Home > Sample essays > Explore Security Primitives and AI

Essay: Explore Security Primitives and AI

Essay details and download:

Text preview of this essay:

This page of the essay has 1,751 words. Download the full version above.



   Chapter-1

Introduction

1. INTRODUCTION

   Security means protecting the information perfectly.Security primitives are based on hard mathematical problems.Since security primitives are used as building blocks,they must be very reliable.Since creating security routines are very hard.It involves security primitives are,

  1. Designing a new security primitive is very time-consuming and very error prone,even for exports in the field.

  2. Security proofs for security primitives are generally not available.

  Commonly used primitives,

    1. One-way compression function.

    2. Authentication.

    3. Private key cryptography.

    4. Digital signatures.

    5. Mix network.

    6. Private information retrieval.

    7. Commitment scheme.

Using hard AI(Artificial intelligence) is mostly used in puzzles.Captcha is a security technique to protect online email.These are mainly in wide applications are used.

    Captcha technology is also called the CaRP(Captcha as a graphical password).The notion is simple but generic.  

   

   Chapter-2

Literature survey

   

  2. LITERATURE SURVEY

  Another most important step in more software development process is Literature Survey.Before developing tool it is necessary to determine the time,cost .Once the things are satisfied,then next step is to determine on which operating system and which language should be used for developing the tool.When the developer starts building the tool .It can be used getting from senior programmers,from websites or from books.Before building the system the above more considerations are taken into account for more developing the proposed system.

Chapter-3

SYSTEM ANALYSIS

   

   

  SYSTEM ANALYSIS

3.1 EXISTING SYSTEM:

   The most notable primitive invented is based on captcha,which distinguishes human users from more computers by presenting a more challenge i.e.,a puzzle,beyond the capability of computers easy for humans.Captcha is now a standard more internet security technique to protect more online email and other service from being abused by bots.

Disadvantages of the existing system:

• This paradism more achieved just a limited success as compared with the more cryptographic primitives are more based on hard math problems.

• Using hard AI (Artificial Intelligence) problems for more  security.

3.2 PROPOSED SYSTEM:

• In this paper, we present a number of security primitive based on hard AI problems,namely,a more novel family of graphical password systems and more built on top of Captcha technology,which we can mostly call Captcha as graphical password(Ca RP).

• Ca RP is both a Captcha and a graphical password scheme. Ca RP addresses a more number of security problems altogether, such as online  more guessing attacks, relay attacks, and,if combine with more dual-view technologies,shoulder-surfing attacks.

  Advantages of the proposed system:

• Ca RP offers protection against more online dictionary attacks on passwords, which has been long time a major security for various online services.

• Ca RP also offers protection aginst relay attacks an increasing threat to bypass Captchas protection.  

   

    

  Chapter-4

   SYSTEM REQUIREMENTS

System requirements

4.1 HARDWARE REQUIREMENTS:

• CPU : Pentium IV 2.4 GHZ.

• Hard Disk    : 80 GigaBytes.

• Floppy Drive : 1.44 Megabytes.

• Monitor : LCD.

• Keyboard  : Standard widows keyboard.

• Mouse : DELL.

• Ram : 512 Megabytes.

4.2 SOFTWARE REQUIREMENTS:

• O.S.(Software)  : Windows XP.

• Coding Language : Csharp .NET.

• Database : Structured Query language Server 2005.

• Tool : Visual Studio 2008.

   

   

   Chapter-5

Software Environment

 

 Software environment

  Following software technologies should be used to implement the system.

5.1:.NET Framework

  .Net framework mostly developed by Microsoft.It primarily run on Microsoft windows.It has large class library called called framework class library(FCL).Programs are well written in the .net framework to execute in a software environment  called common language runtime(CLR).It is usually provides language more interoperability across several programming languages.

   It simplifies application development in the mostly distributed environment of the internet.It provides object-oriented programming environment.It minimizes more of the software development and guarantees safe execution of code.Many types of applications,such as windows-based applications and desktop-applications that can develop using .net framework.

Objectives of .NET framework

  1. To provide a more consistent object-oriented programming environment whether object codes are stored and executed locally on Internet-distributed.

   2. To provide a more code-execution environment to minimizes more software deployment and guarantees the most safe execution of code.

  3. Eliminates for performance problems.

Common Language Runtime (CLR):

   The CLR is the core engine of .NET. It provides the environment in which .net supported programs run.

    Some of the features of CLR are:

• Conversion from a mostly low level language,called Intermediate Language(IL),into code native to the which platform being executed on.

• Memory management that supports garbage collection.

• Load and execute programs with version.

• Other features of the .NET framework are

Managed Code, which is a metadata to describe itself.

Managed Data, which support garbage collection.

Common Type System, which support type safety.

Common Language Specification specifies set of rules using the CLR.

Framework class library (FCL):

   .NET provides set of hierarchy of classes.The root of the classes is called system.The root class contains basic types like Byte,Double,Boolean,and string.All objects are derived from system object.Value types are the objects that are allocated in the stack.They are flexible.That is one can more convering value types to object types if necessary.

  The set of classes provides collections, file, screen, and networkI/O, threading as well as more XML and database connectivity.

  The class library was subdivided into a number of sets are called namespaces, each providing distinct areas of functionality.

Languages supported by .NET:

  Following are the some of the languages that are supported by framework

Visual Basic

Visual C++

Visual J#

C#

Visual Perl

Visual Python

  Visual Basic.NET is a CLS compliant, that is,that mostly CLS compliant language can use the classes,objects,and components that are usually created in Visual Basic.NET.

  Managed Extensions for mostly C++ and attributed programming are just more of the enhancements made to the C++ language.It simplify mostly using the task of migrating with existing C++ applications into .NET framework applications.

  C# is Microsoft’s new language.It’s a C/C++ style language with .net more support.It has more standard library of its own it has been designed use the .NET libraries as its own.

  Microsoft Visual J# .NET more  provides the easiest transition for more java-language developers into the world of XML web services and dramatically more  improves the language interoperability of  java language programs with more existing software written in a variety of  mostly from other programming languages.

   Active State has mostly created Visual Perl and Visual Python, they support .NET aware applications to be more built in either Perl or Python.

5.2 MSSQL:

  Microsoft SQL server is a mostly relational database management system developed  by Microsoft.It is a important database server.Its main functions are storing,retrieving and editing the data.There are several number of  SQL server versions are available in the market.

  The objects that SQL server database consists as shown below:

1. TABLE

2. QUERY

3. FORM

4. MACRO

  1. TABLE:

  A database is a collection of relational tables.Table is a collection of records.Record is a collection of fields about a more specific topic.

Views of table:

  We can work with a table mostly in two types.

  1. Design view.

  2. Datasheet view.

1. Design view:

  To build or modify the structure of a table mostly we work in the table design view.We can specify what type of data it should be hold.

2. Datasheet view:

   Datasheet view helps to insert, retrieve, edit or analyses the data.

QUERY:

  A query is a request that can be asked the database server.SQL gathers that a from one or more table and respond to the request.We can delete, update data using queries.

FORM:

  It will used to display the total design.

 

    

   

  Chapter-6

  SYSTEM STUDY

    

  6.1: FEASIBILITY STUDY:

  The feasibility of the project is analyzed in this phase.and business proposal and general plan for the project described.And also specifies cost estimation.During system analysis is the feasibility study of the proposed system should be done.This ensures that the proposed system is not a burden to the company.For feasibility analysis,understanding of the system requirements are necessary.

  There are three key considerations in the feasibility study.

They are:

• Economical level feasibility.

• Technical level feasibility.

• Social level feasibility.

6.2: Economical feasibility

    Economical feasibility mostly study checks the economic impact that the system will have on the organization.The amount that the company can invest into the research and development of the system is limited.The company expenditures should be more minimized.In a way developed system should be within the budget of the company and this was achieved by the technologies are available freely.Only the customized products had to be purchased.

6.3: Technical feasibility

  Technical feasibility study checks the technical requirements of the system.The system should be developed in a way it can run in minimum technical resources are possible.This will not lead high demands on the available technical resources.This will not lead to high demands being placed on the client.The final system must have a modest requirement.And also only minimal or zero changes are required for implementing the system.

6.4: Social feasibility

   The social feasibility study checks the level of acceptance of the system by the end user.This includes the mostly process of user training.So that user can user the system efficiently.The user should accept the system as a easy as possible.The user should not feel more threatened by the system.The level of acceptance by the users is depends on the methods that are employed to educate the user more about the system and make him familiar with the mostly system.The level of confidence must be raised.So that the user is able to make some constructive criticism like he is the final user of the system.

 

 

 

   

  Chapter-7

  SYSTEM IMPLEMENTATION

    

7. IMPLEMENTATION

    The project implementation stage turns the theoretical design into a working system.It also gives the user,the more confidence that the new system will work efficiently.

   The implementation stage involves planning, investigation of existing system and more specify constraints in its implementation, designing of methods to achieve more changeover and evaluation of changeover methods.

7.1 Modules Description

   There are four modules in the system as discussed below:

  1. Graphical password

  2. Captcha in authentication

  3. Guessing attacks

  4. Security of underlying captcha

1. Graphical password

    It is an authentication system that works user to select images in a particular order.

2. Captcha in authentication

   Authentication is the process of more  proving one identity to someone else.Authentication must be done in the basis of more messages and data exchanged as apart of an authentication protocol.

3. Guessing attacks

  These attacks are highly effective and feasible.Generally guessing means lattery.

4. Security of underlying captcha

  Computational more intractability in recognizing objects in CaRP image is fundamental to CaRP.

...(download the rest of the essay above)

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Explore Security Primitives and AI. Available from:<https://www.essaysauce.com/sample-essays/2015-10-7-1444224808/> [Accessed 17-07-24].

These Sample essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on Essay.uk.com at an earlier date.