Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 49

TOPIC NAME

CERTIFICATE USING DOUBLE ENCRYPTION

1
TABLE OF CONTENT

PARTICULARS PAGE NUMBER

INTRODUCTION 4 – 14

FEASIBILITY STUDY 15 – 20

TECHNOLOGY USED 21 – 28

SYSTEM DESIGN 29 – 36

SNAPSHOT 37 – 42

SOFTWARE TESTING 43 – 46

CONCLUSION 47

BIBLIOGRAPHY AND REFERENCES 48 – 49

2
ABSTRACT

We introduce the notion of certificate-based double encryption. In this model, a


certificate – or, more generally, a signature – acts not only as a certificate but
also as a decryption key. To decrypt a message, a keyholder needs both its
secret key and an up-to-date certificate from its CA (or a signature from an
authorizer). Certificate-based double encryption combines the best aspects of
identity-based encryption (implicit certification) and public key encryption (no
escrow). We demonstrate how certificate-based encryption can be used to
construct an efficient PKI requiring less infrastructure than previous proposals,
including Micali’s Novomodo, Naor-Nissim and Aiello-Lodha-Ostrovsky.
Comment: This is a version of the Eurocrypt 2003 paper, identical except for
this comment and a correction in Section 3.2. I’m posting it online to make it
more widely available, particularly since a couple of recent works propose
essentially the same idea.

3
INTODUCTION

Almost all Indian government issued documents are in physical form across the
country. This means every time a resident needs to share the document with an
agency to avail any service, an attested photocopy either in physical form or on
scanned form is shared.

Use of document hard copies creates huge overhead in terms of manual


verification, paper storage, manual audits, etc. incurring high cost and
inconvenience. This creates problem for various agencies to verify the
authenticity of these documents, thus, creating loopholes for usage of fake
documents/certificates. These documents can be misused by anyone as strong
identity is not attached with the document. This system is digital locker which
provides digital empowerment for residents. It minimize the use of physical
documents. System helps authenticity of the e-documents and eliminates usage
of fake documents. This system provides more security to documents. It reduces
administrative overhead of Govt. departments and agencies and make it easy for
the residents to receive services. Documents can be accessed by multiple users
at anytime and anywhere.

Encryption of data plays a vital role in the real time. This will reduce the paper-
work and workload of the verification team as all the documents will be
available at a single place and that too secured environment to keep the data out
of reach of unauthorized people, such that it is not altered and tampered.

This paper is about a System that helps citizen to get their original document
whenever they want. Citizen shouldn’t carry their original document all the
time. Citizen only needs to login into that system and download the desired

4
document. This system provides high level of security to those documents. This
system mainly implements for security purpose. In this system the documents of
citizen are encrypted using combined cryptography as AES and DES
technologies. When user or citizen want to download the document the server
decrypt the document.

PROBLEM STATEMENT

Each time we make an application for job or admission for any course or any
other purpose to the university or company, we have to submit all the
documents of all the previously appeared exams as well as the identity proofs.
Also the documents have to be attached with the form along with true copy
done. All this requires lot of verification and also the form becomes
complicated with so many documents attached. Sometimes the staff due to his
negligence can make error in verification and can lead to errors.

Also there is a huge loss if these documents get misplaced. Thus to avoid such
situations we have come up with this project idea wherein all the documents
will be created and issued as soft copy to the citizens. DigiLocker, national
Digital Locker System launched by Govt. of India which provides 1GB of free
space in the locker to securely store resident documents, is somewhat similar
to our idea of project. But it has certain drawbacks like, citizen cannot login
unless he has Aadhar card. Other issue is that DigiLocker does not allow
storing all the documents; it has options only for certain type of documents.
Also citizens themselves upload the documents which may or may not be
genuine. But our project not only allows storing the documents online, but also
we guarantee their authenticity and security.

5
Relevance of the Project

 The “Certificate for Government Portal using Combined Double


Encryption” will make a complete information detail about each
individual citizen.

 Once a citizen is born, a request from the respective hospital is made to


government for Birth Certificate. Thus every citizen’s account is
created.

 Every citizen will be provided with a card(we can use Aadhar Card to
avoid creation of more documents) which will contain UID(Unique
Identity) number and further more all the documents will be uploaded
in this account.

 It will contain all the examination results from his S.S.C. till date, which
will include all government given examinations results as well as
government given identity proofs.

 These results will be in the form of “Certificates” and the format will be
very compressed one which won’t require more storage space, also they
will be encrypted using various security algorithms.

 The existing citizen can apply for the same and get their respective card,
long with other identity proofs.

6
 The admin will get a list wise view of all the citizens with their UIN
(Unique Identification Number), which is unique for all the citizen and
he can view it also state wise and also city wise.

 At government side, once they get a request from hospital authority for
creation of account, government verifies the newborn citizen and creates
an account for it. Further it issues birth certificate.

 As time passes by, and more documents are needed, citizens can apply
for new documents like domicile certificate, passport, PAN card, etc.

 Upon successful creation and uploading of documents citizens will be


sent an e-mail and an SMS notifying about the document upload.

 Citizens can view their documents, download them and share them(via
email) with other people/companies/institutions.

 These documents will be encrypted with algorithms like AES and DES
from government/server side. And they can be decrypted only by
Citizen’s Private Key.

 This will prevent unauthorized access to documents, maintaining their


security.

7
SCOPE

Load Balancing:
Since the system will be available only the admin logs in the amount of load
on server will be limited to time period of admin access.

Easy Accessibility:
Records can be easily accessed and store and other information respectively.

User Friendly:
The system will be giving a very user friendly approach for all user.

Efficient and reliable:


Maintaining the all secured and database on the server which will be
accessible according the user requirement without any maintenance cost will
be a very efficient as compared to storing all the citizen data on the
spreadsheet or in physically in the record books.

Easy maintenance:
Pocket Certificate Data Card System is design as easy way. So maintenance is
also easy.

Technologies to be used

This project will be a desktop application to be developed in VB 6.0 having Ms


Access as backend.
 Database Design (Ms Access)
 Form Design (VB 6.0)

8
 Coding (VB 6.0)
 Testing (VB 6.0)
 Reporting Tool (Data Report)

Overall Description

Goals of proposed system

1. Planned approach towards working: - The working in the organization will


be well planned and organized. The data will be stored properly in data stores,
which will help in retrieval of information as well as its storage.

2. Accuracy: - The level of accuracy in the proposed system will be higher. All
operation would be done correctly and it ensures that whatever information is
coming from the center is accurate.

3. Reliability: - The reliability of the proposed system will be high due to the
above stated reasons. The reason for the increased reliability of the system is
that now there would be proper storage of information.

4. No Redundancy: - In the proposed system utmost care would be that no


information is repeated anywhere, in storage or otherwise. This would assure
economic use of storage space and consistency in the data stored.

5. Immediate retrieval of information: - The main objective of proposed system


is to provide for a quick and efficient retrieval of information. Any type of
information would be available whenever the user requires.
9
6. Immediate storage of information: - In manual system there are many
problems to store the largest amount of information.

7. Easy to Operate: - The system should be easy to operate and should be such
that it can be developed within a short period of time and fit in the limited
budget of the user.

10
Project Requirements

Hardware System Requirements

 System : Pentium I3 Processor

 Hard Disk : 500GB

 Monitor : Standard LED Monitor

 Input Devices : Keyboard

 Ram : 4 GB

Software System Requirements

 Operating System : Window 7/8/10

 Available Coding Language : VB.Net

 Database : MYSQL

User Characteristics

 Every user should be:

 Comfortable of working with computer.

 He must have knowledge in encryption field.

 He must also have basic knowledge of English too.

11
Constraints

 GUI is only in English.

 Login and password is used for identification of user and there is no


facility for guest.

Definitions of problems

Problems with conventional system

1. Lack of immediate retrievals: -The information is very difficult to retrieve and


to find particular information like- E.g. - To find out about the certificate
history, the user has to go through various registers. This results in
inconvenience and wastage of time.

2. Lack of immediate information storage: - The information generated by


various transactions takes time and efforts to be stored at right place.

3. Lack of prompt updating: - Various changes to information like user details or


immunization details of certificate are difficult to make as paper work is
involved.

4. Error prone manual calculation: - Manual calculations are error prone and
take a lot of time this may result in incorrect information. For example
calculation of certificate based on double encryption.

5. Preparation of accurate and prompt reports: - This becomes a difficult task

12
as information is difficult to collect from various registers.

Advantages

 Triple DES and AES Encryption is used on document to keep it secure.


 Easy access of files and cannot be lost.
 Only legitimate users can access their documents and download the file.
 System auto decrypts the files once user click on download.

Disadvantages:

 System may provide incorrect results if data not entered correctly.

Applications:

 This system can be used for storing Important Documents in encrypted


format.

Features
The system comprises of 2 major modules with its sub-modules as follows:

1. Admin

a. Login: Admin need to login with their valid login credentials.

b. Add Citizen: Admin can add new citizen with basic details, Aadhaar ID and
DOB.

c. Manage Citizen: All the added citizen details are manageable by the admin
itself.
13
d. Add Documents: System allows admin to search citizen by Aadhaar and Enter
document Type, Document. Apply Triple DES and AES Encryption & and
Send Email to Citizen.

e. Manage Documents: Search Citizen with List of Uploaded Documents and


Option to Upload.

f. Feedback: Admin can view feedback messages received from the registered
users.

2. User

a. Login: The user has to login with credentials, Aadhaar ID and OTP.

b. Documents: User can see all Encrypted file list of his/her document. A reverse
operation of the file takes place on download and converted into actual format.
Once user logs into system then he/she can Select Document Decrypt. User can
view any of the document and also can download whenever required.

c. Feedback: User can send a feedback message which will be notified to admin.

14
Feasibility Study

Depending on the results of the initial investigation the survey is now expanded
to a more detailed feasibility study. “FEASIBILITY STUDY” is a test of
system proposal according to its workability, impact of the organization, ability
to meet needs and effective use of the resources. It focuses on these major
questions:

 What are the user’s demonstrable needs and how does a candidate system meet
them?
 What resources are available for given candidate system?
 What are the likely impacts of the candidate system on the organization?
 Whether it is worth to solve the problem?

During feasibility analysis for this project, following primary areas of interest
are to be considered. Investigation and generating ideas about a new system
does this.

Steps in feasibility analysis

Eight steps involved in the feasibility analysis are:

 Form a project team and appoint a project leader.


 Prepare system flowcharts.
 Enumerate potential proposed system.
 Define and identify characteristics of proposed system.
 Determine and evaluate performance and cost effective of each proposed

15
system.
 Weight system performance and cost data.
 Select the best-proposed system.
 Prepare and report final project directive to management.

Technical feasibility

A study of resource availability that may affect the ability to achieve an


acceptable system. This evaluation determines whether the technology needed
for the proposed system is available or not.

 Can the work for the project be done with current equipment existing software
technology & available personal?

 Can the system be upgraded if developed?

 If new technology is needed then what can be developed?

This is concerned with specifying equipment and software that will successfully
satisfy the user requirement. The technical needs of the system may include:

Front-end and back-end selection

An important issue for the development of a project is the selection of suitable


front-end and back-end. When we decided to develop the project we went
through an extensive study to determine the most suitable platform that suits the

16
needs of the organization as well as helps in development of the project.

The aspects of our study included the following factors.

 Front-end selection:

 It must have a graphical user interface that assists employees that are not from
IT background.

 Scalability and extensibility.

 Flexibility.

 Robustness.
 According to the organization requirement and the culture.

 Must provide excellent reporting features with good printing support.

 Platform independent.

 Easy to debug and maintain.

 Event driven programming facility.

 Front end must support some popular back end like Ms Access.

According to the above stated features we selected VB6.0 as the front-end for
developing our project.

17
Back-end Selection:

 Multiple user support.


 Efficient data handling.
 Provide inherent features for security.
 Efficient data retrieval and maintenance.
 Stored procedures.
 Popularity.
 Operating System compatible.
 Easy to install.
 Various drivers must be available.
 Easy to implant with the Front-end.
According to above stated features we selected Ms-Access as the backend.
The technical feasibility is frequently the most difficult area encountered at this
stage. It is essential that the process of analysis and definition be conducted in
parallel with an assessment to technical feasibility. It centers on the existing
computer system (hardware, software etc.) and to what extent it can support the
proposed system.

Economical feasibility

Economic justification is generally the “Bottom Line” consideration for most


systems. Economic justification includes a broad range of concerns that
includes cost benefit analysis. In this we weight the cost and the benefits
associated with the candidate system and if it suits the basic purpose of the
organization i.e. profit making, the project is making to the analysis and design

18
phase.

The financial and the economic questions during the preliminary investigation
are verified to estimate the following:

 The cost to conduct a full system investigation.

 The cost of hardware and software for the class of application being
considered.

 The benefits in the form of reduced cost.

The proposed system will give the minute information, as a result the
performance is improved which in turn may be expected to provide increased
profits.

This feasibility checks whether the system can be developed with the available
funds.

Operational Feasibility

It is mainly related to human organizations and political aspects. The points to


be considered are:

 What changes will be brought with the system?

 What organization structures are disturbed?

19
 What new skills will be required? Do the existing staff members have
these skills? If not, can they be trained in due course of time?

The system is operationally feasible as it very easy for the End users to operate
it. It only needs basic information about Windows platform.

Schedule feasibility

Time evaluation is the most important consideration in the development of


project. The time schedule required for the developed of this project is very
important since more development time effect machine time, cost and cause
delay in the development of other systems.

20
TECHNOLOGY USED

VB.NET stands for Visual Basic.NET, and it is a computer programming


language developed by Microsoft. It was first released in 2002 to replace Visual
Basic 6. VB.NET is an object-oriented programming language. This means that
it supports the features of object-oriented programming which include
encapsulation, polymorphism, abstraction, and inheritance.

Visual Basic .ASP NET runs on the .NET framework, which means that it has
full access to the .NET libraries. It is a very productive tool for rapid creation of
a wide range of Web, Windows, Office, and Mobile applications that have been
built on the .NET framework.

The language was designed in such a way that it is easy to understand to both
novice and advanced programmers. Since VB.NET relies on the .NET
framework, programs written in the language run with much reliability and
scalability. With VB.NET, you can create applications that are fully object-
oriented, similar to the ones created in other languages like C++, Java, or C#.
Programs written in VB.NET can also interoperate well with programs written
in Visual C++, Visual C#, and Visual J#. VB.NET treats everything as an
object.

21
It is true that VB.NET is an evolved version of Visual Basic 6, but it's not
compatible with it. If you write your code in Visual Basic 6, you cannot compile
it under VB.NET.

History of VB.NET

 VB.NET is a multi-paradigm programming language developed by


Microsoft on the .NET framework. It was launched in 2002 as a successor to the
Visual Basic language. This was the first version of VB.NET (VB.NET 7.0) and
it relied on .NET version 1.0.

 In 2003, the second version of VB.NET, VB.NET 7.1, was released. This
one relied on .NET version 1.1. This version came with a number of
improvements including support for .NET Compact Framework and an
improved reliability and performance of the .NET IDE. VB.NET 2003 was also
made available in the academic edition of Visual Studio.NET and distributed to
various scholars from different countries for free.

 In 2005, VB.NET 8.0 was released. The .NET core portion was dropped
from its name so as to distinguish it from the classical Visual Basic language.
This version was named Visual Basic 2005. This version came with many
features since Microsoft wanted this language to be used for rapid application
developers. They also wanted to make it different from C# language. Some of
the features introduced by this version of VB.NET included partial classes,
generics, nullable types, operator overloading, and unsigned integer support.
This version also saw the introduction of the IsNot operator.

22
 In 2008, VB 9.0 was introduced. This was released together with .NET
3.5. Some of the features added to this release of VB.NET included anonymous
types, true conditional operator, LINQ support, XML literals, Lambda
expressions, extension methods, and type inference.

 In 2010, Microsoft released VB 2010 (code 10.0). They wanted to use a


Dynamic Language Runtime for this release, but they opted for co-evolution
strategy shared between VB.NET and C# to bring these languages closer to
each other.

 In 2012, VB 2012 (code 11.0) was release together with .NET 4.5. Its
features included call hierarchy, iterators, caller data, asynchronous
programming with "await" and "async" statements and the "Global" keyword in
the "namespace" statements.

 In 2015, VB 2015 (code 14.0) was released alongside Visual Studio 2015.
The "?." operator was introduced to do inline null checks. A string interpolation
feature was also introduced to help in formatting strings inline.

 In 2017, VB 2017 (code 15.0) was introduced alongside Visual Studio


2017. A better way of organizing source code in just a single action was
introduced.

23
VB.NET Features

VB.NET comes loaded with numerous features that have made it a popular
programming language amongst programmers worldwide. These features
include the following:

 VB.NET is not case sensitive like other languages such as C++ and Java.
 It is an object-oriented programming language. It treats everything as an
object.
 Automatic code formatting, XML designer, improved object browser etc.
 Garbage collection is automated.
 Support for Boolean conditions for decision making.
 Simple multithreading, allowing your apps to deal with multiple tasks
simultaneously.
 Simple generics.
 A standard library.
 Events management.
 References. You should reference an external object that is to be used in a
VB.NET application.
 Attributes, which are tags for providing additional information regarding
elements that have been defined within a program.
 Windows Forms- you can inherit your form from an already existing
form.

Advantages of VB.NET

The following are the pros/benefits you will enjoy for coding in VB.NET:

24
 Your code will be formatted automatically.

 You will use object-oriented constructs to create an enterprise-class code.


 You can create web applications with modern features like performance
counters, event logs, and file system.

 You can create your web forms with much ease through the visual forms
designer. You will also enjoy drag and drop capability to replace any elements
that you may need.

 You can connect your applications to other applications created in


languages that run on the .NET framework.

 You will enjoy features like docking, automatic control anchoring, and
in-place menu editor all good for developing web applications.

Disadvantages of VB.NET

Below are some of the drawbacks/cons associated with VB.NET:

 VB.NET cannot handle pointers directly. This is a significant


disadvantage since pointers are much necessary for programming. Any
additional coding will lead to many CPU cycles, requiring more processing
time. Your application will become slow.

 VB.NET is easy to learn. This has led to a large talent pool. Hence, it
may be challenging to secure a job as a VB.NET programmer.

25
MYSQL: Security Improvements: MySQL now enables database
administrators to establish a policy for automatic password expiration: Any user
who connects to the server using an account for which the password is past its
permitted lifetime must change the password. For more information,
Administrators can lock and unlock accounts for better control over who can log
in.

For more information, To make it easier to support secure connections, MySQL


servers compiled using Open SSL can automatically generate missing SSL and
RSA certificate and key files at start-up.

SQL mode changes: The ERROR_FOR_DIVISION_BY_ZERO,


NO_ZERO_DATE, SQL modes are now deprecated but enabled by default.
The long term plan is to have them included in strict SQL mode and to remove
them as explicit modes in a future MySQL release. Globalization
improvements:

MySQL 5.7.4 includes a gb18030 character set that supports the China National
Standard GB18030 character set. For more information about MySQL character
set support.

JSON support:

Beginning with MySQL 5.7.8, MySQL supports a native JSON type. JSON
values are not stored as strings, instead using an internal binary format that
permits quick read access to document elements. JSON documents stored in

26
JSON columns are automatically validated whenever they are inserted or
updated, with an invalid document producing an error.

JSON documents are normalized on creation, and can be compared using most
comparison operators such as =, <, <=, >, >=, <>, !=, and <=>; for information
about supported operators as well as precedence and other rules that MySQL
follows when comparing JSON values

Sys Schema:

MySQL distributions now include the sys schema, which is a set of objects that
help DBAs and developers interpret data collected by the Performance Schema.
sys schema objects can be used for typical tuning and diagnosis use cases. For
more information

Condition handling:

MySQL now supports stacked diagnostics areas. When the diagnostics area
stack is pushed, the first (current) diagnostics area becomes the second (stacked)
diagnostics area and a new current diagnostics area is created as a copy of it.
Within a condition handler, executed statements modify the new current
diagnostics area, but GET STACKED DIAGNOSTICS can be used to inspect
the stacked diagnostics area to obtain information about the condition that
caused the handler to activate, independent of current conditions within the
handler itself. (Previously, there was a single diagnostics area. To inspect
handler-activating conditions within a handler,

Master dump thread improvements:

27
The master dump thread was refectories to reduce lock contention and improve
master throughput. Previous to MySQL 5.7.2, the dump thread took a lock on
the binary log whenever reading an event; in MySQL 5.7.2 and later, this lock is
held only while reading the position at the end of the last successfully written
event. This means both that multiple dump threads are now able to read
concurrently from the binary log file, and that dump threads are now able to
read while clients are writing to the binary log.

Multi-source replication is now possible:

MySQL Multi-Source Replication adds the ability to replicate from multiple


masters to a slave. MySQL Multi-Source Replication topologies can be used to
back up multiple servers to a single server, to merge table shards.

28
SYSTEM DESIGN

29
BLOCK DIAGRAM OF DOUBLE ENRYPTION

30
USE CASE DIAGRAM

31
Entity Relationship Diagram

32
ALGORITHMS USED

1.AES:

Advanced Encryption Standard (AES) Steps of encryption


for a 128-bit block:
1. Derive the set of round keys from the cipher key.
2. Initialize the state array with the block data (plaintext).
3. Add the initial round key to the starting state array.
4. Perform nine rounds of state manipulation.
5. Perform the tenth and final round of state manipulation.
6. Copy the final state array out as the encrypted data (ciphertext).
The order of operation in decryption is:
1. Perform initial decryption round: XorRoundKey
a. InvShiftRows InvSubBytes
2. Perform nine full decryption rounds: XorRoundKey
a. InvMixColumns InvShiftRows
InvSubBytes
3. Perform final XorRoundKey

2. DES:

This was developed in 1998 as an enhancement of DES. In this standard the

33
encryption method is similar to the one in original DES but applied 3 times
to increase the encryption level. But it is a known fact that 3DES is slower
than other block cipher methods. This is an enhancement of DES and it is 64
bit block size with 192 bits key size. 3DES has low performance in terms of
power consumption and throughput when compared with DES. It requires
always more time than DES because of its triple phase encryption
characteristics.

Algorithm:
For j = 1 to 3
{
Cj,0= IVj
For i = 1 to nj
{
Cji = EKEY3(DKEY2 (EKEY1 (Pj, iCj, i-1)))
Output Cj, i
}
}

34
Data Tables

Login Table:-

Field Name Data Type Description


User_Name Text
Password Text
Hint_Question Text
Hint_Answer Text
User_Type Text

User Detail Table:-

Field Name Data Type Descripti


on
Registration_No Text
Registration_Date Date/Time
Name Text
Address Text
City Text
TelePhone_Mobile_No Text
Marital_Status Text
Religion Text
Gender Text

Field Name Data Type Description


Status Text Indoor / Outdoor
Age Number

Add Citizen:-

35
Field Name Data Type Description
Aadhar_ID Text
Password Text
DOB Text

Add Document:-

Field Name Data Type Description


Aadhar_ID Text
Document type Text
Email ID Text
Citizen Text
Feedback Text

SNAPSHOTS

36
1. Admin Login

2. User Feedback

37
3. ADD Citizen

38
4. ADD Document

39
5. View Feedback

40
41
6. User Login

42
SOFTWARE TESTING

GENERAL

The purpose of testing is to discover errors. Testing is the process of


trying to discover every conceivable fault or weakness in a work product. It
provides a way to check the functionality of components, sub-assemblies,
assemblies and/or a finished product It is the process of exercising software
with the intent of ensuring that the Software system meets its requirements and
user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.

DEVELOPING METHODOLOGIES

The test process is initiated by developing a comprehensive plan to test


the general functionality and special features on a variety of platform
combinations. Strict quality control procedures are used.
The process verifies that the application meets the requirements specified
in the system requirements document and is bug free. The following are the
considerations used to develop the framework from developing the testing
methodologies.

TYPES OF TESTS

Unit testing

Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program input produces valid
43
outputs. All decision branches and internal code flow should be validated. It is
the testing of individual software units of the application .it is done after the
completion of an individual unit before integration. This is a structural testing,
that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application,
and/or system configuration. Unit tests ensure that each unique path of a
business process performs accurately to the documented specifications and
contains clearly defined inputs and expected results.

Functional test

Functional tests provide systematic demonstrations that functions tested


are available as specified by the business and technical requirements, system
documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be
exercised.
Systems/Procedures : interfacing systems or procedures must be invoked.

44
System Test

System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results.
An example of system testing is the configuration oriented system integration
test. System testing is based on process descriptions and flows, emphasizing
pre-driven process links and integration points.

Performance Test

The Performance test ensures that the output be produced within the time
limits, and the time taken by the system for compiling, giving response to the
users and request being send to the system for to retrieve the results.

Integration Testing

Software integration testing is the incremental integration testing of two


or more integrated software components on a single platform to produce failures
caused by interface defects.
The task of the integration test is to check that components or software
applications, e.g. components in a software system or – one step up – software
applications at the company level – interact without error.

45
Acceptance Testing

User Acceptance Testing is a critical phase of any project and requires


significant participation by the end user. It also ensures that the system meets
the functional requirements.

Acceptance testing for Data Synchronization:


 The Acknowledgements will be received by the Sender Node after the
Packets are received by the Destination Node
 The Route add operation is done only when there is a Route request in
need
 The Status of Nodes information is done automatically in the Cache
Updating process

46
Conclusion

The project “CERTIFICATE USING DOUBLE ENCRYPTION” is for


computerizing the working in a Encryption. The Project gives us a solution of
carrying our Sensitive Documents freely without the harm of being tampered.
Also we can produce these documents securely at any government related for
organizations as a part of proof of our identity. The main feature of our system
is that it makes use of combined double encryption which makes it almost
impossible for the hackers to break into the system. In future we try to secure
the login details of the Citizens by using double Encryption Techniques.

47
Bibliography

 Mastering VB 6.0

 Certificate using double encryption.

REFERENCES

1. Harshal Pandit, Shailendra Nipane,Suraj Jadhav, Sunita Naik “Secured E-


Documents and Sharing using Encrypted QR-Code ”, International Journal of
Computer Applications (0975 – 8887), The National Conference on Role of
Engineers in National Building.

2. Shiv Shakti, “ENCRYPTION USING DIFFERENT TECHNIQUES”,


International Journal in Multidisciplinary and Academic Research, ISSN:
2278-5973, 1 Jan-Feb 2013, vol. 2, Issue no. 1.

3. AbhinandanAggrawal, Gagandeep Singh, Prof. (Dr.) Neelam Sharma,


“Implementation of AES algorithm”, International Journal ,Of Engineering
Research & Science (IJOER), ISSN: 2395-6992, 4 April 2016, vol. 2, Issue
no. 4.

4. Shraddha Kalbhor, Anita Gaikwad, Kajal Bhise, Prof. Dipmala Salunke,


Varsha Bangar, “A Survey on Digital Signature”, International Journal of
Emerging Technology and Advanced Engineering, ISSN 2250-2459, January
2015 , vol. 5, Issue no.1.

5. Binal Shah, Zahir Aalam, “Implementation and Performance Evaluation of


the AES Algorithm for Data Transmission using Various Programming
Languages”, Foundation of Computer Science FCS, New York, USA, ISSN:
2394-4714, November 2015, vol. 3, Issue no.4.

48
6. Nimmi Gupta, “Implementation of Optimized DES Encryption Algorithm
upto 4 Round on Spartan 3”, International Journal of Computer Technology
and Electronics Engineering (IJCTEE), ISSN 2249-6343, 19 Jan 2012, vol. 2,
Issue no.1.

7. Shabnam Kumari, Reema, Princy and Sunita Kumari, “Security in Cloud


Computing using AES and DES”, International Journal on Recent and
Innovation Trends in Computing and Communication, ISSN: 2321-8169,
IJRITCC April 2007, vol. 5, Issue no.4.

8. Ms. E. Kalaikavitha, Mrs. Juliana gnanaselvi, “Secure Login Using


Encrypted One Time Password (Otp) and Mobile Based Login Methodology”,
International Journal Of Engineering And Science, April 2013, Pp 14-17,
Vol.2, Issue no.10.

9. Sarita Kumari, “A research Paper on Cryptography Encryption and


Compression Techniques”, International

49

You might also like