Вы находитесь на странице: 1из 14

SECURING PASSWORD FILE USING

BEZIER CURVES
SECURITY
• The data forms the basis of existence, progression and
growth of any organization. It act as the soul of organization.
Hence its security and maintenance became the primary
concern.

• In the computer world, computer security system took this


responsibility and with time and need of the hour, the
various security systems emerged.
MODES OF SECURITY SYSTEM

Authentication

Security
System

Authorization Access Control


AUTHENTICATION
 Authentication : The process of verifying ones
identity.

 Thesuccess of authorization and access


control rely on the precision and the accuracy
with which the authentication is carried out.

 Generally, it is established by the username,


password, physical keys (tokens, smart cards,
etc.) and physical attributes of user (finger
prints, eye pattern, etc).
CONT….
 These are generally alpha-numeric or graphic in
nature. The alpha-numeric codes when entered are
stored in the binary form. The advantage is that it is
easily understandable by the system and hence is
cheap and less time consuming by the system. The
graphic passwords has edge in constructing the high
reliability authentication system by matching
patterns but finds its limitations being costly and
time consuming.

 Thispaper looks for the mid-way, i.e., system having


high reliability but affordable in both, time and cost.
SECURING PASSWORD FILE USING
BEZIER CURVES

 The aim of this research is to protect the data by using


a new kind of encryption technique to which researcher
would like to name as curveagraphy.
BEZIER CURVE

 Developed by Pierre Bezier in the 1970s.

 A Bezier curve in its most common form is a


simple cubic equation that can be used in any
number of useful ways like computer graphics and
related fields.
WORKING MODEL OF CURVEAGRAPHY
EXECUTION OF ALGORITHM

Encryption Process for ‘R’


Character ASCII Bit Calculation Curve
Value
(Password character) ‘R’ 82 01010010
( )
Point ‘.’ -46 00101110
36 00100100
24 bits will be transferred to the memory for ‘R’
001011100010010000101110, where R can be
retrieved by adding 36 (centered 8-bits) to either
left or right 8-bits of the point.
ENCRYPTION PROCESS FOR ‘A’
Character ASCII Bit Calculation Curve
Value

(Password character) ‘A’ 65 01000001


(Point) ‘.’ - 46 - 00101110
19 00010011

Bits for ‘A’ will be 001011100001001100101110


ENCRYPTION PROCESS FOR ‘M’

Character ASCII Bit Calculation Curve


Value

(Password character) ‘M’ 77 01001101


(Point) ‘.’ - 46 - 00101110
31 00011111

Bits for ‘M’ will be 001011100001111100101110


ADVANTAGES
 It is a different approach towards securing the data.
 It provides the security at two levels, one at the time of
key press by encryption process and second at storage
level, in password file the whole password by single
Bezier curve.
 The final single curve also in turn saves the storage
space.
 This prevent the intruders from interpreting the
characters.
 It will take less time to process in comparison to
graphical password pattern matching.
LIMITATIONS

 The normal 8-bits are send as 24-bits in the


encryption process, which restricts the registers
for being used for other operations.
Thank You

Вам также может понравиться