SlideShare a Scribd company logo
1 of 8
Download to read offline
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 2 FEB.-2015
1 | P a g e
A Self –Destructing Secure Messaging System Using Multi Key
Management Scheme
Amrapali Holkar
Pallavi Powar
Pooja Mhaske
Shiveta Tak
Computers,M.E.S. College Of Engineering ,Pune,Maharashtra,India
Abstract
We propose the Pandora Messaging, an enhanced secure instant messaging architecture which is
equipped with a self-message-destructing feature for sensitive personal information applications
in a mobile environment along with Multi Key Security Management using Shamirs algorithm.
The proposed system will be beneficial for Government officers for communicating very
sensitive and confidential messages. We design the Pandora Message Encryption and Exchange
Scheme and the format of a self-destructible message to show how to exchange these messages
atop the existing instant messaging service architecture. The Pandora Messaging-based system
enables senders to set time, frequency, and location constraints. These conditions determine
when the transmitted messages should be destructed and thus become unreadable for receivers.
The Pandora Messaging-based system securely sends self destructible messages to receivers in a
way that it uses ephemeral keys to encrypt the messages and transmits the encrypted messages to
the designated receiver‟s instant messaging service in real time. When the transmitted messages‟
constraints are satisfied, the ephemeral key used for encryption will be deleted .Thus, the
encrypted messages become unrecoverable. The most important part is that the Key are managed
by the system. The system generates a pool of key and any group of the same pool can be used to
encrypt and decrypt the message.
Keywords: Pandora ,Shamirs key, AAA, LFSR
Introduction
The popularity of instant messaging has grown in an exponential way. However, most popular
instant messaging services often trade speed for security. Thus, the users are Subjected to constant
eavesdropping, unwanted leakage of confidential information, and even compromises of users‟
media used in instant messaging. There are several secure instant messaging services for personal
or enterprise use. The server may contain the unencrypted messages for administrative purposes.
Thus, the user cannot guarantee the confidentiality of the message delivered. The unwanted
consequence of leaving unencrypted messages on servers may cause leakage of personal
information, or even identity theft. For example, the commercial instant messaging providers may
choose to mine these plaintext messages for target advertisements. To solve the aforementioned
issues we presented a secure instant messaging protocol preserving confidentiality against
administrator. A limitation of their protocol is that it needs to modify the instant messaging server
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 2 FEB.-2015
2 | P a g e
to satisfy the protocol requirements. In addition to encrypting the messages for confidentiality,
there are some systems with a “self-data-destructing” feature. These systems focus on making
data disappear after a pre specified time. In other words, data is encrypted and the encryption key
is deleted after the expiration time, so that the encrypted data becomes unrecoverable, i.e., self-
destructed. To our knowledge, the concept of “self-destructing” data was first mentioned by
Boneh and Lipton in a revocable backup system. Then some systems such as Ephemerizer,
Vanish and Porter Devices were proposed. However, none of them integrate this concept with the
instant messaging service using mobile devices and take account of their limitation. We present a
secure instant message encryption and exchange scheme, which can be used directly atop an
existing instant messaging service architecture, so that it is easily deployable, leveraging the
existing infrastructure. Specifically, we add a self-message-destructing feature to get the enhanced
secure instant messaging architecture, named Pandora Messaging. Project is not only limited to
Pandora system but it has many other features for securing the message. The most importantly is
the steganography part. We present concealment of information using steganography. Our aim is
to have an application less vulnerable to steganalysis and create a user friendly steganography
application. Steganography is a technique of communicating between sender and a receiver over a
communication channel by hiding the relevant information in the cover media so that avoiding the
information to be exposed to an intruder.
A possible carrier of secret information is applied to media such as images. The process of
detecting steganographic messages is known as steganalysis and a particular steganalysis
technique is called an attack. Steganalysis can be viewed as a two-stage process:
1) Classification of an image as being stego-bearing or not, and
2) Finding the location of stego-bearing pixels (i.e. the pixels containing the hidden message bits)
with an aim to extracting, manipulating or sterilizing the message Steganography makes the job of
the attacker more difficult because the very existence of the asset is hidden.
The importance of steganography in maintaining confidentiality can be illustrated with a simple
example. Imagine two coworkers, A and B, are communicating with each other over the internet.
A is sending confidential information to B, such as specifications for their company‟s latest
project, and then A probably does not want adversary (E) to be able to read these messages and
so, A will likely encrypt his message. The problem arises because the encrypted text is likely
garbled, nonsensical data. Thus, E cannot read the encrypted messages, however, he will be aware
that hidden message has been communicated between A and B. E can then take the encrypted
message and attempt to crack it. This is a very real problem because as computational power
increases, encryption is becoming easier to break. However, if A uses steganography, and hides
his secret message in a generic image file, then A can transmit his secret message to B without
evoking E‟s suspicion. E will think A is just sending harmless picture to B, so E will ignore that
communication between A and B. Thus, A and B defeat E. As mentioned in the example,
attackers have more computing power now than ever before. DES, an encryption standard that
was used by many national governments, however, mentions a cryptanalytic attack that can break
DES in only a few minutes. Another example of a broken encryption algorithm isWEP, designed
to provide confidentiality to users on wireless networks. Illustrates how WEP can be broken
within hours. Steganography applications that hide data in images generally use a variation of
least significant bit (LSB) embedding. Here images play a leading role in carrying confidential
information because they can be modified to some degree if the corresponding steganographic
media cannot be recognized as different from the carriers. In LSB embedding in the image,
changing the LSB will only change the integer value of the byte by one. This small change is not
noticeable. The visual appearance of a color and hence the image itself is not changed. A
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 2 FEB.-2015
3 | P a g e
proportionally greater change in the visual appearance of a color could be achieved by making up
the RGB value of the pixel. This should have very little effect on the appearance of the image. In
our application we are not only hiding the user‟s data within an image, but it also encrypts the
user‟s data using the AES Cryptosystem.
Lastly the system is configured to deliver messages at a specific location based on Latitude and
Longitude. The recipients of the message need to be in their destined location to view the
message. The user can login but cannot view the messages if the location criteria do not matches
with configured location in the message header. All the messages that do not match with
predefined criteria which are set by the sender then the messages are displayed as lock to
recipients. Only on matching the desired criteria the recipients can unlock the messages.
Enhanced Messaging System
A. Cryptography on Message
Cryptography is a process of sending a message securely. It is a technique for secure
communication of protecting information by transforming it into an unreadable format.
For cryptography we are using Shamir‟s Secret Sharing [1]algorithm in which the secret is
divided into parts, giving each participant its own unique part, where some of or all the parts are
needed in order to reconstruct the secret.
B. Steganography on encrypted data
Steganography deals with hiding of data in images and steganalysis reveals the presence of data.
By using LFSR[2] steganography technique, we compute the suitability measure of the various
random sequences of cipher bits against the given image.
C. Location based Authentication
Today‟s information systems require explicit identification between communicating entities
(often entities are users). Process of entity identification is in general called authentication. The
authentication is defined as affirmation of the identity of certain object in centralized systems, as
refers [3]. More generally, authentication can be referred as message origin validation.
Authentication is one of the three main processes of AAA systems (Authentication Authorization
Accounting) [2]. Generic AAA system is in Figure 1.
When a user wants to get access to the restricted area, he has to be authenticated by authenticator
(1). It depends on user‟s identity authority whether grant or not the access to the restricted area
(2). If the access is granted, controller establishes connection between the user and the restricted
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 2 FEB.-2015
4 | P a g e
area (3). Accounting records information related to user‟s actions (4) is created. Authentication
techniques are commonly classified into three main groups as [3]:
 User has something – techniques using RFID (Radio Frequency Identification Device),
hardware keys, etc.;
 User knows something – this group is based on knowledge of confidential information, for
example password authentication;
 User is someone – biometric techniques that are limited to a human authentication.
Nowadays, many papers discuss using of user‟s location as a new factor of authentication.
Location-based authentication can be useful in many cases. The advantages of location-based
authentication present. The first place of usage can be found in the hospital sector. A doctor
shouldn‟t handle with patients‟ privacy information out of hospital‟s border.
ALGORITHMS
In this section, algorithms for different processes of text and image based steganography used
both in the sender side and receiver side are discussed.
 Shamirs Algorithm is used for data encryption and decryption
 Location and time constraints are applied.
 For Steganography ,LFSR is used.
Following Flow chart shows the basic flow for proposed Model:
Figure2:ProposedAlgorithm for Steganographic model
A. Shamir Secret sharing
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 2 FEB.-2015
5 | P a g e
In cryptography, secret sharing refers to a method for distributing a secret amongst a group of
participant search of which is allocated a share of the secret.
The secret can only be reconstructed when the shares are combined together; individual shares are
of no use on their own.
 Goal is to divide some data D (e.g., the safe combination) into n pieces D1,D2….Dn in
such a way that:
 Knowledge of any k or more D pieces makes D easily computable.
 Knowledge of any k -1 or fewer pieces leaves D completely undetermined (in the sense
that all its possible values are equally likely).
 This scheme is called (k,n) threshold scheme. If k=n then all participants are required
together to reconstruct the secret.
B. Data Hiding Algorithm
The difference between our application and the other programs implementation on LSB
embedding is that our application ranks the seeds based on their suitability as cover images for
our data. In our scheme we are using L.F.S.R‟s to generate random permutations of binary string.
Details about L.F.S.R can be seen in [11]. In this, any random number generator can be used to
permute the string instead of L.F.S.R‟s but information of the generator should also be
communicated along with message. Inthe application the user first specifies the data that they
would like to hide is in any file format, and encrypts this data using the recipient‟s El Gamal
public key. Once the encrypted data is obtained, follow the below procedure.
Procedure:
1) a) Determine the length of the encrypted data (n).
b) Choose a cover image where it has more pixel than ‟n+ p‟, where ‟n‟ is the length of the
encrypted data and ‟p‟ is the length needed to embed the encrypted information of L.F.S.R string,
and its initial seed value.
2) Calculate L.F.S.R (Linear Feedback Shift Register) bit length (m) such that 2 m > n.
3) Construct an m-bit length L.F.S.R, and represent the same in binary notation (one indicates bit
location is tabbed and zero indicates otherwise)
4) Set the initial value randomly for m-bit L.F.S.R, referred as a seed.
5) a) Using this (L.F.S.R, seed) generates random permutation of f1, 2,....n as fl1, l2,... .
b) Permute the encrypted data using the permutation obtained above, to obtain a permutation
string.
6) Test for suitability of this permuted string to be hidden into the cover image.
7) Each bit of permuted encrypted data is embedded in to the least significant bit of the pixel
bytes of the cover image for which the suitability is above the threshold. If suitability is below the
some fixed threshold, repeat from step 2 to 6.
8) Encrypt the L.F.S.R information that produced the above permutation and embedded this in
last ‟p‟ pixels of the coverimage.0
System Architecture
The project mainly works on Pandora, Steganography and Location based Message Delivery. We
use the term Pandora means a self destructing Message communication.
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 2 FEB.-2015
6 | P a g e
In this section, we discuss Pandora Messaging, an enhanced secure instant messaging architecture
with a self message destructing feature. The Pandora Messaging-based system is for handling the
sensitive data encryption and transmission problems in an insecure mobile environment, and
making sure the encrypted data is unrecoverable for any one once the destructible message‟s
constraints are satisfied. Its components include: sender, receiver, Instant Messaging Server, and
an optional Ephemeral Public Key Manager which is used by the receiver to delegate their
ephemeral public keys.
Figure3:System Architecture
The project mainly works on Pandora, Steganography and Location based Message Delivery. We
use the term Pandora means a self destructing Message communication.
In this section, we discuss Pandora Messaging, an enhanced secure instant messaging architecture
with a self message destructing feature. The Pandora Messaging-based system is for handling the
sensitive data encryption and transmission problems in an insecure mobile environment, and
making sure the encrypted data is unrecoverable for any one once the destructible message‟s
constraints are satisfied. Its components include: sender, receiver, Instant Messaging Server, and
an optional Ephemeral Public Key Manager which is used by the receiver to delegate their
ephemeral public keys. We give below the details of each component.
A. Sender
The sender acts as an instant messaging client. When a sender would like to send a receiver the
message containing sensitive personal information, the Pandora Messaging based application
installed in sender„s mobile device must be able to do the following tasks:
(1) generate a long-term public and private key pair;
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 2 FEB.-2015
7 | P a g e
(2) obtain an ephemeral public key from the receiver via an instant messaging service (IMS) and
assign the constraint governing the condition to delete this ephemeral key; (3) generate the
encrypted message using this ephemeral public key;
(4) send the destructible encrypted message, including the cipher text encrypted with a secret
session key, the related encryption information encrypted with this ephemeral public key, and this
ephemeral public key‟s identifier, to the receiver via an IMS;
(5) provide the ephemeral public key when requested by the receiver via an IMS.
B. Receiver
The receiver also acts as an instant messaging client. To receive the destructible messages, the
Pandora Messaging based application installed in receiver„s mobile device must be able to do the
following tasks:
(1) Generate a long-term public and private key pair;
(2) Generate a series of ephemeral key pairs;
(3) Receive the destructible encrypted message from the sender via an instant messaging service
(IMS);
(4) Decrypt the destructible encrypted message;
(5) provide the ephemeral public key when requested by the sender via an IMS;
(6) Show the sensitive personal information plaintext on screen after decryption without storing
the plaintext in stable storage;
(7) Securely delete the ephemeral private key (i.e., overwrite it with random data) when the
destructible encrypted message‟s constraints are satisfied.
C. Instant Messaging Server
An instance messaging server is a communication server which includes the basic features such as
the authentication of the user accounts, the management of the user‟s presence status, and the
instant message transmission between users. It may also support the enhanced features, such as
the encryptions of the authentication process and the transmission channel, to protect the
authentication information and the confidentiality of messages respectively.
D. Ephemeral Public Key Manager Ephemeral Public Key
Manager is an instance messaging agent which runs on a serves to keep itself available for senders
and receivers, and supports ephemeral public keys management. It is needed if we intend to
support off-line messaging that allows a sender to send the messages to an off-line receiver.
Receivers can delegate their ephemeral public keys to the Ephemeral Public Key Manager‟s
database prior to getting off-line, so that senders can still get the required ephemeral keys from the
Ephemeral Public Key Manager, rather than awaiting receivers to become on-line later. The key
manager is an important role to support the message push and synchronization technologies
among mobile devices connected in the system because mobile devices are not always online.
Conclusion
This paper proposes an algorithm for data privacy. Data privacy has become increasingly
important in the Cloud environment. We have used randomization of cipher bits for secured
image steganography which is different than the existing steganography methods..Also, new
approach for protecting data privacy from attackers who retroactively obtain, through legal or
other means, a user‟s stored data and private decryption keys.
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 2 FEB.-2015
8 | P a g e
ACKNOWLEDGMENT
It gives us great pleasure and satisfaction in presenting this paper on “A Self-Destructing Secure
Messaging System Using Multi Key Management Scheme”
We take this opportunity to express our profound gratitude and deep regards to our guide for her
exemplary guidance , monitoring and constant encouragement throughout the course of this thesis
.The blessing, help and guidance given by her time to time shall carry us a long way in the
journey of life on which we are about to embark.
We are obliged to staff members of our college for the valuable information provided by them in
their respective fields.
REFERENCES
[1] Tsai-Yeh Tung, Laurent Lin, D.T.Lee”Pandora Messaging: An Enhanced Self-Message-
Destructing Secure Instant Messaging Architecture for Mobile Devices” in 26th International
Conference on Advanced Information Networking and Applications Workshops
[2]Subba RaoY.V,Brahmananda Rao S.S,Rukma Rekha”Secure Image Steganography based on
Randomized Sequence of Cipher Bits” in 2011 Eighth International Conference on Information
Technology: New Generations
[3]David Jaros, Radek Kuchta, “Location-Based Authentication and Authorization Using Smart
Phones ” in Trust, Security and Privacy in Computing and Communications (TrustCom),
JUNE2012 IEEE 11th International Of Conference

More Related Content

What's hot

Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Jayanth Dwijesh H P
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computinginventionjournals
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Adz91 Digital Ads Pvt Ltd
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notesJayanth Dwijesh H P
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesJayanth Dwijesh H P
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET Journal
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networkspauldeng
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 

What's hot (19)

Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computing
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
Communication security
Communication securityCommunication security
Communication security
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networks
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 

Similar to A Self –Destructing Secure Messaging System Using Multi Key Management Scheme

MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemEditor IJMTER
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYijma
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computingeSAT Publishing House
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYAsia Smith
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to A Self –Destructing Secure Messaging System Using Multi Key Management Scheme (20)

V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Bh32379384
Bh32379384Bh32379384
Bh32379384
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from ijiert bestjournal

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMPijiert bestjournal
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...ijiert bestjournal
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFijiert bestjournal
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINEijiert bestjournal
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY ijiert bestjournal
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINijiert bestjournal
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ijiert bestjournal
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...ijiert bestjournal
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...ijiert bestjournal
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR ijiert bestjournal
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTijiert bestjournal
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ijiert bestjournal
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTijiert bestjournal
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH ijiert bestjournal
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW ijiert bestjournal
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSijiert bestjournal
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ijiert bestjournal
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...ijiert bestjournal
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...ijiert bestjournal
 

More from ijiert bestjournal (20)

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERS
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
 
MAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHINGMAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHING
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

A Self –Destructing Secure Messaging System Using Multi Key Management Scheme

  • 1. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 2 FEB.-2015 1 | P a g e A Self –Destructing Secure Messaging System Using Multi Key Management Scheme Amrapali Holkar Pallavi Powar Pooja Mhaske Shiveta Tak Computers,M.E.S. College Of Engineering ,Pune,Maharashtra,India Abstract We propose the Pandora Messaging, an enhanced secure instant messaging architecture which is equipped with a self-message-destructing feature for sensitive personal information applications in a mobile environment along with Multi Key Security Management using Shamirs algorithm. The proposed system will be beneficial for Government officers for communicating very sensitive and confidential messages. We design the Pandora Message Encryption and Exchange Scheme and the format of a self-destructible message to show how to exchange these messages atop the existing instant messaging service architecture. The Pandora Messaging-based system enables senders to set time, frequency, and location constraints. These conditions determine when the transmitted messages should be destructed and thus become unreadable for receivers. The Pandora Messaging-based system securely sends self destructible messages to receivers in a way that it uses ephemeral keys to encrypt the messages and transmits the encrypted messages to the designated receiver‟s instant messaging service in real time. When the transmitted messages‟ constraints are satisfied, the ephemeral key used for encryption will be deleted .Thus, the encrypted messages become unrecoverable. The most important part is that the Key are managed by the system. The system generates a pool of key and any group of the same pool can be used to encrypt and decrypt the message. Keywords: Pandora ,Shamirs key, AAA, LFSR Introduction The popularity of instant messaging has grown in an exponential way. However, most popular instant messaging services often trade speed for security. Thus, the users are Subjected to constant eavesdropping, unwanted leakage of confidential information, and even compromises of users‟ media used in instant messaging. There are several secure instant messaging services for personal or enterprise use. The server may contain the unencrypted messages for administrative purposes. Thus, the user cannot guarantee the confidentiality of the message delivered. The unwanted consequence of leaving unencrypted messages on servers may cause leakage of personal information, or even identity theft. For example, the commercial instant messaging providers may choose to mine these plaintext messages for target advertisements. To solve the aforementioned issues we presented a secure instant messaging protocol preserving confidentiality against administrator. A limitation of their protocol is that it needs to modify the instant messaging server
  • 2. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 2 FEB.-2015 2 | P a g e to satisfy the protocol requirements. In addition to encrypting the messages for confidentiality, there are some systems with a “self-data-destructing” feature. These systems focus on making data disappear after a pre specified time. In other words, data is encrypted and the encryption key is deleted after the expiration time, so that the encrypted data becomes unrecoverable, i.e., self- destructed. To our knowledge, the concept of “self-destructing” data was first mentioned by Boneh and Lipton in a revocable backup system. Then some systems such as Ephemerizer, Vanish and Porter Devices were proposed. However, none of them integrate this concept with the instant messaging service using mobile devices and take account of their limitation. We present a secure instant message encryption and exchange scheme, which can be used directly atop an existing instant messaging service architecture, so that it is easily deployable, leveraging the existing infrastructure. Specifically, we add a self-message-destructing feature to get the enhanced secure instant messaging architecture, named Pandora Messaging. Project is not only limited to Pandora system but it has many other features for securing the message. The most importantly is the steganography part. We present concealment of information using steganography. Our aim is to have an application less vulnerable to steganalysis and create a user friendly steganography application. Steganography is a technique of communicating between sender and a receiver over a communication channel by hiding the relevant information in the cover media so that avoiding the information to be exposed to an intruder. A possible carrier of secret information is applied to media such as images. The process of detecting steganographic messages is known as steganalysis and a particular steganalysis technique is called an attack. Steganalysis can be viewed as a two-stage process: 1) Classification of an image as being stego-bearing or not, and 2) Finding the location of stego-bearing pixels (i.e. the pixels containing the hidden message bits) with an aim to extracting, manipulating or sterilizing the message Steganography makes the job of the attacker more difficult because the very existence of the asset is hidden. The importance of steganography in maintaining confidentiality can be illustrated with a simple example. Imagine two coworkers, A and B, are communicating with each other over the internet. A is sending confidential information to B, such as specifications for their company‟s latest project, and then A probably does not want adversary (E) to be able to read these messages and so, A will likely encrypt his message. The problem arises because the encrypted text is likely garbled, nonsensical data. Thus, E cannot read the encrypted messages, however, he will be aware that hidden message has been communicated between A and B. E can then take the encrypted message and attempt to crack it. This is a very real problem because as computational power increases, encryption is becoming easier to break. However, if A uses steganography, and hides his secret message in a generic image file, then A can transmit his secret message to B without evoking E‟s suspicion. E will think A is just sending harmless picture to B, so E will ignore that communication between A and B. Thus, A and B defeat E. As mentioned in the example, attackers have more computing power now than ever before. DES, an encryption standard that was used by many national governments, however, mentions a cryptanalytic attack that can break DES in only a few minutes. Another example of a broken encryption algorithm isWEP, designed to provide confidentiality to users on wireless networks. Illustrates how WEP can be broken within hours. Steganography applications that hide data in images generally use a variation of least significant bit (LSB) embedding. Here images play a leading role in carrying confidential information because they can be modified to some degree if the corresponding steganographic media cannot be recognized as different from the carriers. In LSB embedding in the image, changing the LSB will only change the integer value of the byte by one. This small change is not noticeable. The visual appearance of a color and hence the image itself is not changed. A
  • 3. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 2 FEB.-2015 3 | P a g e proportionally greater change in the visual appearance of a color could be achieved by making up the RGB value of the pixel. This should have very little effect on the appearance of the image. In our application we are not only hiding the user‟s data within an image, but it also encrypts the user‟s data using the AES Cryptosystem. Lastly the system is configured to deliver messages at a specific location based on Latitude and Longitude. The recipients of the message need to be in their destined location to view the message. The user can login but cannot view the messages if the location criteria do not matches with configured location in the message header. All the messages that do not match with predefined criteria which are set by the sender then the messages are displayed as lock to recipients. Only on matching the desired criteria the recipients can unlock the messages. Enhanced Messaging System A. Cryptography on Message Cryptography is a process of sending a message securely. It is a technique for secure communication of protecting information by transforming it into an unreadable format. For cryptography we are using Shamir‟s Secret Sharing [1]algorithm in which the secret is divided into parts, giving each participant its own unique part, where some of or all the parts are needed in order to reconstruct the secret. B. Steganography on encrypted data Steganography deals with hiding of data in images and steganalysis reveals the presence of data. By using LFSR[2] steganography technique, we compute the suitability measure of the various random sequences of cipher bits against the given image. C. Location based Authentication Today‟s information systems require explicit identification between communicating entities (often entities are users). Process of entity identification is in general called authentication. The authentication is defined as affirmation of the identity of certain object in centralized systems, as refers [3]. More generally, authentication can be referred as message origin validation. Authentication is one of the three main processes of AAA systems (Authentication Authorization Accounting) [2]. Generic AAA system is in Figure 1. When a user wants to get access to the restricted area, he has to be authenticated by authenticator (1). It depends on user‟s identity authority whether grant or not the access to the restricted area (2). If the access is granted, controller establishes connection between the user and the restricted
  • 4. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 2 FEB.-2015 4 | P a g e area (3). Accounting records information related to user‟s actions (4) is created. Authentication techniques are commonly classified into three main groups as [3]:  User has something – techniques using RFID (Radio Frequency Identification Device), hardware keys, etc.;  User knows something – this group is based on knowledge of confidential information, for example password authentication;  User is someone – biometric techniques that are limited to a human authentication. Nowadays, many papers discuss using of user‟s location as a new factor of authentication. Location-based authentication can be useful in many cases. The advantages of location-based authentication present. The first place of usage can be found in the hospital sector. A doctor shouldn‟t handle with patients‟ privacy information out of hospital‟s border. ALGORITHMS In this section, algorithms for different processes of text and image based steganography used both in the sender side and receiver side are discussed.  Shamirs Algorithm is used for data encryption and decryption  Location and time constraints are applied.  For Steganography ,LFSR is used. Following Flow chart shows the basic flow for proposed Model: Figure2:ProposedAlgorithm for Steganographic model A. Shamir Secret sharing
  • 5. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 2 FEB.-2015 5 | P a g e In cryptography, secret sharing refers to a method for distributing a secret amongst a group of participant search of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their own.  Goal is to divide some data D (e.g., the safe combination) into n pieces D1,D2….Dn in such a way that:  Knowledge of any k or more D pieces makes D easily computable.  Knowledge of any k -1 or fewer pieces leaves D completely undetermined (in the sense that all its possible values are equally likely).  This scheme is called (k,n) threshold scheme. If k=n then all participants are required together to reconstruct the secret. B. Data Hiding Algorithm The difference between our application and the other programs implementation on LSB embedding is that our application ranks the seeds based on their suitability as cover images for our data. In our scheme we are using L.F.S.R‟s to generate random permutations of binary string. Details about L.F.S.R can be seen in [11]. In this, any random number generator can be used to permute the string instead of L.F.S.R‟s but information of the generator should also be communicated along with message. Inthe application the user first specifies the data that they would like to hide is in any file format, and encrypts this data using the recipient‟s El Gamal public key. Once the encrypted data is obtained, follow the below procedure. Procedure: 1) a) Determine the length of the encrypted data (n). b) Choose a cover image where it has more pixel than ‟n+ p‟, where ‟n‟ is the length of the encrypted data and ‟p‟ is the length needed to embed the encrypted information of L.F.S.R string, and its initial seed value. 2) Calculate L.F.S.R (Linear Feedback Shift Register) bit length (m) such that 2 m > n. 3) Construct an m-bit length L.F.S.R, and represent the same in binary notation (one indicates bit location is tabbed and zero indicates otherwise) 4) Set the initial value randomly for m-bit L.F.S.R, referred as a seed. 5) a) Using this (L.F.S.R, seed) generates random permutation of f1, 2,....n as fl1, l2,... . b) Permute the encrypted data using the permutation obtained above, to obtain a permutation string. 6) Test for suitability of this permuted string to be hidden into the cover image. 7) Each bit of permuted encrypted data is embedded in to the least significant bit of the pixel bytes of the cover image for which the suitability is above the threshold. If suitability is below the some fixed threshold, repeat from step 2 to 6. 8) Encrypt the L.F.S.R information that produced the above permutation and embedded this in last ‟p‟ pixels of the coverimage.0 System Architecture The project mainly works on Pandora, Steganography and Location based Message Delivery. We use the term Pandora means a self destructing Message communication.
  • 6. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 2 FEB.-2015 6 | P a g e In this section, we discuss Pandora Messaging, an enhanced secure instant messaging architecture with a self message destructing feature. The Pandora Messaging-based system is for handling the sensitive data encryption and transmission problems in an insecure mobile environment, and making sure the encrypted data is unrecoverable for any one once the destructible message‟s constraints are satisfied. Its components include: sender, receiver, Instant Messaging Server, and an optional Ephemeral Public Key Manager which is used by the receiver to delegate their ephemeral public keys. Figure3:System Architecture The project mainly works on Pandora, Steganography and Location based Message Delivery. We use the term Pandora means a self destructing Message communication. In this section, we discuss Pandora Messaging, an enhanced secure instant messaging architecture with a self message destructing feature. The Pandora Messaging-based system is for handling the sensitive data encryption and transmission problems in an insecure mobile environment, and making sure the encrypted data is unrecoverable for any one once the destructible message‟s constraints are satisfied. Its components include: sender, receiver, Instant Messaging Server, and an optional Ephemeral Public Key Manager which is used by the receiver to delegate their ephemeral public keys. We give below the details of each component. A. Sender The sender acts as an instant messaging client. When a sender would like to send a receiver the message containing sensitive personal information, the Pandora Messaging based application installed in sender„s mobile device must be able to do the following tasks: (1) generate a long-term public and private key pair;
  • 7. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 2 FEB.-2015 7 | P a g e (2) obtain an ephemeral public key from the receiver via an instant messaging service (IMS) and assign the constraint governing the condition to delete this ephemeral key; (3) generate the encrypted message using this ephemeral public key; (4) send the destructible encrypted message, including the cipher text encrypted with a secret session key, the related encryption information encrypted with this ephemeral public key, and this ephemeral public key‟s identifier, to the receiver via an IMS; (5) provide the ephemeral public key when requested by the receiver via an IMS. B. Receiver The receiver also acts as an instant messaging client. To receive the destructible messages, the Pandora Messaging based application installed in receiver„s mobile device must be able to do the following tasks: (1) Generate a long-term public and private key pair; (2) Generate a series of ephemeral key pairs; (3) Receive the destructible encrypted message from the sender via an instant messaging service (IMS); (4) Decrypt the destructible encrypted message; (5) provide the ephemeral public key when requested by the sender via an IMS; (6) Show the sensitive personal information plaintext on screen after decryption without storing the plaintext in stable storage; (7) Securely delete the ephemeral private key (i.e., overwrite it with random data) when the destructible encrypted message‟s constraints are satisfied. C. Instant Messaging Server An instance messaging server is a communication server which includes the basic features such as the authentication of the user accounts, the management of the user‟s presence status, and the instant message transmission between users. It may also support the enhanced features, such as the encryptions of the authentication process and the transmission channel, to protect the authentication information and the confidentiality of messages respectively. D. Ephemeral Public Key Manager Ephemeral Public Key Manager is an instance messaging agent which runs on a serves to keep itself available for senders and receivers, and supports ephemeral public keys management. It is needed if we intend to support off-line messaging that allows a sender to send the messages to an off-line receiver. Receivers can delegate their ephemeral public keys to the Ephemeral Public Key Manager‟s database prior to getting off-line, so that senders can still get the required ephemeral keys from the Ephemeral Public Key Manager, rather than awaiting receivers to become on-line later. The key manager is an important role to support the message push and synchronization technologies among mobile devices connected in the system because mobile devices are not always online. Conclusion This paper proposes an algorithm for data privacy. Data privacy has become increasingly important in the Cloud environment. We have used randomization of cipher bits for secured image steganography which is different than the existing steganography methods..Also, new approach for protecting data privacy from attackers who retroactively obtain, through legal or other means, a user‟s stored data and private decryption keys.
  • 8. NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: 2394-3696 VOLUME 2, ISSUE 2 FEB.-2015 8 | P a g e ACKNOWLEDGMENT It gives us great pleasure and satisfaction in presenting this paper on “A Self-Destructing Secure Messaging System Using Multi Key Management Scheme” We take this opportunity to express our profound gratitude and deep regards to our guide for her exemplary guidance , monitoring and constant encouragement throughout the course of this thesis .The blessing, help and guidance given by her time to time shall carry us a long way in the journey of life on which we are about to embark. We are obliged to staff members of our college for the valuable information provided by them in their respective fields. REFERENCES [1] Tsai-Yeh Tung, Laurent Lin, D.T.Lee”Pandora Messaging: An Enhanced Self-Message- Destructing Secure Instant Messaging Architecture for Mobile Devices” in 26th International Conference on Advanced Information Networking and Applications Workshops [2]Subba RaoY.V,Brahmananda Rao S.S,Rukma Rekha”Secure Image Steganography based on Randomized Sequence of Cipher Bits” in 2011 Eighth International Conference on Information Technology: New Generations [3]David Jaros, Radek Kuchta, “Location-Based Authentication and Authorization Using Smart Phones ” in Trust, Security and Privacy in Computing and Communications (TrustCom), JUNE2012 IEEE 11th International Of Conference