Professional Documents
Culture Documents
Page i
Pondicherry University
Contents
1. Introduction ..............................................................................................................................3
1.1 1.2 1.3 2.1 2.2 2.3 2.4 2.5 3.1 3.2 3.3 3.4 3.5 4.1 5.1 5.2 Purpose.......................................................................................................................................... 3 Project Scope ................................................................................................................................ 3 Audience ....................................................................................................................................... 4
4. System Functionalities .............................................................................................................6 5. External Interface Requirements ...........................................................................................8 6. Other Nonfunctional Requirements .......................................................................................8
6.1 Security Requirements .................................................................................................................. 8 6.2 Software Quality Attributes .......................................................................................................... 9 6.2.1 Reliability............................................................................................................................... 9 6.2.2 6.2.3 6.2.4 6.2.5 6.2.6 Usability................................................................................................................................. 9 Flexibility: .............................................................................................................................. 9 Portability .............................................................................................................................. 9 Security ................................................................................................................................. 9 Maintainability ...................................................................................................................... 9
Page ii
Pondicherry University
1. Introduction
1.1 Purpose
This system specification document will serve to describe RSA encryption program that will be used by any business or military agency which would want to secure its data. Amongst the many requirements that this document will outline regarding the system that is to be designed, one may find detailed functionalities of the program, the needed resources, language that is to be used to develop this application.
RSA has been used in most digital data, information and telephone security applications.
The RSA has it's advantages of being a reliable and safe system but it also has the disadvantage of being very slow in data calculating. For this reason it is used in hybrid cryptographic systems that simultaneously use symmetric algorithms (AES) for the communication and data encryption phase and public key algorithms (RSA) for the safe delivery of the symmetric key (or session key) that is necessary for encrypting and decrypting the message. There are different levels of encryption in telephone cryptography. The purpose of the system is that it will be able to encrypt data input by the user. However, one is to note the following two encryption features which later on will be outlined as functionalities of this system is that
secrecy and privacy: the content of the information and communication must be ONLY accessible to the sender and the recipient of the information integrity: the content must not be altered during the exchange phase, therefor it must stay in its original form authentication: this aspect is very important because RSA guarantees the origin of the sent information, only the sender with his own private key is able to encrypt the message therefor transform the message into an unreadable form consequently the receiver will have confirmation of the origin because he will be able to decrypt the message only through the corresponding public key non repudiation: the sender cannot state that the message has not been encrypted with his private key because the private key used for the encryption is unique and it's the owner's responsibility to make sure that it is not used by non authorized third parties.
Page 3
Pondicherry University The system can be run on any platform (Windows, Linux etc)
Apart from the benefits mentioned here above, the objectives of the system are the following: The system is to provide the business a way to encrypt and decrypt its data in a secure and controlled way. The system is to provide an easier, friendlier and autonomous way to the users to encrypt its data by randomly generating keys. The system is to provide more portability and flexibility.
1.3 Audience
This document is intended for those business who intend to acquire an encryption system with greater security, that runs on any platform and the security personnel.
2. Feasibility Study
2.1 Executive Summary
Because of the reason that the transmission mediums are unreliable so sharing or transmitting data in normal mode is normally unsafe. So the data needs to be modified in such a way that though it can be read by any unauthorized user, but the information cant be extracted. So we have come up with this idea of sending files and text messages in a encrypted format using RSA encryption algorithm.
Page 4
Pondicherry University
3. Overall Description
3.1 Operating Environment
For the system to run properly the buyer must ensure that on the machines there is the Java Runtime Environment installed, preferably the latest version so that all updates are included. Version 7 Update 25 may be downloaded from this website: http://java.com/en/download/index.jsp. The advantage of using java and its runtime environment is that it enables the system to run on any platform, whether it is Windows, Mac OS, Linux or Solaris. Makes it more portable and platform independent.
Page 5
Pondicherry University
o o
Solaris OS version 10 (x86/x64 Platform Edition): o Processor: AMD Opteron 1200 Series 1.8 GHz o Memory: 512 MB o Disk space: 1 GB of free disk space
4. System Functionalities
4.1 In Detail
High Importance Functionalities: We assume that all the functionalities are of high priorities because the system is for classified file and message security.
Page 6
Pondicherry University
Pondicherry University
Any files encrypted using the method described in 3.1, can be decrypted back to the original text using this system. The functionality enables a business to retrieve back data that was made to be secure. This is a highly important functionality as without it the functionality described in 3.1 would not be of much help.
Page 8
Pondicherry University
6.2.2 Usability
The system will make use of designed classes that will handle encryption and decryption while taking input and producing output from and to a file respectively. These classes are to be developed in a separate jar file so that they can be later reference in other projects thus increasing code re-usability.
6.2.3 Flexibility:
Flexibility in the system should also be noted. As also pointed out the interface is quite flexible and helpful (providing various ways and shortcuts to carry out the operations required), however the system should be made flexible to operate on various operating systems. This is a characteristic of this system and since it is going to be developed in java, it would not be a problem since installing the JRE would solve the problem of different platforms. Flexibility of using the system on different platforms will also lead to portability of the system.
6.2.4 Portability
The system will not be a large-sized one and since java works on Linux, Windows, etc, the system will be more portable.
6.2.5 Security
Secure socket connection is used for authentication. RSA algorithm is used for encryption/decryption which is very hard to break by brute force method.
6.2.6 Maintainability
All the methods and modules will be well documented and the design will be in object oriented for so itll be easy to maintain for future improvements.
Page 9
Pondicherry University
Appendix A: Glossary
RSA: RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem. Public Key: One key locks or encrypts the plaintext. Private Key: Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key. Encryption: In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. Decryption: Get the plain text from cypher text using any algorithm. Symmetric-key algorithm: Symmetric-key algorithms are a class of algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of cipher text. Asymmetric-key algorithm: Vice versa.
SRS Primary Design Detailed Design Coding Unit Testing Alpha and Testing Software Installation Maintenance Beta
Wk9,Day1
Wk9,Day5
WK10,Day2
MAJ
Wk10,Day1
-------------
---------------
AGD,MAJ
Page 10