SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
 International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, (IJCET)
                            & TECHNOLOGY October-December (2012), © IAEME
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 3, Issue 3, October - December (2012), pp. 291-299
                                                                               IJCET
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2012): 3.9580 (Calculated by GISI)                  ©IAEME
www.jifactor.com




          WRAPPED RSA CRYPTOGRAPHY CHECK ON WINDOW
          EXECUTABLE USING RECONFIGURABLE HARDWARE

                                          Rahul Jassal1
     1
       (Department of Computer Science & Applications, P.U.S.S.G.R.C/ Panjab University,
                       Hoshiarpur, India, rahulatssgpurchsp@gmail.com)

 ABSTRACT

 The paper presents secure system RSA cryptography model using FPGA based hardware
 dongle to prevent from extracting secret information about the software. Half side of the
 simulation is executing on hardware side and a further result is decrypted software side. RSA
 calculation architecture is proposed for FPGA that addresses the issues of scalability, flexible
 performance of public key crypto systems.

 Keywords: - Finite field architecture, Moxa_usbcable, RSA algorithm, Virtex FPGA,
             Encryption Simulation

I.        INTRODUCTION
  Data transmit over wireless network is in the air and not curbed to any wire. Due to this it is
  effortless for a hacker to nose around into the information that is being transferred over the
  wireless network. To prevent this there is a necessitate to encrypt the data in a way that it can
  only be deciphered by someone who has the decryption key. While most of this so called.
  Malicious code exploits holes in the operating system, we as humans are party to blame. All
  antivirus and security suites do is offer that additional layer of prevention. If we were clever
  enough to avoid all the evident threats by not clicking on that very oddly named.exe file or
  executing that mail attachment, we wouldn’t need a security suite, would we? It is widely
  known that security issues play a crucial role in the majority of computer and communication
  systems [1]. An innermost tool for achieving software protection is Cryptography.
  Cryptography algorithms are most proficiently implemented in routine hardware than in
  software running on general purpose processors. Hardware implementations are of
  tremendous value in case of high performance, security and active systems. Traditional ASIC
  solutions have the well known drawback of reduced flexibility compared to software
  solutions.

 1.1 LEGITIMATE VS. PIRATED MARKET
 Globally, businesses and consumers will spend more than $300 billion on PC software over
 the next four years, according to IDC estimates

                                                291
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
                                                         October December

   1. Given the current piracy rates, IDC predicts that, during the same four-year period,
                                                                the      four
      almost $200 billion worth of software will be pirated.




Since up-to-the-minute security protocols are ever more becoming algorithm autonomous, a
                 minute
high degree of elasticity with respect to the cryptography algorithms is desirable. The
                                                   cryptography
protection degrees of all the techniques are based on hardness of arithmetic problems. A
capable solution which combines high flexibility with the speed and physical security of
traditional hardware is the implementation of cryptographic algorithms on reconfigurable
devices such as FPGAs [2]. FPGAs are hardware devices whose purpose is not fixed and
which can be programmed in-system. An FPGA accomplishment can be merely upgraded to
                                system.
add in any set of rules changes without the need for pricey and time consuming physical
design, fabrication and testing required in case of ASICs

2.0 FPGA PROGRAMMING

Both the layers for hardware and software is not compromised to make the system rigid from
extracting secret information, more ever for ideal software it is extremely hard to detect that
an attack is underway. Here in the diagram the flowchart is shown for hardware side FPGA
accepts input message with encrypt keys which is synchronized with clock and further
handover to module for speed up execution and this in continuation is repeated for getting
                              d
equivalent cipher text and the closing figure depicts pin used for this dongle. The Figure 3
shown here is a Xilinx operated Spartan3 kit where the bit file is tuned [6].




                                             292
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
                                                         October December




The 8 bit on display is tuned for cipher text. The following properties for this FPGA is as
                isplay
follows
Product Category: - ALL, Family: - Spartan3, Device: - XC3S200, Package: - FT256
Speed: - 4, Top level Source Type: - HDL, Synthesis Tool: - XST (VHDL/Verilog)
Whenever there is question of securing or authenticating secret data on a public
              here
communication network this public key cryptography is extensively used. When deployed
with sufficiently long keys, these algorithms are believed to be unbreakable. For secure
communications among high performance computers that required elevated confidentiality
             ions
guarantees the strong cryptographic algorithms were first introduced. Now, advances in
semiconductor technology and hardware design have made it promising to execute these
algorithms in sound time even on user systems, thus enabling the mass market use of well-
       hms                                                          mass-market        well
built encryption to ensure privacy and authenticity of individuals’ personal communications.
Consequently, this transition has enabled the proliferation of a variety of secure services,
                                                                              secur
such as online banking and shopping. Examples of consumer electronics devices that
routinely rely on high-performance public key cryptography are Blu-ray players, smart
                         performance                                  Blu ray
phones, and ultra-portable devices.
                   portable




                                            293
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

In addition, low cost cryptographic engines are mainstream components in laptops, servers
and personal computers. A key requirement for all these hardware devices is that they must
be affordable. As a result, they commonly implement a straightforward design architecture
that entails a small silicon footprint and low-power profile.

3.0 METHODS OF PROTECTING SOFTWARE
       Usage of specially coated key diskettes and CDs, passwords and registration numbers
       Dependence on the Unique Computer Features
       Software-and-Hardware Protection Based on Dongles
       Cryptography with dongle protection
3.1 DONGLE/HARDWARE KEY
       Modern dongles include built-in strong encryption and use fabrication techniques
       designed to thwart reverse engineering
       Typical dongles also now contain non volatile memory — key parts of the software
       may actually be stored on the dongle
       However, security researchers warn that dongles still do not solve the trusted client
       problem
3.2 Design Methodology
The general design cycle for this work consisted of the following steps:
       Implementation of RSA encryption algorithm on Java and VB.NET.
       Implementation of AES encryption algorithm on Java platform.
       Implementation of RSA Decryption algorithm in VHDL for FPGA (dongle)
       programming.
       Implementation of AES Decryption algorithm in VHDL for FPGA (dongle)
       programming.
       Serial and USB interface between computer and FPGA (dongle) using UART and
       USB Protocol in VHDL, VB.NET and Java.
       Software testing using GUI interface in Java and VB.NET.
       On line (WEB based) software testing in VB.NET.
3.2.1 Hardware and Software Tools used
    Software Tools:
       Xilinx ISE and MODELSIM software for FPGA Programming
       JCreator and jdk1.6 for java platform
       VB.NET and SQL server
       MOXA USB cable drivers
   Hardware Tools:
       VIRTEX 4 (XC4VFX12) FPGA kit
       SPARTAN 3 (XC3S200) FPGA kit
       MOXA USB cable for USB interface
       RS232 serial cable for serial interface
       JTAG downloading cable
3.2.2 Serial and USB interface between PC and FPGA (dongle):
       UART Protocol: Universal Asynchronous Receiver Transmitter
       RS 232 connector : For Serial interfacing
       MOXA USB 2.0 cable : for USB interfacing
       Rivest, Shamir and Adleman (1977): use modular arithmetic
       Setting up by user A[5]: -
               Find two “large” primes, pA and qA


                                            294
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
                                                         October December

             Compute nA = pA×qA
                            pA
             Compute ϕ(nA)= (p
                        (nA)= (p-1)A x (q-1)A
             Find an exponent eA such that (eA, ϕ(nA)) = 1
             Find dA such that dA
                               dA×eA ≡ 1 (mod ϕ(nA))
             Publish nA and eA
       Encryption: EA(M) = MeA ≡ C (mod nA)
       Decryption: DA(C) = CdA ≡ M (mod nA)


4.0 DESIGN INTERFACE




This is the very first screen designed for testing the interface the interfacing port might be any
unused port or user can go for new port for the communication, the initiate hardware button
uploads the bit file into the spartan3 kit with the specified parameters required for
communication. For testing purpose user declared a Random number class in .NET for any
value between a certain limit and first and second value reserved for any 2 keys values for
this RSA implementation, As soon as focus changes to encrypted text box the encrypt and
decrypted data is shown in respective boxes. The small three text boxes is of three different
                                                             three
colors each time the user switches to next level the color of the boxes changes to red green
yellow. So for public key authentication the module sends a unique message m to a server
that is this time our machine which signs it with some private key say k and upon receiving
                                       signs
the digital signatures s, the user can authenticate the identity of server using (n, e) for
verification that s will produce the original message.

4.1 RSA Introduced
Since RSA, was introduced in 1977, and has been widely used for establishing safe and
                                         and
sound communication channels and for authenticating the identity of service providers over
insecure communication mediums. In the authentication scheme, the server implements
public key authentication with clients by signing a unique message from the client with its
                                 clients
private key, thus creating what is called a digital signature [4]. The signature is then returned
                                                                 .
to the client, which verifies it using the server’s known public key The procedure for
implementing public key authentication requires the construction of a suitable pair of public
             g
key (n, e) and private key (n, d). Here n is the product of two distinct big prime numbers, and
e and d are computed such that, for any given message m, the following identity holds true: m
                                                                           identity
_ (md)e mod n _(me)d mod n. To authenticate a message m, the server attaches a signature s

                                               295
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
                                                         October December

to the original message and transmits the pair. The server generates s from m using its private
key with the following computation: s _ md mod n. Anyone who knows the public key
                                                         Anyone
associated with the server can then verify that the message m and its signature s were
authentic by checking that: m _ se mod n.


4.2 Flowchart




4.3 Working and Architecture
The RSA class inside .NET module is wrapped with FPGA programming. Spartan3 kit get
                                                          FPGA
initialized with the required parameters as specified in bit file and data get uploaded, next is
to maintain a dongle check if dongle is already connected then user checks for any process is
running on the shell side and if some process is running we kill the process and this all done
under the umbrella of XML. And, suppose that if dongle is not connected again it goes for
RSA layer and through classes of Serial Port, a check is maintained through RTS and CTS
for presence of the dongle, next while the process status in Task Manager is checked if any of
the process that user wants to shoot is there or its entry is already there in database the .NET
module kill the process otherwise the entry with new name is saved into the database. User
                                                                                   data
can make a list of some processes that he/she want to kept into the database and make them
restrict on dongle bases

4.4 RSA BASED THRESHOLD CRYPTOGRAPHY (RSA                     (RSA-TC)
RSA is a highly secure, public key encryption algorithm which uses a public key and private
key to encrypt and decrypt a message. In public crypto systems there are two different keys: a
public key that is released publicly so anyone can find it, and a private key is the one that is
kept secret. The public key is used to encrypt the message, and private key is used to decrypt
                                                       message,
it. It is very difficult to find out what private key is used for a public key.




                                              296
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

4.5 RSA ENCRYPTION RESULT




In this paper an RSA calculation architecture is proposed for FPGAs that addresses the issues
of scalability, flexible performance, and silicon efficiency for the hardware acceleration of
Public Key crypto systems. Using techniques based around Montgomery math for
exponentiation, the proposed RSA calculation architecture is compared to existing FPGA-
based solutions for speed, FPGA utilisation, and scalability[3].

4.6 PARITY AND IMPLEMENTATION CHECK
     SerialPort1.PortName = "COM3"
     SerialPort1.BaudRate = 9600
     SerialPort1.Parity = Ports.Parity.None
     SerialPort1.DataBits = 8

    Dim Flag As Boolean
    Dim Reg As Integer = 1
    SerialPort1.RtsEnable = True
    Try
      SerialPort1.Open()
      Flag = SerialPort1.CtsHolding
      If Flag = False Then
         SerialPort1.Close()
         Response.Redirect("Default.aspx")
      End If
    Catch ex As Exception
      SerialPort1.Close()


                                             297
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

      End Try
If (phi Mod cnt <> 0) Then
          flag = 0
          carry = lcm(cnt, phi)
          gcd1 = cnt * phi / carry
          d = Dcomponent(cnt, phi)
          encript = System.Math.Pow(Double.Parse(carry1), 7) Mod n
          Dim signfEncpt = encript
          Dim dcompnt As Double
          While ((7 * dcompnt) Mod phi <> 1)
             dcompnt = dcompnt + 1
          End While
          Txt_FChk2 = dcompnt
          Dim arr(1) As Byte
          arr(0) = Byte.Parse(encript)
          SerialPort1.Write(arr, 0, arr.Length)
          Dim decript_byte As Byte
          decript_byte = SerialPort1.ReadByte
          'SerialPort1.Close()
          Dim rand_no As Double = Double.Parse(carry1)
          Txt_FChk2 = decript_byte
          Dim signop As Integer = Double.Parse(carry1)
          signum = parity_chk(decript_byte, signop)
          parity = shared_chk(decript_byte, signum)
          'SerialPort1.Close()
          Return parity
          Boredum(parity)

5.0 CONCLUSION
    This is one way out for wrapping RSA layer using .NET using hardware Spartan3 kit on a
    window based application. One can make restrict some applications with their Process
    Id’s entry into the database with the help of dongle. One can embed such initiators with
    any web based applications or games for let them stop for execution until and unless user
    withdraws dongle check.


REFERENCES

[1] William Stallings ,“Cryptography and Network Security, Principles and practices”
Edition 3d, Pearson Education

[2] M.K. Hani, H.Y.Wen, A.Paniandi, “Design and implementation of Private and Public
key Crypto processor for next generation IT Security applications”, Malaysian journal of
computer Science, vol.19 (1), 2006

[3] P. Montgomery, “Modular multiplication without trial division, “Mathematics of
Computation, No.44, pp.519-521,1985.



                                            298
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

[4]A. Menezes, P.Van Oorschot, and S.Vanstone, “Handbook of applied Cryptography”,
CRC Press, 1996

[5] R. J. Hwang, F.F.Su, Y.S.Yeh, C.Y. Chen,” An Efficient Decryption Method for RSA
Cryptosystem”, Proceedings of 19th international conference on Advanced Information
networking and Applications, 2005

[6] M. McLoone and J. V. McCanny, “Rijndael FPGA implementation utilizing look-up
tables,” in IEEEWorkshop on Signal Processing Systems, Sept. 2001, pp. 349–360.

[7] Daniel Cazzulino, ”Web Programming using VB.NET”

[8] Ganelon, “Visual Basic . Net Black Book”

[9] www.codeworks.it/net/VBNetRs232.htm

[10] msdn2.microsoft.com/en-us/library/a9910312.aspx

[11] www.learnasp.com/freebook/learn/cs_dbtable.aspx

[12] AES page available via http://www.nist.gov/CryptoToolkit.

[13] Computer Security Objects Register (CSOR): http://csrc.nist.gov/csor/.[19] For
javax.comm package: http://www.stanford.edu/~bsuter/javax.comm-v2 win32.zip[20] R.
Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures andPublic-Key
Cryptosystems. Communications of the ACM, Vol. 21 (2), pp.120–126.1978. Previously
released as an MIT "Technical Memo" in April 1977. Initial Publication of the RSA scheme

                AUTHORS PROFILE

                Rahul Jassal is working as Assistant Professor in Department of Computer
                Science & Application, Panjab University Regional Centre, Hoshiarpur,
                India. He received Master of Computer Application in year 2007 and clear
                the UGC-NET examination for subject “Computer Science & Application in
                the same year. He is with the post from last 5 years.




                                           299

Más contenido relacionado

La actualidad más candente

IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptographyShivam Singh
 
Dual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth ConnectionDual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth ConnectionIJERA Editor
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsReal-Time Innovations (RTI)
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network Michelle Holley
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksDefCamp
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 

La actualidad más candente (19)

IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
 
Dual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth ConnectionDual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth Connection
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
IoT4Devs (1)
IoT4Devs (1)IoT4Devs (1)
IoT4Devs (1)
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 
A05510105
A05510105A05510105
A05510105
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
 
2020 Smart Transportation Solution
2020 Smart Transportation  Solution2020 Smart Transportation  Solution
2020 Smart Transportation Solution
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 

Destacado

Proposed value projection hierarchy model for fibreglass
Proposed value projection hierarchy model for  fibreglassProposed value projection hierarchy model for  fibreglass
Proposed value projection hierarchy model for fibreglassiaemedu
 
Creative services and tools for guiding multimedia
Creative services and tools for guiding multimediaCreative services and tools for guiding multimedia
Creative services and tools for guiding multimediaiaemedu
 
Model for prediction of temperature distribution in workpiece for surface gri...
Model for prediction of temperature distribution in workpiece for surface gri...Model for prediction of temperature distribution in workpiece for surface gri...
Model for prediction of temperature distribution in workpiece for surface gri...iaemedu
 
Optimization of cutting parameters in dry turning operation of mild steel
Optimization of cutting parameters in dry turning operation of mild steelOptimization of cutting parameters in dry turning operation of mild steel
Optimization of cutting parameters in dry turning operation of mild steeliaemedu
 
Design and experimental investigations of pressure
Design and experimental investigations of pressureDesign and experimental investigations of pressure
Design and experimental investigations of pressureiaemedu
 
Extraction of qrs complexes using automated bayesian regularization neural ne...
Extraction of qrs complexes using automated bayesian regularization neural ne...Extraction of qrs complexes using automated bayesian regularization neural ne...
Extraction of qrs complexes using automated bayesian regularization neural ne...iaemedu
 
An analytical study on investors’ awareness and perception towards the hedge ...
An analytical study on investors’ awareness and perception towards the hedge ...An analytical study on investors’ awareness and perception towards the hedge ...
An analytical study on investors’ awareness and perception towards the hedge ...iaemedu
 
The effect of geometrical parameters on mixing and parallel jets mixing in a ...
The effect of geometrical parameters on mixing and parallel jets mixing in a ...The effect of geometrical parameters on mixing and parallel jets mixing in a ...
The effect of geometrical parameters on mixing and parallel jets mixing in a ...iaemedu
 
High performance parallel prefix adders with fast carry chain logic
High performance parallel prefix adders with fast carry chain logicHigh performance parallel prefix adders with fast carry chain logic
High performance parallel prefix adders with fast carry chain logiciaemedu
 
Job satisfaction and contributing variables among the bank employees in cudda...
Job satisfaction and contributing variables among the bank employees in cudda...Job satisfaction and contributing variables among the bank employees in cudda...
Job satisfaction and contributing variables among the bank employees in cudda...iaemedu
 

Destacado (10)

Proposed value projection hierarchy model for fibreglass
Proposed value projection hierarchy model for  fibreglassProposed value projection hierarchy model for  fibreglass
Proposed value projection hierarchy model for fibreglass
 
Creative services and tools for guiding multimedia
Creative services and tools for guiding multimediaCreative services and tools for guiding multimedia
Creative services and tools for guiding multimedia
 
Model for prediction of temperature distribution in workpiece for surface gri...
Model for prediction of temperature distribution in workpiece for surface gri...Model for prediction of temperature distribution in workpiece for surface gri...
Model for prediction of temperature distribution in workpiece for surface gri...
 
Optimization of cutting parameters in dry turning operation of mild steel
Optimization of cutting parameters in dry turning operation of mild steelOptimization of cutting parameters in dry turning operation of mild steel
Optimization of cutting parameters in dry turning operation of mild steel
 
Design and experimental investigations of pressure
Design and experimental investigations of pressureDesign and experimental investigations of pressure
Design and experimental investigations of pressure
 
Extraction of qrs complexes using automated bayesian regularization neural ne...
Extraction of qrs complexes using automated bayesian regularization neural ne...Extraction of qrs complexes using automated bayesian regularization neural ne...
Extraction of qrs complexes using automated bayesian regularization neural ne...
 
An analytical study on investors’ awareness and perception towards the hedge ...
An analytical study on investors’ awareness and perception towards the hedge ...An analytical study on investors’ awareness and perception towards the hedge ...
An analytical study on investors’ awareness and perception towards the hedge ...
 
The effect of geometrical parameters on mixing and parallel jets mixing in a ...
The effect of geometrical parameters on mixing and parallel jets mixing in a ...The effect of geometrical parameters on mixing and parallel jets mixing in a ...
The effect of geometrical parameters on mixing and parallel jets mixing in a ...
 
High performance parallel prefix adders with fast carry chain logic
High performance parallel prefix adders with fast carry chain logicHigh performance parallel prefix adders with fast carry chain logic
High performance parallel prefix adders with fast carry chain logic
 
Job satisfaction and contributing variables among the bank employees in cudda...
Job satisfaction and contributing variables among the bank employees in cudda...Job satisfaction and contributing variables among the bank employees in cudda...
Job satisfaction and contributing variables among the bank employees in cudda...
 

Similar a Wrapped rsa cryptography check on window

IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
4.report (cryptography &amp; computer network)
4.report (cryptography &amp; computer network)4.report (cryptography &amp; computer network)
4.report (cryptography &amp; computer network)JIEMS Akkalkuwa
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Implementation of the advanced encryption standard algorithm on an FPGA for ...
Implementation of the advanced encryption standard algorithm  on an FPGA for ...Implementation of the advanced encryption standard algorithm  on an FPGA for ...
Implementation of the advanced encryption standard algorithm on an FPGA for ...IJECEIAES
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...IJECEIAES
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...IRJET Journal
 
Review on security techniques for field programmable gate array
Review on security techniques for field programmable gate arrayReview on security techniques for field programmable gate array
Review on security techniques for field programmable gate arrayIAEME Publication
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 

Similar a Wrapped rsa cryptography check on window (20)

IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
4.report (cryptography &amp; computer network)
4.report (cryptography &amp; computer network)4.report (cryptography &amp; computer network)
4.report (cryptography &amp; computer network)
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Implementation of the advanced encryption standard algorithm on an FPGA for ...
Implementation of the advanced encryption standard algorithm  on an FPGA for ...Implementation of the advanced encryption standard algorithm  on an FPGA for ...
Implementation of the advanced encryption standard algorithm on an FPGA for ...
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
1678 1683
1678 16831678 1683
1678 1683
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
 
35 38
35 3835 38
35 38
 
40520130101005
4052013010100540520130101005
40520130101005
 
Review on security techniques for field programmable gate array
Review on security techniques for field programmable gate arrayReview on security techniques for field programmable gate array
Review on security techniques for field programmable gate array
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 

Más de iaemedu

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationiaemedu
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reorderingiaemedu
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanismiaemedu
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cmaiaemedu
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presenceiaemedu
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineeringiaemedu
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacementiaemedu
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approachiaemedu
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentiaemedu
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationiaemedu
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyiaemedu
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 

Más de iaemedu (20)

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow application
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reordering
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanism
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cma
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presence
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineering
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacement
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approach
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environment
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow application
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classify
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 

Wrapped rsa cryptography check on window

  • 1. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, (IJCET) & TECHNOLOGY October-December (2012), © IAEME ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 3, Issue 3, October - December (2012), pp. 291-299 IJCET © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2012): 3.9580 (Calculated by GISI) ©IAEME www.jifactor.com WRAPPED RSA CRYPTOGRAPHY CHECK ON WINDOW EXECUTABLE USING RECONFIGURABLE HARDWARE Rahul Jassal1 1 (Department of Computer Science & Applications, P.U.S.S.G.R.C/ Panjab University, Hoshiarpur, India, rahulatssgpurchsp@gmail.com) ABSTRACT The paper presents secure system RSA cryptography model using FPGA based hardware dongle to prevent from extracting secret information about the software. Half side of the simulation is executing on hardware side and a further result is decrypted software side. RSA calculation architecture is proposed for FPGA that addresses the issues of scalability, flexible performance of public key crypto systems. Keywords: - Finite field architecture, Moxa_usbcable, RSA algorithm, Virtex FPGA, Encryption Simulation I. INTRODUCTION Data transmit over wireless network is in the air and not curbed to any wire. Due to this it is effortless for a hacker to nose around into the information that is being transferred over the wireless network. To prevent this there is a necessitate to encrypt the data in a way that it can only be deciphered by someone who has the decryption key. While most of this so called. Malicious code exploits holes in the operating system, we as humans are party to blame. All antivirus and security suites do is offer that additional layer of prevention. If we were clever enough to avoid all the evident threats by not clicking on that very oddly named.exe file or executing that mail attachment, we wouldn’t need a security suite, would we? It is widely known that security issues play a crucial role in the majority of computer and communication systems [1]. An innermost tool for achieving software protection is Cryptography. Cryptography algorithms are most proficiently implemented in routine hardware than in software running on general purpose processors. Hardware implementations are of tremendous value in case of high performance, security and active systems. Traditional ASIC solutions have the well known drawback of reduced flexibility compared to software solutions. 1.1 LEGITIMATE VS. PIRATED MARKET Globally, businesses and consumers will spend more than $300 billion on PC software over the next four years, according to IDC estimates 291
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME October December 1. Given the current piracy rates, IDC predicts that, during the same four-year period, the four almost $200 billion worth of software will be pirated. Since up-to-the-minute security protocols are ever more becoming algorithm autonomous, a minute high degree of elasticity with respect to the cryptography algorithms is desirable. The cryptography protection degrees of all the techniques are based on hardness of arithmetic problems. A capable solution which combines high flexibility with the speed and physical security of traditional hardware is the implementation of cryptographic algorithms on reconfigurable devices such as FPGAs [2]. FPGAs are hardware devices whose purpose is not fixed and which can be programmed in-system. An FPGA accomplishment can be merely upgraded to system. add in any set of rules changes without the need for pricey and time consuming physical design, fabrication and testing required in case of ASICs 2.0 FPGA PROGRAMMING Both the layers for hardware and software is not compromised to make the system rigid from extracting secret information, more ever for ideal software it is extremely hard to detect that an attack is underway. Here in the diagram the flowchart is shown for hardware side FPGA accepts input message with encrypt keys which is synchronized with clock and further handover to module for speed up execution and this in continuation is repeated for getting d equivalent cipher text and the closing figure depicts pin used for this dongle. The Figure 3 shown here is a Xilinx operated Spartan3 kit where the bit file is tuned [6]. 292
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME October December The 8 bit on display is tuned for cipher text. The following properties for this FPGA is as isplay follows Product Category: - ALL, Family: - Spartan3, Device: - XC3S200, Package: - FT256 Speed: - 4, Top level Source Type: - HDL, Synthesis Tool: - XST (VHDL/Verilog) Whenever there is question of securing or authenticating secret data on a public here communication network this public key cryptography is extensively used. When deployed with sufficiently long keys, these algorithms are believed to be unbreakable. For secure communications among high performance computers that required elevated confidentiality ions guarantees the strong cryptographic algorithms were first introduced. Now, advances in semiconductor technology and hardware design have made it promising to execute these algorithms in sound time even on user systems, thus enabling the mass market use of well- hms mass-market well built encryption to ensure privacy and authenticity of individuals’ personal communications. Consequently, this transition has enabled the proliferation of a variety of secure services, secur such as online banking and shopping. Examples of consumer electronics devices that routinely rely on high-performance public key cryptography are Blu-ray players, smart performance Blu ray phones, and ultra-portable devices. portable 293
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME In addition, low cost cryptographic engines are mainstream components in laptops, servers and personal computers. A key requirement for all these hardware devices is that they must be affordable. As a result, they commonly implement a straightforward design architecture that entails a small silicon footprint and low-power profile. 3.0 METHODS OF PROTECTING SOFTWARE Usage of specially coated key diskettes and CDs, passwords and registration numbers Dependence on the Unique Computer Features Software-and-Hardware Protection Based on Dongles Cryptography with dongle protection 3.1 DONGLE/HARDWARE KEY Modern dongles include built-in strong encryption and use fabrication techniques designed to thwart reverse engineering Typical dongles also now contain non volatile memory — key parts of the software may actually be stored on the dongle However, security researchers warn that dongles still do not solve the trusted client problem 3.2 Design Methodology The general design cycle for this work consisted of the following steps: Implementation of RSA encryption algorithm on Java and VB.NET. Implementation of AES encryption algorithm on Java platform. Implementation of RSA Decryption algorithm in VHDL for FPGA (dongle) programming. Implementation of AES Decryption algorithm in VHDL for FPGA (dongle) programming. Serial and USB interface between computer and FPGA (dongle) using UART and USB Protocol in VHDL, VB.NET and Java. Software testing using GUI interface in Java and VB.NET. On line (WEB based) software testing in VB.NET. 3.2.1 Hardware and Software Tools used Software Tools: Xilinx ISE and MODELSIM software for FPGA Programming JCreator and jdk1.6 for java platform VB.NET and SQL server MOXA USB cable drivers Hardware Tools: VIRTEX 4 (XC4VFX12) FPGA kit SPARTAN 3 (XC3S200) FPGA kit MOXA USB cable for USB interface RS232 serial cable for serial interface JTAG downloading cable 3.2.2 Serial and USB interface between PC and FPGA (dongle): UART Protocol: Universal Asynchronous Receiver Transmitter RS 232 connector : For Serial interfacing MOXA USB 2.0 cable : for USB interfacing Rivest, Shamir and Adleman (1977): use modular arithmetic Setting up by user A[5]: - Find two “large” primes, pA and qA 294
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME October December Compute nA = pA×qA pA Compute ϕ(nA)= (p (nA)= (p-1)A x (q-1)A Find an exponent eA such that (eA, ϕ(nA)) = 1 Find dA such that dA dA×eA ≡ 1 (mod ϕ(nA)) Publish nA and eA Encryption: EA(M) = MeA ≡ C (mod nA) Decryption: DA(C) = CdA ≡ M (mod nA) 4.0 DESIGN INTERFACE This is the very first screen designed for testing the interface the interfacing port might be any unused port or user can go for new port for the communication, the initiate hardware button uploads the bit file into the spartan3 kit with the specified parameters required for communication. For testing purpose user declared a Random number class in .NET for any value between a certain limit and first and second value reserved for any 2 keys values for this RSA implementation, As soon as focus changes to encrypted text box the encrypt and decrypted data is shown in respective boxes. The small three text boxes is of three different three colors each time the user switches to next level the color of the boxes changes to red green yellow. So for public key authentication the module sends a unique message m to a server that is this time our machine which signs it with some private key say k and upon receiving signs the digital signatures s, the user can authenticate the identity of server using (n, e) for verification that s will produce the original message. 4.1 RSA Introduced Since RSA, was introduced in 1977, and has been widely used for establishing safe and and sound communication channels and for authenticating the identity of service providers over insecure communication mediums. In the authentication scheme, the server implements public key authentication with clients by signing a unique message from the client with its clients private key, thus creating what is called a digital signature [4]. The signature is then returned . to the client, which verifies it using the server’s known public key The procedure for implementing public key authentication requires the construction of a suitable pair of public g key (n, e) and private key (n, d). Here n is the product of two distinct big prime numbers, and e and d are computed such that, for any given message m, the following identity holds true: m identity _ (md)e mod n _(me)d mod n. To authenticate a message m, the server attaches a signature s 295
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME October December to the original message and transmits the pair. The server generates s from m using its private key with the following computation: s _ md mod n. Anyone who knows the public key Anyone associated with the server can then verify that the message m and its signature s were authentic by checking that: m _ se mod n. 4.2 Flowchart 4.3 Working and Architecture The RSA class inside .NET module is wrapped with FPGA programming. Spartan3 kit get FPGA initialized with the required parameters as specified in bit file and data get uploaded, next is to maintain a dongle check if dongle is already connected then user checks for any process is running on the shell side and if some process is running we kill the process and this all done under the umbrella of XML. And, suppose that if dongle is not connected again it goes for RSA layer and through classes of Serial Port, a check is maintained through RTS and CTS for presence of the dongle, next while the process status in Task Manager is checked if any of the process that user wants to shoot is there or its entry is already there in database the .NET module kill the process otherwise the entry with new name is saved into the database. User data can make a list of some processes that he/she want to kept into the database and make them restrict on dongle bases 4.4 RSA BASED THRESHOLD CRYPTOGRAPHY (RSA (RSA-TC) RSA is a highly secure, public key encryption algorithm which uses a public key and private key to encrypt and decrypt a message. In public crypto systems there are two different keys: a public key that is released publicly so anyone can find it, and a private key is the one that is kept secret. The public key is used to encrypt the message, and private key is used to decrypt message, it. It is very difficult to find out what private key is used for a public key. 296
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME 4.5 RSA ENCRYPTION RESULT In this paper an RSA calculation architecture is proposed for FPGAs that addresses the issues of scalability, flexible performance, and silicon efficiency for the hardware acceleration of Public Key crypto systems. Using techniques based around Montgomery math for exponentiation, the proposed RSA calculation architecture is compared to existing FPGA- based solutions for speed, FPGA utilisation, and scalability[3]. 4.6 PARITY AND IMPLEMENTATION CHECK SerialPort1.PortName = "COM3" SerialPort1.BaudRate = 9600 SerialPort1.Parity = Ports.Parity.None SerialPort1.DataBits = 8 Dim Flag As Boolean Dim Reg As Integer = 1 SerialPort1.RtsEnable = True Try SerialPort1.Open() Flag = SerialPort1.CtsHolding If Flag = False Then SerialPort1.Close() Response.Redirect("Default.aspx") End If Catch ex As Exception SerialPort1.Close() 297
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME End Try If (phi Mod cnt <> 0) Then flag = 0 carry = lcm(cnt, phi) gcd1 = cnt * phi / carry d = Dcomponent(cnt, phi) encript = System.Math.Pow(Double.Parse(carry1), 7) Mod n Dim signfEncpt = encript Dim dcompnt As Double While ((7 * dcompnt) Mod phi <> 1) dcompnt = dcompnt + 1 End While Txt_FChk2 = dcompnt Dim arr(1) As Byte arr(0) = Byte.Parse(encript) SerialPort1.Write(arr, 0, arr.Length) Dim decript_byte As Byte decript_byte = SerialPort1.ReadByte 'SerialPort1.Close() Dim rand_no As Double = Double.Parse(carry1) Txt_FChk2 = decript_byte Dim signop As Integer = Double.Parse(carry1) signum = parity_chk(decript_byte, signop) parity = shared_chk(decript_byte, signum) 'SerialPort1.Close() Return parity Boredum(parity) 5.0 CONCLUSION This is one way out for wrapping RSA layer using .NET using hardware Spartan3 kit on a window based application. One can make restrict some applications with their Process Id’s entry into the database with the help of dongle. One can embed such initiators with any web based applications or games for let them stop for execution until and unless user withdraws dongle check. REFERENCES [1] William Stallings ,“Cryptography and Network Security, Principles and practices” Edition 3d, Pearson Education [2] M.K. Hani, H.Y.Wen, A.Paniandi, “Design and implementation of Private and Public key Crypto processor for next generation IT Security applications”, Malaysian journal of computer Science, vol.19 (1), 2006 [3] P. Montgomery, “Modular multiplication without trial division, “Mathematics of Computation, No.44, pp.519-521,1985. 298
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME [4]A. Menezes, P.Van Oorschot, and S.Vanstone, “Handbook of applied Cryptography”, CRC Press, 1996 [5] R. J. Hwang, F.F.Su, Y.S.Yeh, C.Y. Chen,” An Efficient Decryption Method for RSA Cryptosystem”, Proceedings of 19th international conference on Advanced Information networking and Applications, 2005 [6] M. McLoone and J. V. McCanny, “Rijndael FPGA implementation utilizing look-up tables,” in IEEEWorkshop on Signal Processing Systems, Sept. 2001, pp. 349–360. [7] Daniel Cazzulino, ”Web Programming using VB.NET” [8] Ganelon, “Visual Basic . Net Black Book” [9] www.codeworks.it/net/VBNetRs232.htm [10] msdn2.microsoft.com/en-us/library/a9910312.aspx [11] www.learnasp.com/freebook/learn/cs_dbtable.aspx [12] AES page available via http://www.nist.gov/CryptoToolkit. [13] Computer Security Objects Register (CSOR): http://csrc.nist.gov/csor/.[19] For javax.comm package: http://www.stanford.edu/~bsuter/javax.comm-v2 win32.zip[20] R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures andPublic-Key Cryptosystems. Communications of the ACM, Vol. 21 (2), pp.120–126.1978. Previously released as an MIT "Technical Memo" in April 1977. Initial Publication of the RSA scheme AUTHORS PROFILE Rahul Jassal is working as Assistant Professor in Department of Computer Science & Application, Panjab University Regional Centre, Hoshiarpur, India. He received Master of Computer Application in year 2007 and clear the UGC-NET examination for subject “Computer Science & Application in the same year. He is with the post from last 5 years. 299