Report Latest

download Report Latest

of 15

Transcript of Report Latest

  • 8/8/2019 Report Latest

    1/15

    A

    SUMMER TRAINING PROJECT REPORT

    ON

    E-mail Encryption

    AT

    Centre for Artificial Intelligence and Robotics

    Submitted in partial fulfilment of the requirement

    For the award of degree

    Of

    BACHELOR OF ENGINEERING

    SESSION (2007-2011)

    NITTE MEENAKSHI INSTITUTE OF TECHNOLOGY

    BANGALORE-64

    SUBMITTED BY:-

    ISHANT KATHURIA1NT07CS042

  • 8/8/2019 Report Latest

    2/15

    ACKNOWLEDGEMENT

    It is my pleasure to be indebted to various people, who directly or indirectly

    contributed in the development of this work and who influenced my thinking, behaviour,

    and acts during the course of study.

    I am thankful to Mr S. RAJA, scientist D for his support, cooperation, and

    motivation provided to me during the training for constant inspiration, presence and

    blessings.

    I also extend my sincere appreciation to Ms. Lalitha M, who provided her

    valuable suggestions, precious time and resources in accomplishing my project report.

    Lastly, I would like to thank the almighty and my parents for their moral

    support and my friends with whom I shared my day-to-day experience and received lots

    of suggestions that improved my quality of work.

    ISHANT KATHURIA

  • 8/8/2019 Report Latest

    3/15

    DECLARATION

    I, Ishant Kathuria, student of B.E VIth Semester, USN 1NT07CS042, studying at NMT, Bangalore,hereby declare that the summer training report on E-mail Encryption submitted to HOD, Dept of

    computer science and Engineering, Nitte Meenakshi Institute of Technology, Bangalore in partialfulfillment of Degree of Bachelor of Engineering is the original work conducted by me.

    The information and data given in the report is authentic to the best of my knowledge.

    This summer training report is not being submitted to any other University for award of any otherDegree, Diploma and Fellowship.

    ISHANT KATHURIA

  • 8/8/2019 Report Latest

    4/15

    ABSTRACT

    Communication is the backbone of any enterprise. Communication, without exchange of data, is

    unimaginable. In the context of communication between enterprise level applications, the amount of

    data would be huge. So using traditional approaches in electronic data interchange wouldn't suffice.For our project we have introduced and incorporated the theoretical ideas of cryptography directly into

    the sending and receiving of e-mails through yahoo mail. We use Caesar encryption system

    It makes use of Caesar cryptographic system along with the required text for the mail from user. A

    button is added adjacent to notepad link on the compose page of yahoomail, which when clicked shifts

    each letter by a value of 4,say if a is written in the text box, on pressing the button, it will turn into e

    and so on. The shift value can be changed. This level of security would definitely give the hackers some

    chase before coming close to knowing the message content.

  • 8/8/2019 Report Latest

    5/15

    TABLE OF CONTENTS

    Page No.

    1. COMPANY PROFILE 1-5

    1.1 (Background, History, vision, mission,Organization structure, Products, achievements)

    2. SCOPE OF TRAINING

    3. INTRODUCTION

    4. APPROACH TO DESIGN

    7. DATA ANALYSIS AND INTERPRETATIONS

    8. RESULTS AND FINDINGS

    9. CONCLUSIONS

    10. LIMITATIONS OF THE STUDY

    11. SUGGESTIONS AND RECOMMENDATIONS

    12. BIBLIOGRAPHY

    13. APPENDIX

    ANNEXURE I QUESTIONNAIRE

    ANNEXURE II ANNUAL REPORTS etc.

  • 8/8/2019 Report Latest

    6/15

    1. COMPANY PROFILEThe Centre for Artificial Intelligence and Robotics (CAIR) is a laboratory of the Defence Research &

    Development organization (DRDO), Located in Bangalore, Karnataka, involved in the Research &Development of high quality secure communication, command and control, and Intelligent

    Systems.CAIR is the primary laboratory for R&D in different areas of Defence Information andCommunication Technology.

    1.1 Historical Background

    Centre for Artificial Intelligence and Robotics (CAIR) was established in Oct 1986. Its research focuswas initially in the areas of Artificial Intelligence (AI), Robotics, and Control systems. In November

    2000, R & D groups working in the areas of Command Control Communication and Intelligence (C3I)systems, Communication and Networking, and Communication Secrecy in Electronics and Radar

    Development Establishment (LRDE) were merged with CAIR. With this, CAIR has become the premierlaboratory for R&D in different areas in Information and Communication Technology (ICT) as

    applicable to Defence. Today, CAIR boasts of an organizational strength of over 300 personnelincluding over 150 well qualified scientists

    CAIR, which was operating from different campuses across Bangalore until 2006 is now located in a

    sprawling 15 acre campus.

    VISION

    The Vision of CAIR is to provide technological superiority to our Defence Services throughdevelopment of advanced Secure Communication, Information and Intelligent Systems by nurturing

    excellence in Information Technologies.

  • 8/8/2019 Report Latest

    7/15

    MISSION

    The Mission of CAIR is to design, develop high quality Secure Communication, Command and Control,

    and Intelligent Systems, through synergic interactions with academic institutions and industry.

    PRODUCTS TECHNOLOGIES FOR CIVIL SECTOR

    CAIR has developed and provided a number of technological solutions/ products for the civilian sector.

    Some of these are:

    y CAIR_ICR (Intelligent Character Recognition) system for the automatic processing ofhandwritten application forms.

    y Intelligent wheel chair for the physically challenged personsy SCARA Robots for educational institutionsy Laparoscopic surgery trainery Robots for non-destructive testing

    ACHIEVEMENTS

    Over the years, CAIR has developed and delivered to its users, a number of Information Systems,Communication Systems and Security Solutions. While doing this, CAIR has also done high quality

    R&D work in Intelligent Systems technologies.

    INFORMATION SYSTEMS

    Todays battlefield is characterized by fast tempo and high degree of movement of men and material

    on a wide front. This demands rapid acquisition, dissemination, collation and fusion of informationamongst field commanders involved in tactical planning and battlefield operations. In this scenario,

    decision making is a time-sensitive and complex operation due to the need for processing multiplestreams of high rate data (which could be representing any combination of text, audio and video)

    originating from various geographically separated sources. This scenario exists even during peacetimeoperations also, perhaps with less stringent requirements.

    Command Control Communication (C3I) System consisting of networked computers in the tactical

    battle area facilitates comprehensive situation awareness by the commanders and timely and optimumdecision-making.

    CAIR is the developing a series of C3I systems for the different branches of Indian Army

    COMMUNICATION AND NETWORKING

    CAIR is engaged in developing technologies needed for futuristic tactical communication network forthe Indian Army. The lab is assisting the user in specifying the system architecture and the subsystem

    specifications for their futuristic Tactical Communication System(TCS). Preliminary R&D activity hasbeen launched in anticipation of the Government of India sanction of a major program for the

    development of TCS.

    Some of the recent Communication Networking products designed and developed by CAIR include

  • 8/8/2019 Report Latest

    8/15

    y Wireless Message Transfer Unit (WMTU) that enables transmission of IP packets over wiredand wireless media using Mil Std 188-220 A protocol. It provides connectivity to mobile clients

    for accessing network resources.y Programmable Communication Interface Unit (PCIU) that provides interconnectivity between a

    formation HQ LAN and a battlefield-wide WAN. It provides facilities for interfacing to Fibre

    optic modems, HDSL modems and Synchronous/Asynchronous modems.

    INFORMATION SECURITY

    Information security aims at securing confidentiality and integrity of the data stored in computers andcommunicated over networks.

    CAIR has been working on the following areas in this field:

    y Secure Communicationy Authentication (including speech biometrics)y Network access controly Traffic analysis and intrusion detection systems.

    CAIR has brought out a number of specific products/ solutions in the above areas and has successfullydelivered to the different user communities. These include High speed traffic analysis software, Secure

    e-mail, Information security gateway, IP security, Network and Host Intrusion Detection Systems, On-line disk encryption (Secure Storage), Smart card based authentication, Multi-layer network Firewall,

    Personal (host) firewall, etc.

    COMMUNICATION SECURITY

    Communication Security products developed by CAIR include devices for link encryption, subscriber

    end voice encryption, and voice scrambler for HF radio. Recent developments include WAN encryptors,Satellite link encryptors, Wire line encryptors, and Voice/Fax/Data encryption devices for voice band

    circuits. Proprietary algorithms have been developed for IP security and file/message encryption. All

    these devices are implemented on trusted platforms developed in-house and built using reconfigurable

    hardware. All associated device drivers and firmware have been developed in-house.

    INTELLIGENT SYSTEMS

    Intelligent Systems technologies development at CAIR is primarily helps it in keeping abreast of

    technological advances in the fields of Artificial Intelligence (AI) & Neural Networks (NN), Computer

    Vision (CV), Signal Processing, Robotics, and Virtual Reality.

    AI & NN

    CAIR is currently developing a number of Data Mining tools using Artificial Intelligence & Neural

    Networks and is building software libraries to create a Data miners toolbox. Semantic Web is a newparadigm proposed to make the World Wide Web (WWW) more machine tractable so as to establish a

    foundation for Agent based technologies. The large amount of information contained in languages usedby humans necessitate development of technologies to process the information automatically. Human

  • 8/8/2019 Report Latest

    9/15

    language processing technologies are being implemented using commercial off- the- shelf (COTS)computers with huge memories and high processing speeds. CAIR has so far been developing

    technologies for processing human language inputs namely, information extraction, shallow NaturalLanguage Processing (NLP), Semantic Web tools and techniques, and Semantic Web as a knowledge

    representation structure for human languages.Decision Support System Shell architecture named

    AADARSHA that makes use of Object Oriented concepts has been developed by CAIR. It meets severalobjectives such as lean and thin shell for easy maintenance, universal interface, easy incorporation ofnew algorithms into inference engine etc.

    COMPUTER VISION

    In the area of computer vision, CAIR has developed some prototype products for specific problem

    solving. Work is ongoing in the area of image registration using 2D, 1D and point features, progressivetransmission and compression of images, content based image retrieval and multi-sensor image fusion.

    Research focus of CAIR in this area has been in registration of multi-sensor images, super-resolutionimage generation from low resolution images, automatic characterization of image quality, and

    characterization of shapes in grey scale and colour images.Another important application that is beinglooked into is the build a mosaic of images taken from various angles. This is for the generation of

    panoramic and large scale image piecing together many small images seamlessly.

    ROBOTICS

    CAIR has developed a variety of controllers and manipulators for Gantry, SCARA and other types of

    robots. These were supplied to Public Sector Units such as HAL and sister DRDO labs. CAIR has goneon to develop a prototype Unmanned Ground Vehicle (UGV) with the aim of attaining autonomous

    capability. This involved in-house construction of mobile robot platforms, integration of infrared sensorswith the vehicle, and the development and integration of path planning software. An useful offshoot of

    this work was the development of an intelligent wheelchair that would help physically challenged people both in hospitals and homes. One version of the wheelchair could be operated using human voice

    commands. Another was equipped with a camera system to get information about the surrounding spacefor its path planning.

    Other robots developed by CAIR are for Non-destructive testing, Ammunition loading, and Hot slugmanipulation. Both wheeled and legged miniature mobile robots have been developed.

    VIRTUAL REALITY

    Virtual Reality (VR) is an emerging technology with wide applications in product design, operator

    training, design review etc. The objective of VR is to provide the user with the sensory experience ofbeing in an environment that is not physically present. CAIR has acquired considerable expertise and

    infrastructure in VR, which could be utilized to develop advanced virtual reality applications.

    CAIR has competence in the development of drivers for VR accessories (like flock-of-birds position

    tracking system, cyber glove, serial ports and stereo drivers for IRIS Performer) expertise in Multigenand Paradigm Vega for modeling and simulating 3D virtual environments, expertise in OpenGL, VRML

    programming, development of terrain visualization and flythrough system.

  • 8/8/2019 Report Latest

    10/15

    The research on advanced virtual reality applications requires good knowledge in virtual realitymodelling and simulation software and programming skill in VR toolkits like OpenGL, IRIS Performer,

    VRML etc. which have been sufficiently acquired and developed by the scientists of CAIR

    A virtual reality theatre consisting of stereo projectors, high-end workstation, 3D glasses and a head

    mounted display device and other accessories has been installed. Using this facility and other tools suchas MultiGen modelling software, a system for simulating terrain flythrough has been developed.

    SIGNAL PROCESSING

    Signal processing is an important activity at CAIR, with emphasis on speech and image processing. Inthe area of speech coding, a Linear Predictive Coder(LPC) based voice coder that encodes 4 kHz band

    limited telephone quality analogue speech into a 2.4 kbps digital stream has been developed.In the areaof speech recognition, speaker independent speech recognition and language independent speaker

    identification are active areas of work.

    2. SCOPE OF TRAININGPractical Training is an important constituent of any curriculum and the B.E. course is no Exception tothis general rule. A practical training helps a student in getting acquainted with the manner in which his

    knowledge in being practically used outside his institute and this is normally different from what hehas learnt from books. Hence, when one switches from the process of learning to that of implementing

    his knowledge he finds an abrupt change. This is exactly why Practical Training session during the B.E.curriculum becomes all the more important.

    This report describes in detail my training, after the 3rd year B.E. session, which I completed at CAIR,Bangalore. The training was in designing of a real world application, which will run in Back-end and

    modify the web page on the fly. The technique used is client-side scripting.

  • 8/8/2019 Report Latest

    11/15

    3. INTRODUCTION

    Emails has been a very essential communication tool in this age of technology, and with the

    growing number of businesses doing transactions online, the email is indeed a great tool in managing

    your business.Even for personal use or organizational use, it has become a part of our everyday lives -

    from communicating with friends to closing a deal, to applying for a new job or for almost any other

    transaction we do online. In fact, most services on the internet, even social networking sites, would ask

    you your email address before you could use their services. Indeed, the importance of email is

    everywhere.

    As email is now fully embedded as a business tool and is being used to transfer critical, sensitive data, it

    is becoming increasingly important to provide a secure, robust and manageable encryption service foremail users. The project is basically aimed at sending an encrypted mail, over a public mail client,

    designed specifically for yahoo mail although can be modified to work on gmail also by doing certain

    modifications.

  • 8/8/2019 Report Latest

    12/15

    4. APPROACH TO DESIGNAfter analysing about the requirements of application, I found that the application can be convenientlydeveloped for Mozilla firefox. Mozilla provides various add-ons for its browser.These add-ons include

    extensions, themes, dictionaries, search bar "search engines," and plugins. Because of its

    addons.mozilla.org domain name, the site is informally also known as AMO.In contrast to mozdev.org which provides free hosting for Mozilla-related projects, Mozilla Add-ons istargeted to end-users, not just software developers. Many Mozilla applications contain direct links to thewebsite, and contain settings to poll for updates to the extensions and the application itself. Firefox 3

    includes features for retrieving and displaying content from the website in the add-on manager.

    The add-on which we have used is called greasemonkey. It is a Mozilla Firefox extension that allows

    users to install scripts that make on-the-fly changes to HTML web page content on theDOMContentLoaded event, which happens immediately after it is loaded in the browser (also known

    as augmented browsing).

    As Greasemonkey scripts are persistent, the changes made to the web pages are executed every time the

    page is opened, making them effectively permanent for the user running the script.Greasemonkey can be used for adding new functions to web pages (for example, embedding price

    comparisons within shopping sites), fixing rendering bugs, combining data from multiple WebPages andnumerous other purposes.

    Greasemonkey user scripts are written in JavaScript and manipulate the contents of a web page using

    the Document Object Model interface. Scripts are site-specific and written by

    hand. userscripts.org maintains a database of Greasemonkey scripts, and for each, lists the URLs of web

    pages to which the script pertains. When the user visits a matching website, Greasemonkey invokes the

    relevant scripts, which can modify a webpage in any way JavaScript could. Greasemonkey scripts can

    also poll external HTTP resources via a non-domain-restricted XMLHTTPrequest. Scripts are

    named somename.user.js, and Greasemonkey offers to install any such script when a URL ending in that

    suffix is requested. Greasemonkey scripts contain optional metadata, which specifies the name of the

    script, a description, relevant resources to the script, a namespace URL used to differentiate identically

    named scripts, and URL patterns for which the script is intended to be invoked or not.

    Writing a Greasemonkey script is similar to writing JavaScript for a web page, with some additional

    allowances such as cross-site XMLHttpRequests. Compared to writing a full-fledged Firefox extension,

    user scripting is a very modest step up in complexity from basic web programming. However,

    Greasemonkey scripts are limited due to security restrictions imposed by Mozilla's

    XPCNativeWrappers. For example, Greasemonkey scripts do not have access to many of Firefox's

    components, such as the download manager, I/O processes or its main toolbars. Additionally,

    Greasemonkey scripts run per instance of a matching webpage. Because of this, managing lists of items

    globally is difficult. However, script writers have been using cookies and Greasemonkey even offers

    APIs such as GM_getValue and GM_setValue to overcome this.

  • 8/8/2019 Report Latest

    13/15

  • 8/8/2019 Report Latest

    14/15

    How to write bibliography?

    For Example:

    Books

    1. Gupta, S.L.,Financial Derivatives, Ed. 2005, Prentice Hall of India, New Delhi.Magazines:

  • 8/8/2019 Report Latest

    15/15

    2. Arak, M. and Goodman, Treasury Bond Futures: Valuing the delivery options, The Journal ofFutures MarketVol. 7, pp 269-286, June, 1987.