Hardware based encryption: Cryptography |AES256| Information Security

preview_player
Показать описание
Hey ,welcome to usta cyber YouTube channel, today we are going to demonstrate a project named as "Hardware dependent Encryption" ,this is an amazing idea in information security, we will discuss each and every thing in our todays discussion.
these are the contents of over todays discussion about the project, including introduction about the project idea, description ,working ,features and complete demonstration of the project..
introduction:“Hardware Dependent Encryption ” is an Encryption software that depends on a hardware dongal.The software performs operation when and only authenticated hardware device is connected with the system. Software and authorized user is one of our major concerns that allows only authorized user ,to use this secure encryption software, after passing through two factor multilayer authentication. The hardware device also have some intrusion mechanism that restrict unauthorized usage of application and hardware device. Advance Encryption technique is applied in this project.
Today’s many file encryption software are in market like VeraCrypt, android crypt etc., but none of the software is protect itself. I`m proposing an idea to design an encryption software that depends on hardware in order to protect software from un authorized user and storing encryption key separate from the software. In this proposal both Hardware dongle and encryption software depends on each other, hardware device is also protected using 2FA and intrusion free. Software and authorized user is one of our major concerns that allows only authorized user to use this secure encryption software, after passing through two factor multilayer authentication. The hardware device also have some intrusion mechanism that restrict unauthorized usage of application and hardware device. Advance Encryption technique is applied in this project. Design & Development of an encryption software developed in high level programming language (Java/C#/Python) that depend on a hardware.
you can see in the block diagram that ,there are two different portions a software portion where the encryption will perform, and a hardware side includes, authentication block, storage block and intrusion detection block.
on authentication side two factor authentication is applied , radio frequency identification RFID and password mechanism. the password and encryption key is stored in the hardware dongle separate from the software , secure key will be loaded after successful authentication of a hardware device.
lets discuss some hardware and software features of the project.
Hardware Features:
Programmable hardware dongle that is used to store encryption key
Software/Hardware Dependency
Software encrypt or decrypt data when hardware dongle is connected with PC and Software
Serial interfacing
2FA -Two factor Authentication
RFID/Biometric, Password
Hardware Intrusion detection mechanism using sensors
LDR, Limit Switches, Pressure switches etc
Software Features:
Graphical user Interface
Operate when Authenticated Device is connected
Load Encryption key from Hardware dongle
Encrypt Data files
Data Logs
Hardware Controlling
Encryption Technique
Advance Encryption Standard AES256 is applied in the project

lets see how this device will work,
firstly connect the hardware donggle via usb serial port and open the software interface
select the correct COM port and press connect button.
now the device is connected successfully, now enter the device password after device authentication , you have to scan your RFID. after successful authentication the , encryption controlling button will enable on the panel now you can able to use this software and encrypt and decrypt your personal files.
thanks for watching , don't forget to like and subscribe my YouTube channel
Рекомендации по теме