Reliable Data Transaction

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 20

VENKTESHWAR INSTITUTE OF

TECHNOLOGY

PAPER PRESENTATION ON

RELIABLE DATA TRANSACTION

PRESENTED BY:

SURYAKANT TRIPATHI
GOVIND SINGH
CHOUHAN
CS - FINAL YEAR
CONTENT

 INTRODUCTION
 NEED FOR SECURE DATA TRANSACTION
 EXSISTING PROBLEMS
 UPGRADES
 FUTURE ASPECTS
 CONCLUSION
“INTRODUCTION”

In this paper new method for data security


is presented. In this method we are having
a new idea regarding the data security.
According to this method we provide a
illusion to the unauthorized person who
want to access the data without our
permission.
 For this purpose ,The  original data kept in one
package we will provide a password to the original
data. and the data which is providing illusion to the
unauthorized person  that data can be open by any
other password except the original password . and as
any unauthorized person will enter the wrong
password at least for once he will get the wrong data
and the data which we wanted to send can be send
without any disturbance or modification by any
unauthorized person hence data can be send more
efficiently without any problem.
 We keep two package of data in a single unit and one
package will contain the original data while other will
contain the data which provide the illusion to the
unauthorized person (Hacker) or misguide him that he has
cracked our data.
NEED FOR SECURE DATA TANSACTION

 Some one will try to hack the data then what would
be the procedure to protect it.
 If the authorized person would enter the wrong
password by mistake then also it can create some
problems. Suggested implementation.
SOLUTION FOR THE PROBLEMS

 1. If some one will try to open our data then either


he/she will try to enter any password first and at
least for once he will definitely enter the wrong
password .so wrong data packet will be open. since
we are opening the wrong data packet by just
entering any wrong password other then original
one .And the unauthorized person (HACKER) will
get the illusion that he has cracked the data. And
our data will be protected from any external
manipulation and disturbance.
 2. If the authorized person enters the wrong password
by mistake he will get a data just away from his
expectation. It means that the actual data which we are
sending in one packet (which is required data) and
data in other packet will be very much different from
the actual data so that the authorized person could
understand that he has entered the wrong password
and could correct his mistake by entering the right
password. This differentiation of correct and wrong
data is very simple on the basis of the field we are
using in the data packet.
DATA PACKET FIELD
 A packet is the unit of data that is routed between an
origin and a destination on the Internet or any other
packet-switched network. When any file (e-mail
message, HTML file, Graphics Interchange Format file,
Uniform Resource Locator request, and so forth) is sent
from one place to another on the Internet, the
Transmission Control Protocol (TCP) layer of TCP/IP
divides the file into "chunks" of an efficient size for
routing. Each of these packets is separately numbered and
includes the Internet address of the destination. The
individual packets for a given file may travel different
routes through the Internet. When they have all arrived,
they are reassembled into the original file (by the TCP
layer at the receiving end).
 A packet-switching scheme is an efficient way to
handle transmissions on a connectionless network
such as the Internet. An alternative scheme, circuit-
switched, is used for networks allocated for voice
connections. In circuit-switching, lines in the network
are shared among many users as with packet-
switching, but each connection requires the
dedication of a particular path for the duration of the
connection.
DATA ENCRYPTION

Plain Text-:In the plain text the original data or message


that is fed into the algorithm as an input.

Encryption Algorithm-:The encryption algorithm


Performs various substitution and transformation on the
plain text.
Secret key-:It is input to the encryption algorithm. The
exact substitution and transformation performed by
algorithm depend on the key.

Cipher Text-: This is scrambled message produced as


output. It depends on the plain text and secret key. For a
given message two different keys will produce two
different cipher text.
 Decryption Algorithm-:It is essentially the encryption
algorithm runs in reverse. It takes the cipher text and
secret and produces the original plain text.
FUTURE ASPECTS

 With the help of this all the computer crime can be


overcome up to a very high level and this goal is
achieved by simply implemented by this idea.
 Hence the problems arises in your mind can be resolve
as per above discussion.
 And implementation of this idea can help us up to a
very high level of data security.
CONCLUSION

 At present the data security is the main concept. For


to transmit our data with high security and without
any outer or unauthorized manipulation with full of
accuracy it means we need to transmit the data
efficiently. And for this efficient data transmission we
need a solution which can help us to protect from
this.
 And the solution is here in front of you. You just need
to implement this idea and use this idea. and for
implementation of this idea, We have already made
you aware about the points required for
implementation and thus from future prospective this
idea can help us a lot to do the work regarding all the
data transmission.
 As we have clear all the points regarding the topic has
been cleared that there is no point that can contradict
the idea .so this can be implemented for the purpose
of data security for transmission of data more
conveniently and efficiently
Any query…???
Thank You

You might also like