SlideShare a Scribd company logo
Title:
DATA SECURITY WITH AES ENCRYPTION,
ELLIPTIC CURVE ENCRYPTION AND SIGNATURE _
Project Supervisor & Guide _
C.Atheeq
Assistant Professor
CSE Dept,
Deccan College of
Engineering &Technology
Hyderabad.
>> Mohammed Abdul Faizan
160318733029
BEVII Sem CSE, DCET
>> Mohammed Abdul Lateef
160318733055
BEVII Sem CSE, DCET
>> Mohd Abdul Rahman
160318733057
BE VII Sem CSE, DCET
Presentation Outline_____
i. Getting to know about our Domain
ii. Current System / Literature Survey
iii.Problems in Current system
iv.Proposed System
Getting to know about our Domain-
CRYPTOGRAPHY_
• Cryptography is the study of secure communications techniques that allow only the
sender and intended recipient of a message to view its content.
• When transmitting electronic data, the most common use of cryptography is to encrypt
and decrypt email and other plain-text messages from files to databases etc.
• Cryptography redefines ACID property and Benefits of Cryptography are the
redefinition itself...
1.Authentication
2.Confidentiality
3.Impenetrable
4.Data- Integrity
Literature Survey / Current System _
• Database security is concerned with, the information security control that involves
the data protection,
stored functions protection,
the database itself ,
its servers.
• Database- used for various areas like hospital, defense, school, etc. to store the sensitive
sensitive information,
hence security of such databases is a primary concern where Cryptography comes into play.
o If a user needs to store or request the data, to do this the user needs to get
authenticated.
o When a user is authenticated, he will get key from a key generator and then
he encrypts or decrypts the data within the database.
o The basic characteristics of information that must be available in database
system is,
1. Confidentiality
2. Integrity
These are achieved in the system using AES encryption and ECDSA signature
verification.
Contd.
Fig: Key generator role for database store and retrieve - AES
Here in database,
1. AES symmetric encryption and ECC encryption, for
database Confidentiality and
2. ECC signature, for database Integrity.
are used.
Current Implementation of the System:
o There are 3 lengths of AES encryption keys: 128-bit | 192-bit | 256-bit
o Even though the key length of this encryption method varies, its block size
- 128-bits (or 16 bytes) - stays fixed.
o It all comes down to resources. For example, an app that uses AES-256
instead of AES-128 might drain your phone battery a bit faster.
o Hence key length is directly proportional to the processing resources
used.
Keys Config:
THE ECDSA _
o Elliptic Curve Digital Signature Algorithm, is one of
the public key cryptography encryption
algorithms.
o Keys are generated via ECC are smaller than the
average keys generated by other digital signing
algorithms.
o * A digital signature is an authentication method
used where a public key pair and a digital certificate
are used as a signature to verify the identity of a
recipient or sender of information.
THE 6 methods
discussed in
regards with
Database Security.
Type – 1. Rows-level encryption with AES
Type – 2. Columns- level encryption with AES
Type – 3. Elements level encryption with AES
Type – 4. Rows-level encryption with AES and ECC
Type – 5. Column level encryption with AES and ECC
Type – 6. Elements level encryption with AES and ECC
1. Rows, Column, Element-level encryption(Type 1,2,3)with AES are done
with a key binding function for generation their respective Cipher blocks.
2. Rows, Column, Element-level encryption(Type 4,5,6 )with AES and ECC
are done with a key binding function for generation their Digital
Signatures.
Brief Description of methods _
o In the current system of Database security there arises a problem, like
o While signing of the Ciphers for the Signature generation, the
authentication time is comparatively more for the receiver to decrypt the
cipher.
o This aspect is being resolved in our proposed system.
Problem in Current System _
Proposed System:
KEY AUTHENTICATION MANAGEMENT
USING CHAOS THEORY & CHEBYSHEV POLYNOMIAL
--- Guided by C.Atheeq
Objective of our Proposed system:
• To minimize the authentication time of the verification at the
receiver end & the signature generation at the sender end.
• We propose a method to provide mutual authentication
between communicating entities using chaos theory.
Directions:
o Chaos theory.
o Chaotic Cryptology.
o Chebyshev polynomial.
o Implementation procedure.
CHAOS THEORY _
• 'Chaos'- def. Some information that is extremely complicated or with an
absence of some order.
• Chaotic systems are deterministic but their long term behavior causes
difficulty in prediction with accuracy.
• Chaos theory states that the apparent(clear or open to view)
randomness of chaotic systems, there exists underlying patterns,
repetitions, self-organization etc.
CHAOTIC CRYPTOLOGY _
a) It is application of mathematical-Chaos theory for Cryptography
b) Used to privately and securely transmit the information.
c) If chaotic parameters and cryptographic keys are mapped either
symmetrically or asymmetrically they produce acceptable and functional
outputs.
d) Using this makes any intruder impossible to find the outputs without the
knowledge of inputs.
EX: Image encryption, random number generation, Hash functions.
CHEBYSHEV POLYNOMIAL...
1. Derived by Pafnuty Chebyshev, Russian mathematician for statistics,
probability and mechanics.
2. Its is a function that describes the time dependence of a point in geometric
space.
3. The Chebyshev polynomial are the sequences of major cosine functions-Tn(x)
4. Where ,n>=1;
5. There exists a semi group property of CHEBYSHEV POLYNOMIAL which is
being implemented i.e.,
, n>=1;
Q.Where exactly are these polynomials to be used..?
KEY MANAGEMENT USING CHAOS THEORY _
o By using chaos theory, the key is generated at sender as well as at receiver
side and it is compared.
o This process of mutual authentication in our proposed protocol take minimum
computational load.
o This mutual authentication gives the parameters to the Chebyshev
polynomials to generate a unique and corresponding key for the Chaotic
Cryptography.
Proof to be derived from Chaos theory and Chebyshev
polynomials :
(Sender) (Receiver
)
• Where,
m, n are public and private keys ,
x is the cipher/ message to be encrypted/ decrypted.
From the above calculations it gets clear that the sender and receiver
acquires the same secret key by using the chaos theory and does the mutual
authentication in an effective manner.
0
2000
4000
6000
8000
10000
12000
ECC Chaos 2
Comparison between RSA and Chaotic Maps
in computational time
Authentication time
taken
This protocol of minimizing the authentication time is our proposed system, so that the
authentication mechanism takes minimum computational load.
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

More Related Content

PDF
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
PPT
Fault Detection Scheme for AES Using Composite Field
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PPT
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
PPTX
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
PDF
Advanced encryption standard (aes) epul
PDF
Hybrid AES DES
PDF
Advanced Encryption Standard (AES)
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Fault Detection Scheme for AES Using Composite Field
Advanced Encryption Standard (AES) Implementaion using Java
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Advanced encryption standard (aes) epul
Hybrid AES DES
Advanced Encryption Standard (AES)

What's hot (20)

PDF
Implementation of-hybrid-cryptography-algorithm
PDF
Implementation of aes and blowfish algorithm
PDF
cns 2marks
PDF
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
PDF
Advanced Encryption Standard (AES) with Dynamic Substitution Box
PDF
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
PPTX
Hybrid encryption ppt
PDF
Aes 128 192_256_bits_project_report
PPT
Conventional Encryption NS2
PPT
Minor Project- AES Implementation in Verilog
PPTX
Rc6 algorithm
PPTX
Hybrid encryption
PPTX
Information and network security 18 modern techniques block ciphers
PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
PDF
Iaetsd enhanced cryptography algorithm for providing
PDF
Inventive Cubic Symmetric Encryption System for Multimedia
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Simulated Analysis and Enhancement of Blowfish Algorithm
PPTX
Encryption And Decryption Using AES Algorithm
PDF
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Implementation of-hybrid-cryptography-algorithm
Implementation of aes and blowfish algorithm
cns 2marks
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Hybrid encryption ppt
Aes 128 192_256_bits_project_report
Conventional Encryption NS2
Minor Project- AES Implementation in Verilog
Rc6 algorithm
Hybrid encryption
Information and network security 18 modern techniques block ciphers
New Technique Using Multiple Symmetric keys for Multilevel Encryption
Iaetsd enhanced cryptography algorithm for providing
Inventive Cubic Symmetric Encryption System for Multimedia
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Simulated Analysis and Enhancement of Blowfish Algorithm
Encryption And Decryption Using AES Algorithm
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Ad

Similar to DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE (20)

PPTX
Confidential data storage and deletion
PDF
researchpaperfinal1
PDF
ASCII Value Based Encryption System (AVB)
PDF
The Time-Consuming Task Of Preparing A Data Set For...
PDF
Analysis of Cryptographic Algorithms for Network Security
PPTX
Image encryption using elliptical curve cryptosytem with hill cipher
PPTX
CH02-CompSec4e.pptx
PDF
White Paper on Cryptography
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
PDF
Study and implementation of DES on FPGA
PPTX
big data and Iot , its security part ,hoe yoy help this
PDF
Analysis of Cryptography Techniques
PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
PDF
Hybrid Encryption for Database Security
PDF
N45028390
PPTX
Cryptography by Durlab Kumbhakar
PPTX
NS UNIT 1 Advanced Encryption Standard& RSA
PPTX
Data encryption
PDF
IRJET- Data Transmission using RSA Algorithm
Confidential data storage and deletion
researchpaperfinal1
ASCII Value Based Encryption System (AVB)
The Time-Consuming Task Of Preparing A Data Set For...
Analysis of Cryptographic Algorithms for Network Security
Image encryption using elliptical curve cryptosytem with hill cipher
CH02-CompSec4e.pptx
White Paper on Cryptography
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
A Survey on Cryptographic Techniques for Network Security.pdf
Study and implementation of DES on FPGA
big data and Iot , its security part ,hoe yoy help this
Analysis of Cryptography Techniques
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Hybrid Encryption for Database Security
N45028390
Cryptography by Durlab Kumbhakar
NS UNIT 1 Advanced Encryption Standard& RSA
Data encryption
IRJET- Data Transmission using RSA Algorithm
Ad

More from Mohammed Abdul Lateef (8)

PPTX
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
PPTX
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
PPTX
Analysis of birthday paradox bounds & Generalization.pptx
PPTX
Blockchain Smart Contract Fortification presentation.pptx
PPTX
SECURITY and PRINCIPLES IN 5G Technologies.pptx
PPTX
Bio filters/ Biofilteration
PPTX
Calorific Values
PPTX
Indian Mathematician
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Analysis of birthday paradox bounds & Generalization.pptx
Blockchain Smart Contract Fortification presentation.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
Bio filters/ Biofilteration
Calorific Values
Indian Mathematician

Recently uploaded (20)

PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPT
Project quality management in manufacturing
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Digital Logic Computer Design lecture notes
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
OOP with Java - Java Introduction (Basics)
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Project quality management in manufacturing
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Lecture Notes Electrical Wiring System Components
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Digital Logic Computer Design lecture notes
Internet of Things (IOT) - A guide to understanding
Model Code of Practice - Construction Work - 21102022 .pdf
additive manufacturing of ss316l using mig welding
OOP with Java - Java Introduction (Basics)

DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE

  • 1. Title: DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE _
  • 2. Project Supervisor & Guide _ C.Atheeq Assistant Professor CSE Dept, Deccan College of Engineering &Technology Hyderabad. >> Mohammed Abdul Faizan 160318733029 BEVII Sem CSE, DCET >> Mohammed Abdul Lateef 160318733055 BEVII Sem CSE, DCET >> Mohd Abdul Rahman 160318733057 BE VII Sem CSE, DCET
  • 3. Presentation Outline_____ i. Getting to know about our Domain ii. Current System / Literature Survey iii.Problems in Current system iv.Proposed System
  • 4. Getting to know about our Domain- CRYPTOGRAPHY_ • Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its content. • When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages from files to databases etc. • Cryptography redefines ACID property and Benefits of Cryptography are the redefinition itself... 1.Authentication 2.Confidentiality 3.Impenetrable 4.Data- Integrity
  • 5. Literature Survey / Current System _ • Database security is concerned with, the information security control that involves the data protection, stored functions protection, the database itself , its servers. • Database- used for various areas like hospital, defense, school, etc. to store the sensitive sensitive information, hence security of such databases is a primary concern where Cryptography comes into play.
  • 6. o If a user needs to store or request the data, to do this the user needs to get authenticated. o When a user is authenticated, he will get key from a key generator and then he encrypts or decrypts the data within the database. o The basic characteristics of information that must be available in database system is, 1. Confidentiality 2. Integrity These are achieved in the system using AES encryption and ECDSA signature verification. Contd.
  • 7. Fig: Key generator role for database store and retrieve - AES
  • 8. Here in database, 1. AES symmetric encryption and ECC encryption, for database Confidentiality and 2. ECC signature, for database Integrity. are used. Current Implementation of the System:
  • 9. o There are 3 lengths of AES encryption keys: 128-bit | 192-bit | 256-bit o Even though the key length of this encryption method varies, its block size - 128-bits (or 16 bytes) - stays fixed. o It all comes down to resources. For example, an app that uses AES-256 instead of AES-128 might drain your phone battery a bit faster. o Hence key length is directly proportional to the processing resources used. Keys Config:
  • 10. THE ECDSA _ o Elliptic Curve Digital Signature Algorithm, is one of the public key cryptography encryption algorithms. o Keys are generated via ECC are smaller than the average keys generated by other digital signing algorithms. o * A digital signature is an authentication method used where a public key pair and a digital certificate are used as a signature to verify the identity of a recipient or sender of information.
  • 11. THE 6 methods discussed in regards with Database Security. Type – 1. Rows-level encryption with AES Type – 2. Columns- level encryption with AES Type – 3. Elements level encryption with AES Type – 4. Rows-level encryption with AES and ECC Type – 5. Column level encryption with AES and ECC Type – 6. Elements level encryption with AES and ECC
  • 12. 1. Rows, Column, Element-level encryption(Type 1,2,3)with AES are done with a key binding function for generation their respective Cipher blocks. 2. Rows, Column, Element-level encryption(Type 4,5,6 )with AES and ECC are done with a key binding function for generation their Digital Signatures. Brief Description of methods _
  • 13. o In the current system of Database security there arises a problem, like o While signing of the Ciphers for the Signature generation, the authentication time is comparatively more for the receiver to decrypt the cipher. o This aspect is being resolved in our proposed system. Problem in Current System _
  • 14. Proposed System: KEY AUTHENTICATION MANAGEMENT USING CHAOS THEORY & CHEBYSHEV POLYNOMIAL --- Guided by C.Atheeq
  • 15. Objective of our Proposed system: • To minimize the authentication time of the verification at the receiver end & the signature generation at the sender end. • We propose a method to provide mutual authentication between communicating entities using chaos theory. Directions: o Chaos theory. o Chaotic Cryptology. o Chebyshev polynomial. o Implementation procedure.
  • 16. CHAOS THEORY _ • 'Chaos'- def. Some information that is extremely complicated or with an absence of some order. • Chaotic systems are deterministic but their long term behavior causes difficulty in prediction with accuracy. • Chaos theory states that the apparent(clear or open to view) randomness of chaotic systems, there exists underlying patterns, repetitions, self-organization etc.
  • 17. CHAOTIC CRYPTOLOGY _ a) It is application of mathematical-Chaos theory for Cryptography b) Used to privately and securely transmit the information. c) If chaotic parameters and cryptographic keys are mapped either symmetrically or asymmetrically they produce acceptable and functional outputs. d) Using this makes any intruder impossible to find the outputs without the knowledge of inputs. EX: Image encryption, random number generation, Hash functions.
  • 18. CHEBYSHEV POLYNOMIAL... 1. Derived by Pafnuty Chebyshev, Russian mathematician for statistics, probability and mechanics. 2. Its is a function that describes the time dependence of a point in geometric space. 3. The Chebyshev polynomial are the sequences of major cosine functions-Tn(x) 4. Where ,n>=1; 5. There exists a semi group property of CHEBYSHEV POLYNOMIAL which is being implemented i.e., , n>=1;
  • 19. Q.Where exactly are these polynomials to be used..? KEY MANAGEMENT USING CHAOS THEORY _ o By using chaos theory, the key is generated at sender as well as at receiver side and it is compared. o This process of mutual authentication in our proposed protocol take minimum computational load. o This mutual authentication gives the parameters to the Chebyshev polynomials to generate a unique and corresponding key for the Chaotic Cryptography.
  • 20. Proof to be derived from Chaos theory and Chebyshev polynomials : (Sender) (Receiver ) • Where, m, n are public and private keys , x is the cipher/ message to be encrypted/ decrypted. From the above calculations it gets clear that the sender and receiver acquires the same secret key by using the chaos theory and does the mutual authentication in an effective manner.
  • 21. 0 2000 4000 6000 8000 10000 12000 ECC Chaos 2 Comparison between RSA and Chaotic Maps in computational time Authentication time taken This protocol of minimizing the authentication time is our proposed system, so that the authentication mechanism takes minimum computational load.