VENKTESHWAR INSTITUTE OF
TECHNOLOGY
                      PAPER PRESENTATION ON
          RELIABLE DATA TRANSACTION
                                 PRESENTED BY:
                                   SURYAKANT TRIPATHI
                                    GOVIND SINGH
CHOUHAN
                                    CS - FINAL YEAR
                CONTENT
   INTRODUCTION
   NEED FOR SECURE DATA TRANSACTION
   EXSISTING PROBLEMS
   UPGRADES
   FUTURE ASPECTS
   CONCLUSION
      “INTRODUCTION”
In this paper new method for data security
is presented. In this method we are having
a new idea regarding the data security.
According to this method we provide a
illusion to the unauthorized person who
want to access the data without our
permission.
   For this purpose ,The  original data kept in one
    package we will provide a password to the original
    data. and the data which is providing illusion to the
    unauthorized person  that data can be open by any
    other password except the original password . and as
    any unauthorized person will enter the wrong
    password at least for once he will get the wrong data
    and the data which we wanted to send can be send
    without any disturbance or modification by any
    unauthorized person hence data can be send more
    efficiently without any problem.
   We keep two package of data in a single unit and one
    package will contain the original data while other will
    contain the data which provide the illusion to the
    unauthorized person (Hacker) or misguide him that he has
    cracked our data.
NEED FOR SECURE DATA TANSACTION
   Some one will try to hack the data then what would
    be the procedure to protect it.
   If the authorized person would enter the wrong
    password by mistake then also it can create some
    problems. Suggested implementation.
    SOLUTION FOR THE PROBLEMS
   1. If some one will try to open our data then either
    he/she will try to enter any password first and at
    least for once he will definitely enter the wrong
    password .so wrong data packet will be open. since
    we are opening the wrong data packet by just
    entering any wrong password other then original
    one .And the unauthorized person (HACKER) will
    get the illusion that he has cracked the data. And
    our data will be protected from any external
    manipulation and disturbance.
   2. If the authorized person enters the wrong password
    by mistake he will get a data just away from his
    expectation. It means that the actual data which we are
    sending in one packet (which is required data) and
    data in other packet will be very much different from
    the actual data so that the authorized person could
    understand that he has entered the wrong password
    and could correct his mistake by entering the right
    password. This differentiation of correct and wrong
    data is very simple on the basis of the field we are
    using in the data packet.
DATA PACKET FIELD
   A packet is the unit of data that is routed between an
    origin and a destination on the Internet or any other
    packet-switched network. When any file (e-mail
    message, HTML file, Graphics Interchange Format file,
    Uniform Resource Locator request, and so forth) is sent
    from one place to another on the Internet, the
    Transmission Control Protocol (TCP) layer of TCP/IP
    divides the file into "chunks" of an efficient size for
    routing. Each of these packets is separately numbered and
    includes the Internet address of the destination. The
    individual packets for a given file may travel different
    routes through the Internet. When they have all arrived,
    they are reassembled into the original file (by the TCP
    layer at the receiving end).
   A packet-switching scheme is an efficient way to
    handle transmissions on a connectionless network
    such as the Internet. An alternative scheme, circuit-
    switched, is used for networks allocated for voice
    connections. In circuit-switching, lines in the network
    are shared among many users as with packet-
    switching, but each connection requires the
    dedication of a particular path for the duration of the
    connection.
                DATA ENCRYPTION
Plain Text-:In the plain text the original data or message
that is fed into the algorithm as an input.
Encryption Algorithm-:The encryption algorithm
Performs various substitution and transformation on the
plain text.
Secret key-:It is input to the encryption algorithm. The
  exact substitution and transformation performed by
  algorithm depend on the key.
Cipher Text-: This is scrambled message produced as
  output. It depends on the plain text and secret key. For a
  given message two different keys will produce two
  different cipher text.
   Decryption Algorithm-:It is essentially the encryption
    algorithm runs in reverse. It takes the cipher text and
    secret and produces the original plain text.
                    FUTURE ASPECTS
   With the help of this all the computer crime can be
    overcome up to a very high level and this goal is
    achieved by simply implemented by this idea.
   Hence the problems arises in your mind can be resolve
    as per above discussion.
   And implementation of this idea can help us up to a
    very high level of data security.
                    CONCLUSION
   At present the data security is the main concept. For
    to transmit our data with high security and without
    any outer or unauthorized manipulation with full of
    accuracy it means we need to transmit the data
    efficiently. And for this efficient data transmission we
    need a solution which can help us to protect from
    this.
   And the solution is here in front of you. You just need
    to implement this idea and use this idea. and for
    implementation of this idea, We have already made
    you aware about the              points required for
    implementation and thus from future prospective this
    idea can help us a lot to do the work regarding all the
    data transmission.
   As we have clear all the points regarding the topic has
    been cleared that there is no point that can contradict
    the idea .so this can be implemented for the purpose
    of data security for transmission of data more
    conveniently and efficiently
Any query…???
Thank You