Вы находитесь на странице: 1из 8

Department of Electronics and communication Engineering

Technical seminar report on

RSA ALGORITHM
Submitted in partial fulfillment of the requirements for the award of Degree of
BACHELOR OF TECHNOLOGY

In

ELECTRONICS AND COMMUNICATION ENGINEERING

By

R.PRAVEEN KUMAR (13AT1A04A6)

Under the guidance of


D.RAJA SHEKARM.Tech(Ph.D.)

Associate Professor

Department of Electronics and Communication Engineering


G.PULLAIAH COLLEGE OF ENGINEERING AND
TECHNOLOGY
Accredited by NAAC with A Grade
An ISO 9001:2008 Certified Institution, Recognized by UGC under Section 2(f) & 12(B)

(Approved by AICTE, New Delhi & Permanently Affiliated to JNTUA Anantapur,


Ananthapuramu)

Pasupala(V),Nandikotkur Road, Kurnool, A.P-518452.


www.gpcet.ac.in
Department of Electronics and Communication Engineering

G.PULLAIAH COLLEGE OF ENGINEERING AND


TECHNOLOGY
Accredited by NAAC with A Grade
An ISO 9001:2008 Certified Institution, Recognized by UGC under Section 2(f) & 12(B)

(Approved by AICTE, New Delhi & Permanently Affiliated to JNTUA Anantapur,


Ananthapuramu)

Pasupala(V),Nandikotkur Road, Kurnool, A.P-518452.


www.gpcet.ac.in

CERTIFICATE

This is to certify that the Technical seminar entitled RSA ALGORITHM is being
submitted by R.PRAVEEN KUMAR (13AT1A04A6) in partial fulfillment for the award of
degree of BACHELOR OF TECHNOLOGY in ELECTRONICS AND
COMMUNICATION ENGINEERING to Jawaharlal Nehru Technological University,
Ananthapuramu during the academic year 2016-17 is a record of bonafide work carried out by
her under my guidance and supervision.

Guide Head of the


Department

D.RAJASHEKARM.Tech(Ph.D)
Dr.K.E.SREENIVASA MURTHYPh.D
Associate Professor Professor & H.O.D of
ECE

CONTENTS

CHAPTERS PAGE NO

ABSTRACT---------------------------------------------------------------------------(i)

1.INTRODUCTION------------------------------------------------------------------1

1.1 TYPES OF
CRYPTOGRAPHY-------------------------------------------------------- 2
1.1.1CODES AND CODE
BOOKS-------------------------------------------------
1.1.2
STEGANOGRAPHY------------------------------------------------------------
3
1.1.3 CIPHERS------------------------------------------------------------------------
4
1.2 COMPUTER CIPHERS AND
ENCRYPTION----------------------------------------- 5
1.3
CRYPTANALYSIS-----------------------------------------------------------------------
-- 6
1.4 SECURITY
SERVICES--------------------------------------------------------------------
1.5 SECURITY
THREATS--------------------------------------------------------------------
2.SECURITY
MECHANISMS--------------------------------------------------------------
--- 7
2.1
ENCRYPTION---------------------------------------------------------------------------
2.2 RSA
ALGORITHM----------------------------------------------------------------------8
2.2.1 STEPS
INVOLVED---------------------------------------------------------------9
2.2.2
EXAMPLE-------------------------------------------------------------------------10
2.3 HASH
ALGORITHM--------------------------------------------------------------------11
3. WATER
MARKING-------------------------------------------------------------------
-------12
4. APPLICATIONS OF
CRYPTOGRAPHY---------------------------------------------------14
4.1 PROTECTING ATM
TRASACTIONS--------------------------------------------------
4.1.1 CUSTOMER
AUTHENTICATION---------------------------------------------- 15
4.1.2 ON/OFFLINE
OPERATION----------------------------------------------------- 17
4.2 SMART
CARD----------------------------------------------------------------------------- 19
4.2.1 SMART CARD
MEMORY------------------------------------------------------
4.2.2SMART CARD
PROCESSING-------------------------------------------------------20
4.2.3 ROLE OF SMART
CARDS-----------------------------------------------------------21
5.
CHALLENGES--------------------------------------------------------------
---------------------22
6.
CONCLUSION--------------------------------------------------------------
--------------------23
7.
REFERENCES---------------------------------------------------------------
---------------------24
LIST OF FIGURES

FIGURE NAME PAGE NO.

1.CIPHER
TEXT-------------------------------------------------------------------- 4
2.ENCRYPTION AND
DECRYPTION------------------------------------------ 7
3. SYMMETRIC KEY
CRYPTOGRAPHY-----------------------------------------8
4.DIFFIE-HELLMAN KEY
EXCHANGE---------------------------------------- 9
5. STEPS IN RSA
ALGORITHM--------------------------------------------------9
6. EXAMPLE FOR
RSA------------------------------------------------------------10
7. BLOCK DIAGRAM ATM
TRANSACTION-----------------------------------15
8. SMART CARD
------------------------------------------------------------------19

ABSTRACT

Real time vehicle tracking using GPS and GPRS is web based GPS-GPRS vehicle tracking
system was designed and implemented. The current position of the vehicle was acquire by GPS
device which is integrated to the target vehicle and the location coordinates are sent through
GPRS service provided by the GSM network. The GPS receiver is used to give latitude and
longitude of the current location. The proposed system is built using the microcontroller. This is
the heart of the device. This GPS receiver is interfaced with microcontroller through the serial
port and used to obtain the current location. The GPS receiver acquires the present position of the
location and sends the same acquired values to GPRS through another port, to display the exact
location on Google map. GPRS and GPS based tracking system will provide effective, real time
vehicle location report. A GPS-GPRS based tracking system gives all the specifications about the
location of a vehicle. The system utilizes geographic position and time information from the
Global Positioning Satellites. The system uses an On Vehicle Module consists of GPS receiver
and GSM modem, the device resides in the vehicle to be tracked. Microcontroller sends the same
acquired values to the GPRS modem through another com port, to display exact location on the
Google maps. Here we are using AT command for controlling the GPS and GPRS modems. AT
commands are nothing but instructions used to control the modem. The GPS modem fetches the
location and sends it to the server using GPRS. The integration of GPS and GSM was first
established using SMS as a method of transmitting GPS coordinates. The inclusion of GPRS
technology to transmit location coordinates to a remote server facilitates the tracking of object
remotely using any computer connected to the web.