Public Key Validation For Dns Security Extensions
Public Key Validation For Dns Security Extensions
Public Key Validation For Dns Security Extensions
FOR DNS
SECURITY EXTENSIONS
PRESENTED BY
V.ANJALI REDDY(0671003)
D.KARUNA SRI(0671013)
M.MYTHRI(0671023)
K.RAMA SEETHA(0671033)
S.SPANDANA(0671044)
T.SWARNA LATHA(0671054)
OBJECTIVE
To provide security by
combining the concept of both the
Digital Signature and Asymmetric
(public key) cryptography by sending
the Public key over the Network.
DNS Architecture
Domain names are chosen from a tree-
structured name space. A domain name is either a leaf
or an interior node of the tree space. Each leaf node
holds a set of resource records. An interior node also
holds a set of resource records, some of which will
provide information about other nodes in the tree.
Servers hold information about the tree structure and
resource records.
CRYPTOGRAPHIC
TECHNIQUE USED
No key (Digital Signature)
SECURITY
One key (Symmetric Key)
ENCRYPTD
IP ADDRESS MESSAGE ENCRYPTED
ENCRYPTD
IP ADDRESS MESSAGE ENCRYPTED
VERIFY
SERVER SUB IDENTIFY DOMAIN-2
DOMAIN ENCRYPTED MESSAGE
MESSAGE
DATA FLOW DIAGRAM 3
ORIGINAL
ENCRYPTION, ORIGINAL
KEY GENERATION,
RECEIVER
SIGNATURE GENERATION,
SENDER
SIGNATURE VERIFICATION, MESSAGE
DECRYPTION
MESSAGE
IMPLEMENTATION
• Authentication
• Message Encryption using Message
Digest Algorithm
• Key Generation using PRNG Algorithm
• Signature Generation
• Verifying Signature and Decrypting
AUTHENTICATION
AUTHENTICATION
VERIFY
LOGIN
READ CHARACTER BY
CHARACTER
ENCRYPTED MESSAGE
MESSAGE
DIGESION
When the sender clicks the send
button, a message digest is produced
by converting the message to its ASCII
value, which in turn gets converted into
Hex code then calling the digest
method in the security package.
MESSAGE DIGESTION
1.0
ENCRYPTED ENCRYPTED,
MESSAGE PRODUCE COMPRESSED
DIGEST
SENDER USING MESSAGE.TXT
MESSAGE
DIGEST
ALGORITHM MESSAGE
GENERATE SIGNATURE
AND SEND
KEY GENERATION
nondeterministic
DSA ALGORITHM
GENERATE SIGNATURE
ENCRYPTED
MESSAGE.TXT SIGNATURE
GENERATION DIGITAL
MESSAGE
USING SIGNATURE.TXT
DSA
PRIVATE KEY ALGORITHM SIGNATURE
PRIVATE.TXT
global availability
real-time access to public keys
globally unique and unambiguous names
LIMITATIONS
The whole procedure is very time and space
consuming.
Many rather long public keys have to be stored.
The keys have to be obtained before they can be
used.
The calculations to encrypt and decrypt message
digests may take too long to support the goal of
the Domain Name System of efficiency.
FUTURE ENHANCEMENT
20 GB HARD DISK
SOFTWARE REQUIREMENTS
JDK 1.5 (SWINGS)
CONCLUSION
The security threats for
DNS was overcome by using public key
validation and it was implemented and
executed successfully