SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1077
Abstract-- Most of the file protection softwares provides
either one level protection of the simple encryption method
or two level protection which is password protection and
encryption using simple key generation algorithm which key
is generated by the softwares by using characters of
password given by the users. In such a softwares or
applications when once password cracked or reverse
engineering is done by simple entering password one can
have access the file or decrypt the file. My research work
will provide one more level protection for such a problem
which generate Symmetry key using USB storage device to
encrypt file. This research work will carry out not only
protection two level protection but also provide extra third
level protection to protect file using USB storage device.
USB File Lock Using USB Storage Device and Digital
Keys (Signature) is a high performance File encryption /
protection program, password securing your file against
outside unauthorized access by the use of an USB
stick/Storage. You should provide facility to send password
on sms and even email so that authorised person can use for
decrypt a file. You should provide facility to encrypt all type
of files without restrictions. Password encryption process
should be there so no one can access password specified
directly from the encrypted file. This provides you security
for your data and private information when your data is in
transit or in the email as attachment. Any person getting
hold of your files will not be able to use them unless he/she
has the USB Storage from the same set. We are planning to
use an USB Storage to store the encryption key and also
uses three other verification keys stored inside Storage plus
a unique hardware serial number of the Storage. This makes
it very safe and can even be used in military communication.
Advantage of USB Storage is that its easily available at
reasonable rates. SO no special hardware is required for this.
A storage or memory USB Storage, also called a memory
stick, provides a convenient means to pass files between
computers or devices. The memory stick contains a
rewritable solid-state memory chip that does not require
power to retain its contents. As capacities have grown and
price has dropped, these portable, plug-and-play storage
drives have replaced floppy disks and even writable discs
for exchanging files and archiving data.
I. INTRODUCTION
A. What is Cryptography?
Cryptography is one of the most complex aspects used by a
software developer. Using cryptographic algorithm it
requires a high level of mathematical knowledge.
Fortunately, with Microsoft .NET, newly created classes
wrap up these sophisticated algorithms into fairly easy-to-
use properties and methods this paper gives you an overview
of the cryptography support that is provided by the .NET
Framework.
However Following jargons give you knowledge about
Cryptography:
1) Data that can be read and understood with its original
form is called 'plaintext' or 'cleartext'.
2) The method of disguising plaintext in such a way as
to hide its meaning is called 'Encryption'.
3) Encrypting plaintext results is now in unreadable
form of data called 'Ciphertext'. You use encryption
to make the information secure and hidden from
anyone for whom it is not intended, even those who
can see the encrypted data.
4) The process of reversing Ciphertext to its original
plaintext is called 'Decryption'.
5) And finally 'key' is a string of bits used for encrypt
and decrypt the information to be transmitted. It is a
randomly generated set of numbers/ characters that is
used to encrypt/decrypt information.
B. Types of Cryptography
1) Private Key Encryption
Private Key encryption, also referred to as conventional or
symmetric or single-key encryption was the only available
option prior to the advent of Public Key encryption in 1976.
This form of encryption was used by emperors like Julius
Caesar and other military organizations to convey secret
messages. This key requires all communicating parties, to
share a common key. With private-key encryption, you
encrypt a secret message using a key that only you know. To
decrypt the message, you need to use the same key. Private-
key cryptography is effective only if the key can be kept
secret. Despite the potential weakness of private-key
encryption, it is very easy to implement and computationally
doesn't consume excessive resources.
2) Public-key encryption
Public key encryption algorithms are based on the premise
that each sender and recipient has a private key, known only
to him/her and a public key, which can be known by anyone.
Each encryption/decryption process requires at least one
public key and one private key. Each is related to the other
mathematically, such that messages encrypted with the
public key can only be decrypted with the corresponding
private key.
3) .NET and Cryptography
.NET provides a set of cryptographic objects, supporting
well-known algorithms and common uses including hashing,
encryption, and generating digital signatures. These objects
are designed in a manner that facilitates the incorporation of
these basic capabilities into more complex operations, such
A Symmetric Key Generation for File Encryption and Protection
using/by USB Storage Device
Kajal K. Isamaliya1
Mitesh R. Patel2
Ankur P. Desai3
Pankaj Singh Parihar4
1, 2, 4
M.Tech. 3
Assistant Professor
1, 2, 4
Computer Science Eng. Department, ITM College, Bhailwara, Rajasthan,India.
3
Electrical Eng. Department, Shri Sitrambhai Naranji Patel Institute of Technology
pankajsinghparihar2002@gmail.com
A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device
(IJSRD/Vol. 1/Issue 5/2013/0010)
All rights reserved by www.ijsrd.com 1078
as signing and encrypting a document. Cryptographic
objects are used by .NET to support internal services, but
are also available to developers who need cryptographic
support. The .NET Framework provides implementations of
many such standard cryptographic algorithms and objects.
Similar to the ready availability of simple authentication
features within the .NET Framework, cryptographic
primitives are also easily accessible to developers via
stream-based managed code libraries for encryption, digital
signatures, hashing, and random number generation.
The System, Security. Cryptography namespace in the .NET
Framework provides these cryptographic services.
C. The Algorithm support includes:
1) RSA and DSA public key (asymmetric) encryption
Asymmetric algorithms operate on fixed buffers. They use
a public-key algorithm for encryption/decryption. An
example for asymmetric algorithms is the RSA algorithm
which is so named after its three inventors Rivest, Shamir,
and Adleman. It is a popular public-key algorithm - the de
facto standard - for digital signatures and can be used for
encryption as well. The DSA_CSP is an implementation of
the digital signature algorithm (DSA). This is a public-key
algorithm. It can be used to create and verify a digital
signature.
DES, TripleDES, and RC2 private key (symmetric)
encryption-symmetric algorithms are used to modify
variable length buffers and perform one operation for
periodical data input. They use a single secret key to encrypt
and decrypt data. The Data Encryption Standard (DES) is a
world-wide standard for data encryption. It is the most
popular encryption algorithm. It is implemented by the
DES_CSP class. This class represents a stream where you
pour in data that is encrypted/decrypted using a single key.
The Triple DES encryption algorithm operates on a block of
data three times using one key. RC2 stands for Rivest
Cipher.
2) MD5 and SHA1 hashing
MD5 - Message Digest 5-is a one-way hash algorithm.
Given variable length data as input it always produces a
128-bit hash value. The Secure Hash Algorithm (SHA) also
is a one-way hash algorithm that produces a 160-bit hash
value, which is longer than the MD5 produced hash value.
In this paper we using RSA Algorithm for encryption and
decryption.
II. BASIC THEORY: HOW THIS WORKS?
1) Generates a Unique protection-key for each USB stick
/ Storage
2) Encrypt Original file for first level protection ,
Encryption is based on customized algorithm so that
its notpossible to decrypt without knowing the keys
used in Encryption process.
3) Generate digital signatures (Master key and Subkey)
randomly or as per Users selection and store digital
signatures in encrypted form.
4) Denies access to unauthorized users or invalid Storage
5) Preserves Encryption status even after reboot
6) Facility to upload file on FTP server using FTP
protocol
7) Facility to send key to decrypt file via sms on any
mobile device
Fig.1: Asymmetric Encryption
Now I provide here some code for encryption the file.
private void button4_Click(object sender, EventArgs e)
{
Byte[] mBytArr;
int mLen = 65536;
if (textBox1.Text.Length == 0 ||
textBox2.Text.Length == 0 || textBox3.Text.Length == 0)
{
MessageBox.Show("Please fill all the field..??");
return;
}
if (textBox3.Text.Length < 8)
{
MessageBox.Show("Password must be of at least
8 character.", "Alert");
return;
}
if (checkBox1.Checked)
{
if (textBox4.Text.Length == 0)
{
MessageBox.Show("you must insert a dongle");
return;
}
}
if (checkBox2.Checked)
{
if (textBox5.Text.Length == 0)
{
MessageBox.Show("Please enter the
Email address.");
return;
}
}
if (checkBox3.Checked)
{
if (textBox6.Text.Length != 10)
{
MessageBox.Show("Please enter the Valid
Mobile No.");
return;
}
}
string ext;
ext =
textBox1.Text.Substring(textBox1.Text.LastIndexOf('.') +
1);
A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device
(IJSRD/Vol. 1/Issue 5/2013/0010)
All rights reserved by www.ijsrd.com 1079
ext = ext.PadLeft(5, '+');
string si;
si = label8.Text.PadLeft(30, '+');
string alg = "#$%^@";
string usb;
usb = textBox4.Text.PadLeft(30, '+');
string pwd;
pwd = textBox3.Text.PadLeft(30, '+');
String finalstr;
finalstr = ext + si + usb + pwd + alg;
string result;
FileStream fs = new FileStream(textBox1.Text,
FileMode.Open, FileAccess.Read);
FileInfo fi = new FileInfo("d:imptemp");
if (fi.Exists)
{
fi.Delete();
}
FileStream res = new FileStream("d:imptemp",
FileMode.CreateNew, FileAccess.Write);
BinaryReader rH;
BinaryWriter wN;
rH = new BinaryReader(fs);
wN = new BinaryWriter(res);
while (fs.Position < fs.Length)
{
mBytArr = rH.ReadBytes(mLen);
wN.Write(mBytArr);
}
DotNetEncrypt.SystemEncrypt st = new
DotNetEncrypt.SystemEncrypt();
result = st.EncryptFile(textBox3.Text,
"d:imptemp", textBox2.Text);
MessageBox.Show(result);
if (checkBox3.Checked)
{
if (textBox6.Text.Length == 10)
{
webBrowser1.Navigate("http://www.itcodes.com/sms/index
o.php?msg=your password is" + textBox3.Text + "&ph=" +
textBox6.Text);
}
}
if (checkBox2.Checked)
{
if (textBox5.Text.Length != 0)
{
smtplibs.netmail ne = new smtplibs.netmail();
ne.sendmail(textBox5.Text, "Your password is
" + textBox3.Text, textBox2.Text);
}
}
}
private void button1_Click(object sender, EventArgs e)
{
if (openFileDialog1.ShowDialog() !=
DialogResult.Cancel)
{
textBox1.Text = openFileDialog1.FileName;
textBox2.Text = textBox1.Text.Substring(0,
textBox1.Text.LastIndexOf('.') + 1) + "enc";
FileInfo fi = new FileInfo(textBox1.Text);
//fi.Length;
label8.Text = fi.Length.ToString();
}
}
private void checkBox1_CheckedChanged(object
sender, EventArgs e)
{
if (checkBox1.Checked)
{
//textBox4.Enabled=false;
winusbdevice.usbserial usb = new
winusbdevice.usbserial();
String serial;
serial = usb.getserial();
textBox4.Text
serial.Substring(serial.LastIndexOf('') + 1);
}
else
{
textBox4.Enabled = false;
}
}
private void checkBox3_CheckedChanged(object sender,
EventArgs e)
{
if (checkBox3.Checked)
{
textBox6.Enabled = true;
//return;
}
else
{
textBox6.Enabled = false;
}
}
}
}
}
In above code I provide the encryption of a file using .net. in
this I use the padding in which the password is combine
with some other character. I also Provide code for USB
device’s serial no to protect the file which is different in all
USB devices.
Now following is the code for decrypt the file.
private void button2_Click(object sender, EventArgs e)
{
DotNetEncrypt.SystemEncrypt st = new
DotNetEncrypt.SystemEncrypt();
string abc;
abc = st.DecryptFile(textBox3.Text, textBox1.Text,
textBox4.Text + ".tmp");
if (abc != "Done")
{
MessageBox.Show("invalid Password");
return;
}
long curpost, i;
A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device
(IJSRD/Vol. 1/Issue 5/2013/0010)
All rights reserved by www.ijsrd.com 1080
String finalstr = "";
FileStream fo = new FileStream(textBox4.Text +
".tmp", FileMode.Open, FileAccess.Read);
BinaryReader br = new BinaryReader(fo);
fo.Position = fo.Length - 100;
curpost = fo.Position;
for (i = curpost; i < fo.Length; i++)
{
finalstr += (char)fo.ReadByte();
}
fo.Close();
fo.Dispose();
br.Close();
// MessageBox.Show(finalstr);
string ext;
ext = finalstr.Substring(0, 5);
ext = ext.Trim('+');
// MessageBox.Show(ext);
string si;
si = finalstr.Substring(5, 30);
si = si.Trim('+');
// MessageBox.Show(si);
string usb;
usb = finalstr.Substring(35, 30);
usb = usb.Trim('+');
//MessageBox.Show(usb);
string pwd;
pwd = finalstr.Substring(65, 30);
pwd = pwd.Trim('+');
// MessageBox.Show(pwd);
string alg;
alg = finalstr.Substring(95, 5);
//MessageBox.Show(alg);
if (alg != "#$%^@")
{
MessageBox.Show("Invalid Algorithm");
return;
}
if (usb != textBox2.Text)
{
MessageBox.Show("Invalid dongle");
FileInfo fin = new FileInfo(textBox4.Text +
".tmp");
fin.Delete();
return;
}
FileInfo fina = new FileInfo(textBox4.Text +
".tmp");
fina.CopyTo(textBox4.Text + "." + ext);
fina.Delete();
MessageBox.Show("Done");
}
III. APPLICATIONS
1) Used in school and colleges for the security of student
detail.
2) Used in industries to secure it symbol.
3) Used by fashion designer for security of its catalogs.
4) Used in bank so that unauthorized user cannot use
account holder's personal detail.
5) Used by any person to secure his/her personal detail
like property paper, bank balance and about mediclaim
policy.
6) Used to secure E-commerce so that information does
not leak.
IV. ADVANTAGES
1) Unauthorized user.
2) Low Cost.
3) Password as well as USB Dongle.
4) Password sent Via Mobile or Email via SMTP Call.
5) File Protected using unique key.
6) USB Dongle Corrupted Master key used.
7) Watermarking to a folder.
V. DISADVANTAGES
1) USB stick is necessary.
2) It can only run in Windows Application.
3) To access mail user should have this software in user
computer.
VI. FUTURE ENHANCEMENT
1) Compressed File
2) Encryption using 1] Password
2] USB stick
3) Decryption using 1] Password
4) 2] USB stick
3]Password sends via SMS or E-
mail
VII. CONCLUSION
The Proposed System has a secure and efficient control
protocol for USB ports. The protocol employs a remote
authentication server to verify legal users and uses the
Cryptographic algorithm to implement key exchange
agreement to protect the privacy of a file transmitted to a
storage device.
In terms of protocol communication costs, realizing
mutual authentication requires only two rounds of
communication sessions. Therefore, the proposed system
provides an effective control protocol for USB storage
devices which is both secure and efficient
REFERENCES
[1] Miguel A. Ruiz-Sanchez, Ernst W. Biersack and Walid
Dabbous,“Survey and Taxonomy of IP Address
Lookup Algorithms,” IEEETrans. on Network, pp. 8-
23, March/April 2001.
[2] Marco Chirico, Anna Marina Scapolla and Andrea
Bagnasc, “A New and Open Model to Share
Laboratories on the Internet,” IEEE Trans.on
Instrumentation and Measurement, vol. 54, no. 3, pp.
1111-1117,June 2005.
[3] Behrouz A. Forouzan, “Data Communications and
Networking,”McGraw Hill, 2006.
A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device
(IJSRD/Vol. 1/Issue 5/2013/0010)
All rights reserved by www.ijsrd.com 1081
[4] Mellquist “Automatic Internet Protocol (IP) Address
Allocation andAssignment,” United States Patent,
Patent no. 6,115,545.Ralph Droms, “Automated
Configuration of TCP/IP with DHCP,”IEEE Internet
Computing, pp. 45-53, July /Aug. 1999.
[5] Steven Cheung, “Denial of Service against the Domain
NameSystem,” IEEE Trans. on Security & Privacy,
pp. 40-45, 2006.
[6] Hyokyung Bahn, “A Shared Cache Solution for the
Home InternetGateway,” IEEE Trans. on Consumer
Electronics, vol. 50, no. 1, pp.168-172, Feb. 2004.
[7] Kensuke Fukuda, Hideki Kakayasu and Misako
Kakayasu, “Spatialand Temporal Behavior of
Congestion in Internet Traffic,” Fractals,World
Scientific Publishing Company, vol. 7, no. 1, pp. 23-
31, 1999.J. E. McGeehan, Saurabh Kumar, Deniz
Gurkan, S. M. R. Motaghian
[8] Nezam, Alan Eli Willner, K. R. Parameswaran, M. M.
Fejer, J.Bannister, and Joseph D. Touch, “All-Optical
Decrementing of aPacket’s Time-to-Live (TTL) Field
and Subsequent Dropping of aZero-TTL Packet,”
IEEE Journal of Lightwave Technology, vol.2
[9] [1] W. Diffie and M. Hellman, “New directions in
cryptography”, IEEE Transactions on Information
Theory, Vol. 22, No. 6, pp. 644-654, 1976.
[10] [2] Gustavus J. Simmons, “Symmetric and
Asymmetric Encryption”, Computing Surveys, Vol.
11, No. 4, December 1979.
[11] [3] Chul-Joon Choi, Zeen Kim and Kwangjo Kim
“Schnorr Signature Scheme with Restricted Signing
Capability and Its Application”.
[12] [4] R. Rivest, A. Shamir, and L. Adleman, “A method
for obtaining digital signatures and public-key
cryptosystems”, Communications of the ACM, Vol.
21, No. 2, pp. 120-126, 1978.
[13] [5] Hyun Sook Rhee, Jeong Ok Kwon, and Dong
Hoon Lee, “A remote user authentication scheme
without using smart cards”, Computer Standards &
Interfaces, Vol. 31, No. 1, pp. 6-13, 2009.
[14] [6] Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar Reddy
and Dr B.Satyanarayana, “Improved Remote User
Authentication Scheme Preserving User Anonymity”,
International Journal of Computer Science and
Network Security, VOL.8 No.3, March 2008.
[15] T. A. ElGamal, “A public-key cryptosystem and a
signature scheme based on discrete logarithms”, IEEE
Transactions on Information Theory, Vol. 31, No. 4,
pp. 469-472, 1985.

Mais conteúdo relacionado

Mais de ijsrd.com

A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONijsrd.com
 

Mais de ijsrd.com (20)

A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
 

Último

Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Último (20)

Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1077 Abstract-- Most of the file protection softwares provides either one level protection of the simple encryption method or two level protection which is password protection and encryption using simple key generation algorithm which key is generated by the softwares by using characters of password given by the users. In such a softwares or applications when once password cracked or reverse engineering is done by simple entering password one can have access the file or decrypt the file. My research work will provide one more level protection for such a problem which generate Symmetry key using USB storage device to encrypt file. This research work will carry out not only protection two level protection but also provide extra third level protection to protect file using USB storage device. USB File Lock Using USB Storage Device and Digital Keys (Signature) is a high performance File encryption / protection program, password securing your file against outside unauthorized access by the use of an USB stick/Storage. You should provide facility to send password on sms and even email so that authorised person can use for decrypt a file. You should provide facility to encrypt all type of files without restrictions. Password encryption process should be there so no one can access password specified directly from the encrypted file. This provides you security for your data and private information when your data is in transit or in the email as attachment. Any person getting hold of your files will not be able to use them unless he/she has the USB Storage from the same set. We are planning to use an USB Storage to store the encryption key and also uses three other verification keys stored inside Storage plus a unique hardware serial number of the Storage. This makes it very safe and can even be used in military communication. Advantage of USB Storage is that its easily available at reasonable rates. SO no special hardware is required for this. A storage or memory USB Storage, also called a memory stick, provides a convenient means to pass files between computers or devices. The memory stick contains a rewritable solid-state memory chip that does not require power to retain its contents. As capacities have grown and price has dropped, these portable, plug-and-play storage drives have replaced floppy disks and even writable discs for exchanging files and archiving data. I. INTRODUCTION A. What is Cryptography? Cryptography is one of the most complex aspects used by a software developer. Using cryptographic algorithm it requires a high level of mathematical knowledge. Fortunately, with Microsoft .NET, newly created classes wrap up these sophisticated algorithms into fairly easy-to- use properties and methods this paper gives you an overview of the cryptography support that is provided by the .NET Framework. However Following jargons give you knowledge about Cryptography: 1) Data that can be read and understood with its original form is called 'plaintext' or 'cleartext'. 2) The method of disguising plaintext in such a way as to hide its meaning is called 'Encryption'. 3) Encrypting plaintext results is now in unreadable form of data called 'Ciphertext'. You use encryption to make the information secure and hidden from anyone for whom it is not intended, even those who can see the encrypted data. 4) The process of reversing Ciphertext to its original plaintext is called 'Decryption'. 5) And finally 'key' is a string of bits used for encrypt and decrypt the information to be transmitted. It is a randomly generated set of numbers/ characters that is used to encrypt/decrypt information. B. Types of Cryptography 1) Private Key Encryption Private Key encryption, also referred to as conventional or symmetric or single-key encryption was the only available option prior to the advent of Public Key encryption in 1976. This form of encryption was used by emperors like Julius Caesar and other military organizations to convey secret messages. This key requires all communicating parties, to share a common key. With private-key encryption, you encrypt a secret message using a key that only you know. To decrypt the message, you need to use the same key. Private- key cryptography is effective only if the key can be kept secret. Despite the potential weakness of private-key encryption, it is very easy to implement and computationally doesn't consume excessive resources. 2) Public-key encryption Public key encryption algorithms are based on the premise that each sender and recipient has a private key, known only to him/her and a public key, which can be known by anyone. Each encryption/decryption process requires at least one public key and one private key. Each is related to the other mathematically, such that messages encrypted with the public key can only be decrypted with the corresponding private key. 3) .NET and Cryptography .NET provides a set of cryptographic objects, supporting well-known algorithms and common uses including hashing, encryption, and generating digital signatures. These objects are designed in a manner that facilitates the incorporation of these basic capabilities into more complex operations, such A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device Kajal K. Isamaliya1 Mitesh R. Patel2 Ankur P. Desai3 Pankaj Singh Parihar4 1, 2, 4 M.Tech. 3 Assistant Professor 1, 2, 4 Computer Science Eng. Department, ITM College, Bhailwara, Rajasthan,India. 3 Electrical Eng. Department, Shri Sitrambhai Naranji Patel Institute of Technology pankajsinghparihar2002@gmail.com
  • 2. A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device (IJSRD/Vol. 1/Issue 5/2013/0010) All rights reserved by www.ijsrd.com 1078 as signing and encrypting a document. Cryptographic objects are used by .NET to support internal services, but are also available to developers who need cryptographic support. The .NET Framework provides implementations of many such standard cryptographic algorithms and objects. Similar to the ready availability of simple authentication features within the .NET Framework, cryptographic primitives are also easily accessible to developers via stream-based managed code libraries for encryption, digital signatures, hashing, and random number generation. The System, Security. Cryptography namespace in the .NET Framework provides these cryptographic services. C. The Algorithm support includes: 1) RSA and DSA public key (asymmetric) encryption Asymmetric algorithms operate on fixed buffers. They use a public-key algorithm for encryption/decryption. An example for asymmetric algorithms is the RSA algorithm which is so named after its three inventors Rivest, Shamir, and Adleman. It is a popular public-key algorithm - the de facto standard - for digital signatures and can be used for encryption as well. The DSA_CSP is an implementation of the digital signature algorithm (DSA). This is a public-key algorithm. It can be used to create and verify a digital signature. DES, TripleDES, and RC2 private key (symmetric) encryption-symmetric algorithms are used to modify variable length buffers and perform one operation for periodical data input. They use a single secret key to encrypt and decrypt data. The Data Encryption Standard (DES) is a world-wide standard for data encryption. It is the most popular encryption algorithm. It is implemented by the DES_CSP class. This class represents a stream where you pour in data that is encrypted/decrypted using a single key. The Triple DES encryption algorithm operates on a block of data three times using one key. RC2 stands for Rivest Cipher. 2) MD5 and SHA1 hashing MD5 - Message Digest 5-is a one-way hash algorithm. Given variable length data as input it always produces a 128-bit hash value. The Secure Hash Algorithm (SHA) also is a one-way hash algorithm that produces a 160-bit hash value, which is longer than the MD5 produced hash value. In this paper we using RSA Algorithm for encryption and decryption. II. BASIC THEORY: HOW THIS WORKS? 1) Generates a Unique protection-key for each USB stick / Storage 2) Encrypt Original file for first level protection , Encryption is based on customized algorithm so that its notpossible to decrypt without knowing the keys used in Encryption process. 3) Generate digital signatures (Master key and Subkey) randomly or as per Users selection and store digital signatures in encrypted form. 4) Denies access to unauthorized users or invalid Storage 5) Preserves Encryption status even after reboot 6) Facility to upload file on FTP server using FTP protocol 7) Facility to send key to decrypt file via sms on any mobile device Fig.1: Asymmetric Encryption Now I provide here some code for encryption the file. private void button4_Click(object sender, EventArgs e) { Byte[] mBytArr; int mLen = 65536; if (textBox1.Text.Length == 0 || textBox2.Text.Length == 0 || textBox3.Text.Length == 0) { MessageBox.Show("Please fill all the field..??"); return; } if (textBox3.Text.Length < 8) { MessageBox.Show("Password must be of at least 8 character.", "Alert"); return; } if (checkBox1.Checked) { if (textBox4.Text.Length == 0) { MessageBox.Show("you must insert a dongle"); return; } } if (checkBox2.Checked) { if (textBox5.Text.Length == 0) { MessageBox.Show("Please enter the Email address."); return; } } if (checkBox3.Checked) { if (textBox6.Text.Length != 10) { MessageBox.Show("Please enter the Valid Mobile No."); return; } } string ext; ext = textBox1.Text.Substring(textBox1.Text.LastIndexOf('.') + 1);
  • 3. A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device (IJSRD/Vol. 1/Issue 5/2013/0010) All rights reserved by www.ijsrd.com 1079 ext = ext.PadLeft(5, '+'); string si; si = label8.Text.PadLeft(30, '+'); string alg = "#$%^@"; string usb; usb = textBox4.Text.PadLeft(30, '+'); string pwd; pwd = textBox3.Text.PadLeft(30, '+'); String finalstr; finalstr = ext + si + usb + pwd + alg; string result; FileStream fs = new FileStream(textBox1.Text, FileMode.Open, FileAccess.Read); FileInfo fi = new FileInfo("d:imptemp"); if (fi.Exists) { fi.Delete(); } FileStream res = new FileStream("d:imptemp", FileMode.CreateNew, FileAccess.Write); BinaryReader rH; BinaryWriter wN; rH = new BinaryReader(fs); wN = new BinaryWriter(res); while (fs.Position < fs.Length) { mBytArr = rH.ReadBytes(mLen); wN.Write(mBytArr); } DotNetEncrypt.SystemEncrypt st = new DotNetEncrypt.SystemEncrypt(); result = st.EncryptFile(textBox3.Text, "d:imptemp", textBox2.Text); MessageBox.Show(result); if (checkBox3.Checked) { if (textBox6.Text.Length == 10) { webBrowser1.Navigate("http://www.itcodes.com/sms/index o.php?msg=your password is" + textBox3.Text + "&ph=" + textBox6.Text); } } if (checkBox2.Checked) { if (textBox5.Text.Length != 0) { smtplibs.netmail ne = new smtplibs.netmail(); ne.sendmail(textBox5.Text, "Your password is " + textBox3.Text, textBox2.Text); } } } private void button1_Click(object sender, EventArgs e) { if (openFileDialog1.ShowDialog() != DialogResult.Cancel) { textBox1.Text = openFileDialog1.FileName; textBox2.Text = textBox1.Text.Substring(0, textBox1.Text.LastIndexOf('.') + 1) + "enc"; FileInfo fi = new FileInfo(textBox1.Text); //fi.Length; label8.Text = fi.Length.ToString(); } } private void checkBox1_CheckedChanged(object sender, EventArgs e) { if (checkBox1.Checked) { //textBox4.Enabled=false; winusbdevice.usbserial usb = new winusbdevice.usbserial(); String serial; serial = usb.getserial(); textBox4.Text serial.Substring(serial.LastIndexOf('') + 1); } else { textBox4.Enabled = false; } } private void checkBox3_CheckedChanged(object sender, EventArgs e) { if (checkBox3.Checked) { textBox6.Enabled = true; //return; } else { textBox6.Enabled = false; } } } } } In above code I provide the encryption of a file using .net. in this I use the padding in which the password is combine with some other character. I also Provide code for USB device’s serial no to protect the file which is different in all USB devices. Now following is the code for decrypt the file. private void button2_Click(object sender, EventArgs e) { DotNetEncrypt.SystemEncrypt st = new DotNetEncrypt.SystemEncrypt(); string abc; abc = st.DecryptFile(textBox3.Text, textBox1.Text, textBox4.Text + ".tmp"); if (abc != "Done") { MessageBox.Show("invalid Password"); return; } long curpost, i;
  • 4. A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device (IJSRD/Vol. 1/Issue 5/2013/0010) All rights reserved by www.ijsrd.com 1080 String finalstr = ""; FileStream fo = new FileStream(textBox4.Text + ".tmp", FileMode.Open, FileAccess.Read); BinaryReader br = new BinaryReader(fo); fo.Position = fo.Length - 100; curpost = fo.Position; for (i = curpost; i < fo.Length; i++) { finalstr += (char)fo.ReadByte(); } fo.Close(); fo.Dispose(); br.Close(); // MessageBox.Show(finalstr); string ext; ext = finalstr.Substring(0, 5); ext = ext.Trim('+'); // MessageBox.Show(ext); string si; si = finalstr.Substring(5, 30); si = si.Trim('+'); // MessageBox.Show(si); string usb; usb = finalstr.Substring(35, 30); usb = usb.Trim('+'); //MessageBox.Show(usb); string pwd; pwd = finalstr.Substring(65, 30); pwd = pwd.Trim('+'); // MessageBox.Show(pwd); string alg; alg = finalstr.Substring(95, 5); //MessageBox.Show(alg); if (alg != "#$%^@") { MessageBox.Show("Invalid Algorithm"); return; } if (usb != textBox2.Text) { MessageBox.Show("Invalid dongle"); FileInfo fin = new FileInfo(textBox4.Text + ".tmp"); fin.Delete(); return; } FileInfo fina = new FileInfo(textBox4.Text + ".tmp"); fina.CopyTo(textBox4.Text + "." + ext); fina.Delete(); MessageBox.Show("Done"); } III. APPLICATIONS 1) Used in school and colleges for the security of student detail. 2) Used in industries to secure it symbol. 3) Used by fashion designer for security of its catalogs. 4) Used in bank so that unauthorized user cannot use account holder's personal detail. 5) Used by any person to secure his/her personal detail like property paper, bank balance and about mediclaim policy. 6) Used to secure E-commerce so that information does not leak. IV. ADVANTAGES 1) Unauthorized user. 2) Low Cost. 3) Password as well as USB Dongle. 4) Password sent Via Mobile or Email via SMTP Call. 5) File Protected using unique key. 6) USB Dongle Corrupted Master key used. 7) Watermarking to a folder. V. DISADVANTAGES 1) USB stick is necessary. 2) It can only run in Windows Application. 3) To access mail user should have this software in user computer. VI. FUTURE ENHANCEMENT 1) Compressed File 2) Encryption using 1] Password 2] USB stick 3) Decryption using 1] Password 4) 2] USB stick 3]Password sends via SMS or E- mail VII. CONCLUSION The Proposed System has a secure and efficient control protocol for USB ports. The protocol employs a remote authentication server to verify legal users and uses the Cryptographic algorithm to implement key exchange agreement to protect the privacy of a file transmitted to a storage device. In terms of protocol communication costs, realizing mutual authentication requires only two rounds of communication sessions. Therefore, the proposed system provides an effective control protocol for USB storage devices which is both secure and efficient REFERENCES [1] Miguel A. Ruiz-Sanchez, Ernst W. Biersack and Walid Dabbous,“Survey and Taxonomy of IP Address Lookup Algorithms,” IEEETrans. on Network, pp. 8- 23, March/April 2001. [2] Marco Chirico, Anna Marina Scapolla and Andrea Bagnasc, “A New and Open Model to Share Laboratories on the Internet,” IEEE Trans.on Instrumentation and Measurement, vol. 54, no. 3, pp. 1111-1117,June 2005. [3] Behrouz A. Forouzan, “Data Communications and Networking,”McGraw Hill, 2006.
  • 5. A Symmetric Key Generation for File Encryption and Protection using/by USB Storage Device (IJSRD/Vol. 1/Issue 5/2013/0010) All rights reserved by www.ijsrd.com 1081 [4] Mellquist “Automatic Internet Protocol (IP) Address Allocation andAssignment,” United States Patent, Patent no. 6,115,545.Ralph Droms, “Automated Configuration of TCP/IP with DHCP,”IEEE Internet Computing, pp. 45-53, July /Aug. 1999. [5] Steven Cheung, “Denial of Service against the Domain NameSystem,” IEEE Trans. on Security & Privacy, pp. 40-45, 2006. [6] Hyokyung Bahn, “A Shared Cache Solution for the Home InternetGateway,” IEEE Trans. on Consumer Electronics, vol. 50, no. 1, pp.168-172, Feb. 2004. [7] Kensuke Fukuda, Hideki Kakayasu and Misako Kakayasu, “Spatialand Temporal Behavior of Congestion in Internet Traffic,” Fractals,World Scientific Publishing Company, vol. 7, no. 1, pp. 23- 31, 1999.J. E. McGeehan, Saurabh Kumar, Deniz Gurkan, S. M. R. Motaghian [8] Nezam, Alan Eli Willner, K. R. Parameswaran, M. M. Fejer, J.Bannister, and Joseph D. Touch, “All-Optical Decrementing of aPacket’s Time-to-Live (TTL) Field and Subsequent Dropping of aZero-TTL Packet,” IEEE Journal of Lightwave Technology, vol.2 [9] [1] W. Diffie and M. Hellman, “New directions in cryptography”, IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976. [10] [2] Gustavus J. Simmons, “Symmetric and Asymmetric Encryption”, Computing Surveys, Vol. 11, No. 4, December 1979. [11] [3] Chul-Joon Choi, Zeen Kim and Kwangjo Kim “Schnorr Signature Scheme with Restricted Signing Capability and Its Application”. [12] [4] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978. [13] [5] Hyun Sook Rhee, Jeong Ok Kwon, and Dong Hoon Lee, “A remote user authentication scheme without using smart cards”, Computer Standards & Interfaces, Vol. 31, No. 1, pp. 6-13, 2009. [14] [6] Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar Reddy and Dr B.Satyanarayana, “Improved Remote User Authentication Scheme Preserving User Anonymity”, International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008. [15] T. A. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.