Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
09-09-2013, 04:27 PM
Post: #1
Security Using Colors and Armstrong Numbers Report
Security Using Colors and Armstrong Numbers

.docx  Security Using Colors 1.docx (Size: 636.27 KB / Downloads: 17)


In real world, data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. The universal technique for providing confidentiality of transmitted data is cryptography. This paper provides a technique to encrypt the data using a key involving Armstrong numbers and colors as the password. Three set of keys are used to provide secure data transmission with the colors acting as vital security element thereby providing authentication.
In the present world scenario it is difficult to transmit data from one place to another with security. This is because hackers are becoming more powerful nowadays. To ensure secured data transmission there are several techniques being followed. One among them is cryptography which is the practice and study of hiding information.
Encryption and decryption require the use of some secret information, usually referred to as a key. The data to be encrypted is called as plain text. The encrypted data obtained as a result of encryption process is called as cipher text. Depending on the encryption mechanism used, the same key might be used for both encryption and decryption, while for other mechanisms, the keys used for encryption and decryption might be different.
Now any color is the combination of three primary colors Red, Green and Blue in fixed quantities. A color is stored in a computer in form of three numbers representing the quantities of Red, Green and Blue respectively. This representation is called RGB representation which is used in computers to store images in BMP, JPEG and PDF formats. Here each pixel is represented as values for Red, Green and Blue. Thus any color can be uniquely represented in the three dimensional RGB cube as values of Red, Green and Blue.
Therefore, in our approach we make use of colors whose values serve as a password for initial authentication and encryption decryption process.

Existing System:-

There are various types of Cryptographic algorithms. In general they are categorized based on the number of keys that are employed for encryption and decryption The three types of algorithms are depicted as follows:
1. Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption. The most common algorithms in use include Data Encryption Standard (DES), Advanced Encryption Standard (AES).
2. Public Key Cryptography (PKC): Uses one key for encryption and another for decryption. RSA (Rivest, Shamir, Adleman) algorithm is an example.
3. Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information. MD Message Digest
The existing techniques involve the use of keys involving prime numbers and the like (RSA).

Proposed System:-

In this technique the first step is to assign a unique color for each receiver. Each color is represented with a set of three values and assigns a set of three key values to each receiver. The sender is aware of the required receiver to whom the data has to be sent. So the receiver’s unique color is used as the password. The set of three key values are added to the original color values and encrypted at the sender’s side. This encrypted color actually acts as a password.
As a step further ahead let us considers a technique in which we use Armstrong numbers and colors. Further we also use a combination, substitution and permutation methods to ensure data security.
It performs the substitution process by assigning the ASCII equivalent to the characters. Permutation process is performed by using matrices as in and Armstrong number.
The reverse is performed by the receiver. And the receiver is validated by the use of his unique color.
Rating Security Using Colors and Armstrong Numbers Report Options
Share Security Using Colors and Armstrong Numbers Report To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : security using colors and armstrong number, message security using armstrong numbers and authentication using colors, info about security using color and armstrong number, srs for security system using amstrog number and color, user authentication using colors and data security using armstrong numbers, srs for security using colors and armstong number, security using colors and armstrong numbers, cryptography using amstrong number, security using colors and armstrong numbers related projects, cryptography using color and armstrong number ppt, http seminarprojects com thread security using colors and armstrong numbers report,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  EMBEDDED PASSWORD BASED SECURITY DOOR LOCK SYSTEM USING AT89C51 project uploader 1 2,132 24-03-2016 11:08 AM
Last Post: mkaasees
Last Post: Yemightie
  Report on Security Using Colors and Armstrong Numbers study tips 1 2,663 15-10-2015 04:49 PM
Last Post: Guest
  RFID Security presentation Abstract 0 332 11-08-2015 12:53 PM
Last Post: presentation Abstract
  BANK SECURITY SYSTEM USING PIR SENSOR PPT study tips 1 2,030 04-07-2015 03:04 PM
Last Post: Guest
  Security System For DNS Using Cryptography presentation Abstract 0 318 12-06-2015 04:18 PM
Last Post: presentation Abstract
  Implementation of Security in WAN presentation Abstract 0 271 12-06-2015 03:47 PM
Last Post: presentation Abstract
  Automatic Alert Alarming For Security Systems presentation Abstract 0 291 12-06-2015 03:04 PM
Last Post: presentation Abstract
  PC TO PC COMMUNICATION USING LASER full report seminar addict 7 11,205 28-04-2015 10:25 AM
Last Post: mkaasees
  Java based networking Security project ideas electronics seminars 2 11,518 08-02-2015 12:41 PM
Last Post: Guest
This Page May Contain What is Security Using Colors and Armstrong Numbers Report And Latest Information/News About Security Using Colors and Armstrong Numbers Report,If Not ...Use Search to get more info about Security Using Colors and Armstrong Numbers Report Or Ask Here