Professional Documents
Culture Documents
Certificate Using Double Encryption
Certificate Using Double Encryption
1
TABLE OF CONTENT
INTRODUCTION 4 – 14
FEASIBILITY STUDY 15 – 20
TECHNOLOGY USED 21 – 28
SYSTEM DESIGN 29 – 36
SNAPSHOT 37 – 42
SOFTWARE TESTING 43 – 46
CONCLUSION 47
2
ABSTRACT
3
INTODUCTION
Almost all Indian government issued documents are in physical form across the
country. This means every time a resident needs to share the document with an
agency to avail any service, an attested photocopy either in physical form or on
scanned form is shared.
Encryption of data plays a vital role in the real time. This will reduce the paper-
work and workload of the verification team as all the documents will be
available at a single place and that too secured environment to keep the data out
of reach of unauthorized people, such that it is not altered and tampered.
This paper is about a System that helps citizen to get their original document
whenever they want. Citizen shouldn’t carry their original document all the
time. Citizen only needs to login into that system and download the desired
4
document. This system provides high level of security to those documents. This
system mainly implements for security purpose. In this system the documents of
citizen are encrypted using combined cryptography as AES and DES
technologies. When user or citizen want to download the document the server
decrypt the document.
PROBLEM STATEMENT
Each time we make an application for job or admission for any course or any
other purpose to the university or company, we have to submit all the
documents of all the previously appeared exams as well as the identity proofs.
Also the documents have to be attached with the form along with true copy
done. All this requires lot of verification and also the form becomes
complicated with so many documents attached. Sometimes the staff due to his
negligence can make error in verification and can lead to errors.
Also there is a huge loss if these documents get misplaced. Thus to avoid such
situations we have come up with this project idea wherein all the documents
will be created and issued as soft copy to the citizens. DigiLocker, national
Digital Locker System launched by Govt. of India which provides 1GB of free
space in the locker to securely store resident documents, is somewhat similar
to our idea of project. But it has certain drawbacks like, citizen cannot login
unless he has Aadhar card. Other issue is that DigiLocker does not allow
storing all the documents; it has options only for certain type of documents.
Also citizens themselves upload the documents which may or may not be
genuine. But our project not only allows storing the documents online, but also
we guarantee their authenticity and security.
5
Relevance of the Project
Every citizen will be provided with a card(we can use Aadhar Card to
avoid creation of more documents) which will contain UID(Unique
Identity) number and further more all the documents will be uploaded
in this account.
It will contain all the examination results from his S.S.C. till date, which
will include all government given examinations results as well as
government given identity proofs.
These results will be in the form of “Certificates” and the format will be
very compressed one which won’t require more storage space, also they
will be encrypted using various security algorithms.
The existing citizen can apply for the same and get their respective card,
long with other identity proofs.
6
The admin will get a list wise view of all the citizens with their UIN
(Unique Identification Number), which is unique for all the citizen and
he can view it also state wise and also city wise.
At government side, once they get a request from hospital authority for
creation of account, government verifies the newborn citizen and creates
an account for it. Further it issues birth certificate.
As time passes by, and more documents are needed, citizens can apply
for new documents like domicile certificate, passport, PAN card, etc.
Citizens can view their documents, download them and share them(via
email) with other people/companies/institutions.
These documents will be encrypted with algorithms like AES and DES
from government/server side. And they can be decrypted only by
Citizen’s Private Key.
7
SCOPE
Load Balancing:
Since the system will be available only the admin logs in the amount of load
on server will be limited to time period of admin access.
Easy Accessibility:
Records can be easily accessed and store and other information respectively.
User Friendly:
The system will be giving a very user friendly approach for all user.
Easy maintenance:
Pocket Certificate Data Card System is design as easy way. So maintenance is
also easy.
Technologies to be used
8
Coding (VB 6.0)
Testing (VB 6.0)
Reporting Tool (Data Report)
Overall Description
2. Accuracy: - The level of accuracy in the proposed system will be higher. All
operation would be done correctly and it ensures that whatever information is
coming from the center is accurate.
3. Reliability: - The reliability of the proposed system will be high due to the
above stated reasons. The reason for the increased reliability of the system is
that now there would be proper storage of information.
7. Easy to Operate: - The system should be easy to operate and should be such
that it can be developed within a short period of time and fit in the limited
budget of the user.
10
Project Requirements
Ram : 4 GB
Database : MYSQL
User Characteristics
11
Constraints
Definitions of problems
4. Error prone manual calculation: - Manual calculations are error prone and
take a lot of time this may result in incorrect information. For example
calculation of certificate based on double encryption.
12
as information is difficult to collect from various registers.
Advantages
Disadvantages:
Applications:
Features
The system comprises of 2 major modules with its sub-modules as follows:
1. Admin
b. Add Citizen: Admin can add new citizen with basic details, Aadhaar ID and
DOB.
c. Manage Citizen: All the added citizen details are manageable by the admin
itself.
13
d. Add Documents: System allows admin to search citizen by Aadhaar and Enter
document Type, Document. Apply Triple DES and AES Encryption & and
Send Email to Citizen.
f. Feedback: Admin can view feedback messages received from the registered
users.
2. User
a. Login: The user has to login with credentials, Aadhaar ID and OTP.
b. Documents: User can see all Encrypted file list of his/her document. A reverse
operation of the file takes place on download and converted into actual format.
Once user logs into system then he/she can Select Document Decrypt. User can
view any of the document and also can download whenever required.
c. Feedback: User can send a feedback message which will be notified to admin.
14
Feasibility Study
Depending on the results of the initial investigation the survey is now expanded
to a more detailed feasibility study. “FEASIBILITY STUDY” is a test of
system proposal according to its workability, impact of the organization, ability
to meet needs and effective use of the resources. It focuses on these major
questions:
What are the user’s demonstrable needs and how does a candidate system meet
them?
What resources are available for given candidate system?
What are the likely impacts of the candidate system on the organization?
Whether it is worth to solve the problem?
During feasibility analysis for this project, following primary areas of interest
are to be considered. Investigation and generating ideas about a new system
does this.
15
system.
Weight system performance and cost data.
Select the best-proposed system.
Prepare and report final project directive to management.
Technical feasibility
Can the work for the project be done with current equipment existing software
technology & available personal?
This is concerned with specifying equipment and software that will successfully
satisfy the user requirement. The technical needs of the system may include:
16
needs of the organization as well as helps in development of the project.
Front-end selection:
It must have a graphical user interface that assists employees that are not from
IT background.
Flexibility.
Robustness.
According to the organization requirement and the culture.
Platform independent.
Front end must support some popular back end like Ms Access.
According to the above stated features we selected VB6.0 as the front-end for
developing our project.
17
Back-end Selection:
Economical feasibility
18
phase.
The financial and the economic questions during the preliminary investigation
are verified to estimate the following:
The cost of hardware and software for the class of application being
considered.
The proposed system will give the minute information, as a result the
performance is improved which in turn may be expected to provide increased
profits.
This feasibility checks whether the system can be developed with the available
funds.
Operational Feasibility
19
What new skills will be required? Do the existing staff members have
these skills? If not, can they be trained in due course of time?
The system is operationally feasible as it very easy for the End users to operate
it. It only needs basic information about Windows platform.
Schedule feasibility
20
TECHNOLOGY USED
Visual Basic .ASP NET runs on the .NET framework, which means that it has
full access to the .NET libraries. It is a very productive tool for rapid creation of
a wide range of Web, Windows, Office, and Mobile applications that have been
built on the .NET framework.
The language was designed in such a way that it is easy to understand to both
novice and advanced programmers. Since VB.NET relies on the .NET
framework, programs written in the language run with much reliability and
scalability. With VB.NET, you can create applications that are fully object-
oriented, similar to the ones created in other languages like C++, Java, or C#.
Programs written in VB.NET can also interoperate well with programs written
in Visual C++, Visual C#, and Visual J#. VB.NET treats everything as an
object.
21
It is true that VB.NET is an evolved version of Visual Basic 6, but it's not
compatible with it. If you write your code in Visual Basic 6, you cannot compile
it under VB.NET.
History of VB.NET
In 2003, the second version of VB.NET, VB.NET 7.1, was released. This
one relied on .NET version 1.1. This version came with a number of
improvements including support for .NET Compact Framework and an
improved reliability and performance of the .NET IDE. VB.NET 2003 was also
made available in the academic edition of Visual Studio.NET and distributed to
various scholars from different countries for free.
In 2005, VB.NET 8.0 was released. The .NET core portion was dropped
from its name so as to distinguish it from the classical Visual Basic language.
This version was named Visual Basic 2005. This version came with many
features since Microsoft wanted this language to be used for rapid application
developers. They also wanted to make it different from C# language. Some of
the features introduced by this version of VB.NET included partial classes,
generics, nullable types, operator overloading, and unsigned integer support.
This version also saw the introduction of the IsNot operator.
22
In 2008, VB 9.0 was introduced. This was released together with .NET
3.5. Some of the features added to this release of VB.NET included anonymous
types, true conditional operator, LINQ support, XML literals, Lambda
expressions, extension methods, and type inference.
In 2012, VB 2012 (code 11.0) was release together with .NET 4.5. Its
features included call hierarchy, iterators, caller data, asynchronous
programming with "await" and "async" statements and the "Global" keyword in
the "namespace" statements.
In 2015, VB 2015 (code 14.0) was released alongside Visual Studio 2015.
The "?." operator was introduced to do inline null checks. A string interpolation
feature was also introduced to help in formatting strings inline.
23
VB.NET Features
VB.NET comes loaded with numerous features that have made it a popular
programming language amongst programmers worldwide. These features
include the following:
VB.NET is not case sensitive like other languages such as C++ and Java.
It is an object-oriented programming language. It treats everything as an
object.
Automatic code formatting, XML designer, improved object browser etc.
Garbage collection is automated.
Support for Boolean conditions for decision making.
Simple multithreading, allowing your apps to deal with multiple tasks
simultaneously.
Simple generics.
A standard library.
Events management.
References. You should reference an external object that is to be used in a
VB.NET application.
Attributes, which are tags for providing additional information regarding
elements that have been defined within a program.
Windows Forms- you can inherit your form from an already existing
form.
Advantages of VB.NET
The following are the pros/benefits you will enjoy for coding in VB.NET:
24
Your code will be formatted automatically.
You can create your web forms with much ease through the visual forms
designer. You will also enjoy drag and drop capability to replace any elements
that you may need.
You will enjoy features like docking, automatic control anchoring, and
in-place menu editor all good for developing web applications.
Disadvantages of VB.NET
VB.NET is easy to learn. This has led to a large talent pool. Hence, it
may be challenging to secure a job as a VB.NET programmer.
25
MYSQL: Security Improvements: MySQL now enables database
administrators to establish a policy for automatic password expiration: Any user
who connects to the server using an account for which the password is past its
permitted lifetime must change the password. For more information,
Administrators can lock and unlock accounts for better control over who can log
in.
MySQL 5.7.4 includes a gb18030 character set that supports the China National
Standard GB18030 character set. For more information about MySQL character
set support.
JSON support:
Beginning with MySQL 5.7.8, MySQL supports a native JSON type. JSON
values are not stored as strings, instead using an internal binary format that
permits quick read access to document elements. JSON documents stored in
26
JSON columns are automatically validated whenever they are inserted or
updated, with an invalid document producing an error.
JSON documents are normalized on creation, and can be compared using most
comparison operators such as =, <, <=, >, >=, <>, !=, and <=>; for information
about supported operators as well as precedence and other rules that MySQL
follows when comparing JSON values
Sys Schema:
MySQL distributions now include the sys schema, which is a set of objects that
help DBAs and developers interpret data collected by the Performance Schema.
sys schema objects can be used for typical tuning and diagnosis use cases. For
more information
Condition handling:
MySQL now supports stacked diagnostics areas. When the diagnostics area
stack is pushed, the first (current) diagnostics area becomes the second (stacked)
diagnostics area and a new current diagnostics area is created as a copy of it.
Within a condition handler, executed statements modify the new current
diagnostics area, but GET STACKED DIAGNOSTICS can be used to inspect
the stacked diagnostics area to obtain information about the condition that
caused the handler to activate, independent of current conditions within the
handler itself. (Previously, there was a single diagnostics area. To inspect
handler-activating conditions within a handler,
27
The master dump thread was refectories to reduce lock contention and improve
master throughput. Previous to MySQL 5.7.2, the dump thread took a lock on
the binary log whenever reading an event; in MySQL 5.7.2 and later, this lock is
held only while reading the position at the end of the last successfully written
event. This means both that multiple dump threads are now able to read
concurrently from the binary log file, and that dump threads are now able to
read while clients are writing to the binary log.
28
SYSTEM DESIGN
29
BLOCK DIAGRAM OF DOUBLE ENRYPTION
30
USE CASE DIAGRAM
31
Entity Relationship Diagram
32
ALGORITHMS USED
1.AES:
2. DES:
33
encryption method is similar to the one in original DES but applied 3 times
to increase the encryption level. But it is a known fact that 3DES is slower
than other block cipher methods. This is an enhancement of DES and it is 64
bit block size with 192 bits key size. 3DES has low performance in terms of
power consumption and throughput when compared with DES. It requires
always more time than DES because of its triple phase encryption
characteristics.
Algorithm:
For j = 1 to 3
{
Cj,0= IVj
For i = 1 to nj
{
Cji = EKEY3(DKEY2 (EKEY1 (Pj, iCj, i-1)))
Output Cj, i
}
}
34
Data Tables
Login Table:-
Add Citizen:-
35
Field Name Data Type Description
Aadhar_ID Text
Password Text
DOB Text
Add Document:-
SNAPSHOTS
36
1. Admin Login
2. User Feedback
37
3. ADD Citizen
38
4. ADD Document
39
5. View Feedback
40
41
6. User Login
42
SOFTWARE TESTING
GENERAL
DEVELOPING METHODOLOGIES
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program input produces valid
43
outputs. All decision branches and internal code flow should be validated. It is
the testing of individual software units of the application .it is done after the
completion of an individual unit before integration. This is a structural testing,
that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application,
and/or system configuration. Unit tests ensure that each unique path of a
business process performs accurately to the documented specifications and
contains clearly defined inputs and expected results.
Functional test
44
System Test
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results.
An example of system testing is the configuration oriented system integration
test. System testing is based on process descriptions and flows, emphasizing
pre-driven process links and integration points.
Performance Test
The Performance test ensures that the output be produced within the time
limits, and the time taken by the system for compiling, giving response to the
users and request being send to the system for to retrieve the results.
Integration Testing
45
Acceptance Testing
46
Conclusion
47
Bibliography
Mastering VB 6.0
REFERENCES
48
6. Nimmi Gupta, “Implementation of Optimized DES Encryption Algorithm
upto 4 Round on Spartan 3”, International Journal of Computer Technology
and Electronics Engineering (IJCTEE), ISSN 2249-6343, 19 Jan 2012, vol. 2,
Issue no.1.
49