Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

CSE 3501-INFORMATION SECURITY

ANALYSIS AND AUDIT


REVIEW 1
Military defense secret message system using block
chain

TEAM MEMBERS:
18MIS0169-BHARATH REDDY S
18MIS0354-MANIKANDAN D
18MIS0417-BALAJI S
Introduction
• Traditional chat applications are centralized i.e., all the data is stored on a centralized server.
• Therefore major problem of this structure is, if the central server fails then whole network collapses.
For example, WhatsApp server stored all the data on a central server, if in case that server is destroyed
then there can be a loss of user data, or they can even leak the user information stored on the server.
• To overcome this, our project makes the use of decentralized Application approach (dApps).
• In our application all the user data is stored on a block which is connected to other blocks forming a
chain. As the name suggests, a decentralized application does not have a centralized server. It is
basically a peer-to-peer network.
• Also the data that is stored in block is almost impossible to view as a very secure encryption and
hashing functions (256 bits) are used
Abstract
• Decentralized application make use of peer-to-peer networks, this ensures that no
network failure can occur due to central node failure.
• Block chain serves as an immutable ledger which allows messaging to take place in a
decentralized manner.
• A decentralized application for communication and resource sharing is need in today’s
world, where keeping data on a centralized server can be risky and costly experience.
• With the help of various consensus, we can implement different ways to share
resources and communicate.
Proposed work-Block chain
• Block chain is a publicly available ledger where participants enter data
and certify their acceptance of the transaction via an elliptic curve digital
signature algorithm (ECDSA)
Genesis block
• The Genesis block in the Block chain is simply the earliest block ever
mined. If a certain prefix of the Block chain is deleted then the Genesis
block is simply the earliest one that exists
Mining
• Nodes continue to mine as before, where they need to fifed a hash smaller
than a certain threshold in order to be able to publish their data.
Problem Statement
• Block chain platforms usually employ one of two methods to achieve consensus
without a single point of authority.
• The first method is Proof-of- Work (PoW) and the other is Proof-of-Stake (PoS).
• We will elaborate more about PoW as it is much more common, it is easier to
understand and we also utilized it in the implementation of our schemes.
• The idea behind PoW is making participants in a system work and be able to
prove that a certain amount of work has been done, before they can use,
contribute and profit from a system
LITERATURE SURVEY
RESEARCH TECHNIQUE AIM PROS CONS INFERENCE
PAPER

Secure image ­POW Scrambling the given Highly secured using It is difficult for a This system will be
transferring image using password It uses single algorithm to useful in transferring
permutation and then character map satisfy all sensitive images like
encrypting using performance medical images
TEA algorithm parameters.
RESEARCH TECHNIQUE AIM PROS CONS INFERENCE
PAPER
Block chain in Block chain how block The several Block chain Block chain technology
defence chain works advantages of the doesn’t belong to has the potential to
and discuss its block chain (such as anyone, and it radically change our
civilian and its resilience, stores information way of life, and the way
military uses security and permanently across we conduct military
immutability), a network of operations, both on an
mostly due to its personal computers. operational and support
decentralised nature, level
make it particularly
useful in defence.
Scientometric Study Block chain aims to bring Advantage is that Block chain would . Military organizations
on Distributed Ledger the defence many parties or become unstable around the world have
Technology (Block industry into nodes must confirm because its also not been immune
chain) the digital age a single and up-to- infrastructure lacks to the lure of DLT, with
through a date version of the the transactional cyber defence, secure
secure data, thus ensuring capacity messaging, resilient
interface greater accuracy, communications and
transparency, and logistics support being
trust. the primary areas of
focus.
Ultra Secure Secret AES and DES The main aim is to The level of security In defense This technique
Communication by   Securing the increase the time communication, the embeds the two
Crypto Stegano confidential complexity as well sharing of the secret qubits of the secret
Techniques information is as space complexity messages between data on three LSB
  achieved by of our proposed the transmitter and qubits. The
cryptography work, thus we go the receiver is quantum
  upon optimization highly confidential steganography
techniques. task and risk provides high level
  management of carrier capacity,
  high level of
information security
 
Block chain LSB and tiny algo The aim of Block chain Few weakness in Block chain
technology and its   development and technology is a cyber operations by technology provides
potential principles of block potential solution to providing auditing, a potential avenue for
application in chains are achieve data resource management solving some
tactical networks presented, along with integrity, relying on and authentication problems in the
  an overview of their cryptography and functions. tactical network
weaknesses and duplication or   context, but it is not
vulnerabilities. witnessing to provide yet clear whether it is
  tamper- resistance the best such solution
 
Employability of Console identifying enhance data Not providing a To prevent the
block chain vulnerabilities in integrity in supply distributed and transmission of
technology in defence cyberspace are chain management decentralized database block chain content
applications attack path and ensure
generation transparency in
equipment
management

Privacy Preservation Embedded To assure privacy This helps to process IoT’s privacy and The approach is
in Resource algorithm and k- preservation when a and transfer data security with based on t-closeness
Constrained IoT anonymity huge number of among each other interconnected devices and k-anonymity
Devices Using Block resource constrained with minimal human causes security notions from the
chain distributed devices is interaction needed. challenges in the area of database theory. It
involved. network computing. prevents feature
disclosure as well as
information
disclosure.
Block chain-Based Data Block chain The proposed block With the evolution of Although block chain Implementation of the
Security in Military chain-based architecture block chain structures has been used in many proposed system and
Autonomous Systems is promising to increase allowing for fields ranging from perform experiments to
the resilience of military permissioned and supply chain evaluate its performance
autonomous systems private networks with management to in terms of consensus
against cyberattacks that finer-grain access cryptocurrencies and speed, security
aim to hurt the success control, more electronic voting, its use capabilities and
of military operations lightweight consensus in the military scalability.
through data content mechanisms were communications domain
manipulation. designed has been quite limited so
far.

Consortium Block chain Block chain Proposes a new benefitting users for its several issues in the early The information shared in
for Military Supply consortium military block useful features in stage of blockchain the digital ledger between
Chain chain for defence provenance tracking, technology deployment the participants in the
shipment. inventory management, such as trustworthiness, blocks is expected to be
identity verification, security, and data privacy more oriented, secured
shipping logistics for and organized.
defence purpose
On the Security of Console Implementing TEA Reducing the All keys in TEA are For quick
reduced key Tiny by reduced key size number of keys not secure with transactions on the
Encryption of 64 bits instead of without decreasing reduced key small gadgets, with
Algorithm 128 bit its performance more security this
research will be
useful.

The Development of Tiny Encryption Encrypting and Minimizing the TEA has a few This system makes
TEA Crypto-Core Algorithm decrypting the plain memory footprint and weaknesses most use of MATLAB
for Mobile Systems text using mat-lab maximizing the speed. notably from which helps in
equivalent keys and understanding the
related-key attacks structure of TEA.

FPGA Based DIFFIE HEIMON Hardware implement Utilizes the least Its throughput is The throughput of the
Implementing of TEA cipher resources with minimum due to more design can further be
Scenarios of TEA algorithm using reasonable power number of clock improved by
Block Cipher Verilog HDL to get utilization cycles introducing the
insight of performance pipeline approach at
and resource specific design
utilization registers.

You might also like