Security For Window
Security For Window
CHAPTER 1
INTRODUCTION
1.1 BACKGROUND
In present day, the increasing reliance on computer systems has led to the
dependence on confidential security measures. Protection of data for the computer users
who are entrusted with sensitive data has always been a primary concern.
Windows password policies came into effect for the reason to safeguard user
sensitive data . Password has become one of the most ubiquitous modern day security
tool and is very commonly used for authentication. There passwords are string of
characters used for authentication or user access. Still the need for stronger solution
arises as some of the password policies are not enough to safe guard personal and
organizational data. Stronger policies make it difficult for users to recall the password
forcing them to note it down, adding to potential risk.
In windows, the password feature is connected to user accounts providing the
administrator user the right of creation and modification of user accounts. There were no
road maps in windows which would ensure that the password entered is secure enough or
no, which was a major drawback. Then the password policies came into existence that
made sure that the systems were protected by certain guidelines either set into the systems
or enforced by the organizations. However, the general adoption of these policies were
not extensive. The enforcement of some policies were such that the user had to abide by
it, such as, changing of password every day or every week in organizations. A program
known as LC5 is capable of cracking simple passwords with eight characters in a count of
Dept. of CS&E, 2015-16
Page 1
Page 2
Page 3
The project aims on the aspect of developing the proper and cost effective
security system. The key feature for security in this project is MAC address and
Bluetooth. The key used here is the private key and it uses block cipher for encryption
and decryption. Here the computer and phone is used for working. The application run
on server side i.e. computer and authentication of authorized devices are done on client
side i.e. phone.
In order to protect the file against unauthorized reading and undetected mutilation,
a user encrypts it with a secret cryptographic key of a symmetric cryptosystem. This
symmetric key is needed to encrypt or decrypt data with it. The cryptographic keys are
used in data encryption to make the file more secure. The same key must be used to
decrypt the data. This means that we have to either memorize the key or store it
somewhere. Memorizing it isnt practical, so we must store it so that we can recall it
when we want to decrypt the data back into its meaningful form, but no one else can.
Dept. of CS&E, 2015-16
Page 4
1.4 Objectives
The following are the objective of this project:
Chapter 2 gives brief description of prior works that are carried out on Gender
Classification.
Chapter 3 gives the brief description about various requirements like functional,
non-functional and hardware/software requirements.
Chapter 4 gives the overall architecture of the system and an overview of major
algorithm used in the project.
Chapter 5 gives the brief description about how the project is implemented. The
various modules have been explained in brief.
Page 5
Chapter 6 gives brief description of the testing done on the modules to see if they
are successfully implemented and work as required.
Chapter 7 concludes the report along with future enhancements that can be
incorporated later.
Page 6
CHAPTER 2
Literature survey
2.1 Summary of prior works
This chapter describes abstraction of few of the related work, in terms of the
problem taken in hand, their approach and finding.
Wankhade S.B, Damini A.G, Desai S.J, Khanapure A.V An innovative
approach to File Security Using Bluetooth International Journal of Scientific
Engineering and Technology 2013[1]
This paper try to solve the problem of stealing and editing a stored private data
using different encrypting algorithms. File Encryption XP system that can encrypt
files of any type using Blowfish algorithm. It protects information against being
viewed or modified without Authorization. MEO is file encryption software for Mac
or Windows that will encrypt or decrypt files of any type. Protect sensitive data
against unauthorized viewers with the latest data encryption technologies to keep
your documents safe and secure. User can easily send encrypted emails, or create
self-extracting encrypted files so the receiver can open the encrypted files on any
Windows or Mac computer without needing to install the encryption software on
their machine. File Encryption XP encrypts files and folders using a strong blowfish
algorithm with 384-bit key, and no encryption passwords are saved within the
encrypted files. File Encryption XP has a deletion method that will completely
remove files after encryption so that the only remaining file is the encrypted version
and no unencrypted temporary files ever created. File Encryption XP has a built-in
Page 7
In this paper algorithm used is AES. In AES raising the key size by 64 bits leads
to increase in energy usage of about 8% without any data transfer. In case of AES
higher key size leads to modification in battery and time usage.
This paper makes the comparison between the short range wireless communication
technologies and describes why Bluetooth is the most efficient short range wireless
communication compared to others. There are several standards available for
transferring keys between the elements of the system wirelessly in a short range.
The most three popular technologies are Wi-Fi, Bluetooth and IrDA
Wi-fi. :
Wi-Fi is the name of a popular wireless networking technology that uses radio
waves to provide wireless high speed Internet and network connections. Wi-Fi is
simply a trademarked term meaning IEEE 802.11x. Wi-Fi works with no physical
wired connection between sender and receiver by using radio frequency (RF)
technology, a frequency within the electromagnetic spectrum associated with
Page 8
IrDA
As infrared data communications, based on standards from the Infrared Data
Bluetooth
Bluetooth is a Radio Frequency (RF) specification for short range, point-to-point
and point-to-multi-point voice and data transfer. Bluetooth will enable users to
connect to a wide range of computing and telecommunications devices without
the need for proprietary cables that often fall short in terms of ease-of-use. The
technology represents an opportunity for the industry to deliver wireless solutions
that are ubiquitous across a broad range of devices. The strength and direction of
the underlying Bluetooth standard will ensure that all solutions meet stringent
expectations for ease-of-use and interoperability.
Page 9
Bluetooth
Operating range
Operates
2.4GHz
which
IrDA
in
ISM
is
Wi-Fi
globally meter
available
that
indoor
and
further be extended
2 metres
Ways of
communication
line
way Use
sight communication(Bi
of
transmission(through
directional)
point
to
multipoint
configuration
wall)
Spread Spectrum Uses frequency hope Uses
direct Uses
DSSS,FHSS,
Spread
sequences
Spectrum(FHSS)
Spectrum(DSSS)
division
multiplexing(OFDM)
Data
Transfer Difference data rate as Data transfer rate Provides data rate of
Rate
per
version.
upto 1 Mbps
b/s
with
2Mbps,
primary 11Mbps(802.11b)
of 115 kb/s
Consumes
consumed
power
Speed
Speed is 1 to 2 Mb/s
Maximum
upto 4Mb/s
less Cost
is
high
comparatively
speed Speed ranges from 11
to 300 Mb/s
Page 10
Blowfish algorithm was used which was less secure than the Rinjdael
Algorithm.
With an Admin password authenticate the MAC address. MAC address of your
mobile gets stored in Registry of the System.
Your application will start as a background process as soon as you start your PC.
folder
as
your
Working
folder.
The program must have a timer to read contents of all files of all types including
video of that folder.
As soon as you go away from PC, it encrypts all the files of the folder and log off
your account.
Soon as you Log in to the account, it searches for your Bluetooth Mac address. It
prompts you with the password. If password matches, decrypts all the files.
If somebody else logs into your system, Bluetooth device if any do not get
matched. hence the application never ask for password.
Page 11
Page 12
Page 13
Page 14
Bluetooth
The idea Bluetooth was proposed in 1997 by Jim Kardach who formulated a
system that would allow mobile phones to communicate with computers. The Bluetooth
logo is a bind rune merging the Younger Futhark runes and Harald's initials. Bluetooth
network devices exhibit a master-slave relationship.
Bluetooth specifies three basic security services namely
1. Authorization
2. Confidentiality
3. Authentication
Bluetooth device Media Access Control address (MAC address) is absolutely unique.
Speed of Bluetooth devices ranges from 1 to 2Mbps. It has a low cost as compared to WiFi and consumes very less power. Bluetooth is of the most efficient system in point-topoint and point-to-multi-point voice and data transfer.
Page 15
Rijndael Encryption
The Advanced Encryption Standard (AES), also cited as Rijndael (its original
name), is an encryption of electronic data specification which was established by the
U.S. National Institute of Standards and Technology in the year 2001.
AES is grounded on the Rijndael cipher developed by two Belgian cryptographers,
Joan Daemen and Vincent Rijmen, who presented a subject matter to NIST during the
AES selection process. Rijndael is a family of ciphers with varying key and block sizes.
Dept. of CS&E, 2015-16
Page 16
Rijndael has various distinguishing strong points due to which it is a part of this security
system. The design philosophy of Rijndael adopts three main principles namely:
1. Simplicity: Rijndael is described as having a 'rich algebraic structure' which grants the
cipher's security to be easily evaluated in a restrained time frame. This is an advantage
over more complex designs which has a requirement of extensive thinking, searching and
'bit tracing'.
2. Performance: Rijndael is a consistent performer in both hardware and software across
broad range of computing environments. Its key setup time coupled with key agility is
splendid. Rijndael is perfectly fitted for restricted space environments due to its low
memory requirements. The extra security in Rijndaels procedures are amongst the easiest
to defend versus power and timing attacks.
Page 17
Page 18
CHAPTER 3
System Requirements
3.1 Functional Requirements
The system behaviour is provided by the functional requirements. These
behaviours are expressed as either as a service provided to the user, and internal
functioning of the system. These can be the system design, specifications, guidelines for
the usage of the system, modules involved in the system and so on.
System should allow any type of Bluetooth enabled device to be paired with
system.
System should browse the desired folder with different type of content to be
locked.
Specified MAC address of the users phone should be the authorised user, for
unlocking and access the folder.
Input (password) for unlocking the folder should be taken from the keyboard only
when the device is in connection.
Page 19
1. Performance requirements
Secure and efficient way to decrypt the password for unlocking the desired folder.
2. Normal requirements
Hardware requirements:
2GB RAM
Core i3 processor
Page 20
Page 21
CHAPTER 4
System Design
Design Process is nothing but the representation of the System, or is a process
producing a mode, which will be used to develop or build the system. The input for the
design process is the System Requirement Stage and the output Is Design of the
Proposed System, while the System Requirement Stage is entirely in Problem domain,
design is the first step in moving from the problem domain to solution domain.
Design is essentially a bridge between the Requirement Specification and the final
solution for satisfying the requirement. Thus it is essentially a blueprint for a solution for
the system.
Software design sits at the technical kernel of the Software Engineering Process
and is applied regardless of the development that is used. Once the Software Requirement
is specified, software design is the first of the technical activities design, coding and
testing.
4.1 Architecture
The following below 4.1 figure gives the detail step by step procedure of the project
Page 22
Unlock the
folder
MAC address is
authenticated
Implements handshake
protocol with device
In every 30 sec
NO
Is Device
is in range
?
YES
Keep the
working
folder open
Lock the
folder
Searches for
Bluetooth
Page 23
4.2 Algorithm
The following provides an algorithm for securing the folders in windows system.
Step1: Start
Step2: Reading a folder path and its content.
Step3: Reading password from user.
Step4: Scanning for bluetooth Mobile.
Bluecove v2.1.1 will run with the windows socket api ( WINSOCK ) and search for
the nearby devices.winsock is a technical specification that defines how windows
network services.
Step5: Storing the folder name(path),password and MAC address configuration in the
registry.
Step6: Encripting the folder with the rinjdael algorithm.
Step7: Scanning the bluetooth Mobile, if present Decrypt the folder with the correct
password. Else encrypt the folder.
Step8: End of algorithm.
Page 24
Page 25
Choose
Your
password
Reuse your
password
Forget your
Commit your
Page 26
CHAPTER 5
IMPLEMENTATION
5.1 MODULE 1: GRAPHICAL USER INTERFACE
Objective of the module
Decription of the module :This module provide the graphical interface for user to
interact and easily submit its input, and also to call the various function. It takes input for
folder path, password which is to be sent as cipher key and device MAC address. It also
provide options to change the authenticated device and password used.
Pseudocode:
Click lock folder tab
Browse directory()
Folder_pathdirectory path
If(! New file(path).isDirectory()){
Print(valird or not)
}
Click password tab
Get password()
Match password()
Passwordsetpassword
Dept. of CS&E, 2015-16
Page 27
Page 28
Figure 5.1.2 Entering the password for future unlcoking the folder
Page 29
Figure 5.1.3 Listing of the nearby Bluetooth devices which are turned on
Figure 5.1.4 Selection of the nearby Bluetooth devices from the list.
Page 30
bluetooth devices which are in the range of the system and returning the list of the MAC
address of the bluetooth devices for configuration.
In this module a variable device address is defined which holds the Mac addresses of the
bluetooth devices and variable status is defined which contain status of the device as
AVAILABLE/UNAVIALABLE/UNKNOWN
Function device discovery is called to initailize the variables.
Pseudocode:
Class devicedetector{
Enum status
Device address
Vector<string>devices
Call scanner() {
Scans the all nearby Bluetooth devices
Activate bluecove on winsock
StatusCall get status()
Dept. of CS&E, 2015-16
Page 31
authorization for locking and unlocking the particular folder with the help of password.
A class prefernce is defined to stored the particular folder path, MAC address and
password associated with it. Storing the configuration with details in the registry with file
name f1.config
Pseudocode:
Click configure button
Class preference{
Folder path variable
Device mac variable
Password variable
Page 32
Pseudocode:
Class crypto(){
Function getinstance(AES/CBC/PKCS5Padding)
Page 33
Page 34
CHAPTER 6
6.1 TESTING
Testing is an important phase of a software development life cycle. It allows us to
check the accuracy of the applications and validity of it with respect to the requirements.
Testing phase provides a method to identify the possible error in the application. It
helps the developer to predict the types of mistake what an end user might perform
while running the application. If errors are found then a recovery strategy can be
implemented to come out of the error.
The various types testing can be:
Structural testing: also known as white box testing. It a method of testing an
application based on the internal implementations. This requires deep knowledge
about the implementation it or to perform testing. It allows a testing engineer to
compute error present at the code level.
Functional testing: also known as black box testing. This is testing method where
the application is tested based on inputs they provide to the application and what
respective output they are going to get. This type of testing may not require in depth
knowledge about the implementation.
The following shows the test cases that are designed during testing phase.
Page 35
TEST 1
Item/Feature to be Tested:
Folder Selection
Folder Selection
Sample Input:
Directory
with
etc.)
Actual Output:
Remark
GUI
displaying
retrieved
the GUI
displaying
Folder Path
Folder Path
Test Passed
Test Passed
the
Page 36
Item/Feature
to
Tested:
Sample Input:
Expected Output:
Actual Output:
Remarks
be
List of Bluetooth
devices in range to be
displayed
(Symbian, java, android,
Mac, windows)
MAC addresses of
Bluetooth devices
List of Bluetooth
devices in range to
be displayed
(Symbian, java,
android, Mac,
windows)
MAC addresses of
Bluetooth devices
List of Bluetooth
devices
MAC address
List of Bluetooth
devices
MAC address
List of Bluetooth
devices
Test failed
Test passed
Page 37
Authentication of MAC
address.
Authentication of MAC
address.
Expected Output:
Folder to be decrypted
only with connection
with the particular
device.
Actual Output:
Test failed
Test passed
Item/Feature to be Tested:
Sample Input:
Remarks
TEST 4:
Dept. of CS&E, 2015-16
Page 38
Item/Feature to be
Encryption/decryption
Encryption/decryption
Encrypted/ decrypted
content of folder
Test failed
Test passed
Tested:
Sample Input:
Expected Output:
Actual Output:
Remarks
Page 39
6.2 RESULT
This chapter describes the results obtained from the application. It shows different
scenarios obtained from various modules and their representation
.
Figure 6.2.1: Snapshot for browsing option of the desired folder for locking
Page 40
Page 41
Figure 6.2.4: Entering and saving the password for unlocking the folder
Page 42
Page 43
Figure 6.2.7: Selecting the desired device for giving authorization and background
shows the files are encrypted after saving.
Page 44
Figure 6.2.8: Snapshot of Scanning the authenticated Mac address for unlocking the
folder
Figure 6.2.9: Green tick shows Found the authenticated bluetooth device and pop-up
box appears for entering the password for uncloking.
Page 45
Page 46
Figure 6.2.13: Configuration mode to change the folder, Password and Device.
Page 47
CHAPTER 7
Page 48