AM
Last Post: SharonJer
  nanorobotics full report project topics 24 75,093,775 Yesterday 05:50 PM
Last Post: Guest
  siwes report on science laboratory technology pdf Guest 1 0 15-01-2018 01:58 PM
Last Post: dhanabhagya
  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Report project girl 3 2,594 15-01-2018 01:56 PM
Last Post: dhanabhagya
  8K High Resolution Camera System : Seminar Report and PPT seminar projects maker 4 2,861 14-01-2018 11:08 PM
Last Post: yaswanth reddy gundra
  anti locking braking system full report seminar topics 6 19,245,065 14-01-2018 04:56 AM
Last Post: SharonJer
  siwes report on science laboratory technology pdf bello idirs wolf 1 0 12-01-2018 12:10 PM
Last Post: dhanabhagya
  GPS for Environmental Management full report project report tiger 5 19,480,403 12-01-2018 10:52 AM
Last Post: dhanabhagya
This Page May Contain What is Security Using Colors and Armstrong Numbers Report And Latest Information/News About Security Using Colors and Armstrong Numbers Report,If Not ...Use Search to get more info about Security Using Colors and Armstrong Numbers Report Or Ask Here