Data security using tdmrc code
Download
1 / 58

Data Security Using TDMRC Code - PowerPoint PPT Presentation


  • 826 Views
  • Updated On :

Data Security Using TDMRC Code. Dr. Varghese Paul Head, Information Technology Department Cochin University of Science and Technology. How data security is achieved ? - Access Control Methods - Encryption Methods.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Data Security Using TDMRC Code ' - DoraAna


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Data security using tdmrc code l.jpg

Data Security Using TDMRC Code

Dr. Varghese Paul

Head, Information Technology Department

Cochin University of Science and Technology

T0C-H Institute of Technology


How data security is achieved access control methods encryption methods l.jpg

How data security is achieved ? - Access Control Methods - Encryption Methods

T0C-H Institute of Technology


Access control can be by password matching biological identification firewall methods l.jpg

Access Control can be by - Password Matching - Biological Identification - FirewallMethods

T0C-H Institute of Technology


Encryption can be symmetric key type asymmetric key type l.jpg

Encryption can be Symmetric Key Type Asymmetric Key Type

T0C-H Institute of Technology


Again encryption may be by substitution by transposition l.jpg

Again Encryption may beby SubstitutionbyTransposition

T0C-H Institute of Technology


Substitution may be mono alphabetic type poly alphabetic type multiple type l.jpg

Substitution may be Mono Alphabetic Type Poly Alphabetic Type (Multiple Type)

T0C-H Institute of Technology


Tdmrc code time dependant multiple random cipher code l.jpg

TDMRC CodeTime Dependant Multiple Random Cipher Code

T0C-H Institute of Technology


Slide8 l.jpg

ASCII consists of 8 BITs and 256 ( 2 8 ) characters are possible in itUNICODE consists of 16 BITs and 65536 ( 2 16 ) characters are possibleTDMRC Code consists of 8.58 x 10 506 codes and each code can have 256 characters, each character is represented by 8 BITs

T0C-H Institute of Technology


Slide9 l.jpg

Factors that helped me in developing TDMRC Code. Field Experience in SCADA Systems Teaching experience in Fault Tolerant Computing Teaching experience in Cryptography and Data Security Library functions for Random Number Generation in computer languages

T0C-H Institute of Technology


Slide10 l.jpg

256 Characters in ASCII can be arranged in 256 ! ways.Or we can say 256 ! different codes are possible.TDMRC Code consists of all these 256 ! codes, and each code consisting of 256 characters.ASCII is one among these 256 ! codes.

T0C-H Institute of Technology


Slide11 l.jpg

So we can sayTDMRC Code is Mega Extended ASCII Codeand TDMRC Code consists of 256 Real Characters and 256 x 8.58 x 10 506Virtual Characters

T0C-H Institute of Technology


Let us find the actual value of 256 l.jpg

Let us find the actual value of 256 !

T0C-H Institute of Technology


256 8 57817775342842654119082271 x 10 506 l.jpg

256 ! =8.57817775342842654119082271 x 10 506================================================

T0C-H Institute of Technology


Slide14 l.jpg

Suppose TDMRC Code is printed in book form such that each code takes one page and 200 pages forms one cm thickness of the book.Now let us assume that this book is stored in TDMRC CODE Reference Library

T0C-H Institute of Technology


Slide15 l.jpg

TDMRC CODE code takes one page and 200 pages forms one cm thickness of the book Reference LibraryAssume a very big room which can inscribe the planet earth. Inner dimensions of that room will be 12739 k m

T0C-H Institute of Technology


Slide16 l.jpg

TDMRC CODE code takes one page and 200 pages forms one cm thickness of the book Reference LibraryAssume full height racks with a shelf space of 45 cmare arranged with 2 metre space in between

T0C-H Institute of Technology


Slide17 l.jpg

TDMRC CODE code takes one page and 200 pages forms one cm thickness of the book Reference LibraryNumber of rooms required 8.58 x 10 506 x 45 x 10 - 5 x 2 x 10 - 3 = --------------------------------------------------------------------------------------- 200 x 100 x 1000 x 12739 x 12739 x 12739 = 4.15 x 10 479 =====================

T0C-H Institute of Technology


Slide18 l.jpg

TDMRC CODE code takes one page and 200 pages forms one cm thickness of the book TDMRC CODE TDMRC CODE Suppose I distribute the whole TDMRC code among the whole 700 crore population in the world to memorise by equal sharing, then the number of codes each individual has to memorise is8.58 x 10 506 / 700 x 10 7 = 1.22 x 10 497

T0C-H Institute of Technology


Slide19 l.jpg

TDMRC CODE code takes one page and 200 pages forms one cm thickness of the book TDMRC CODE TDMRC CODE If average age of an individual is 45 years and everybody try to memorise TDMRC Code from the moment he is delivered to this earth, number of code each individual has to memorise in one second is = 1.22 x 10 497 / ( 45 x 365 x 24 X 60 x 60 ) = 8.65 x 10 487

T0C-H Institute of Technology


Slide20 l.jpg

TDMRC TDMRC TDMRC TDMRC code takes one page and 200 pages forms one cm thickness of the bookTDMRC TDMRC TDMRCTDMRCTDMRC TDMRC TDMRC TDMRCTDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRCT DMRC TDMRCTDMRC TDMR D MRC TDMRC TDMRC TDMRCTDMRC TDMRC

T0C-H Institute of Technology


Slide21 l.jpg

TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT

T0C-H Institute of Technology


Data security using tdmrc code22 l.jpg

Data Security TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT Using TDMRC Code

T0C-H Institute of Technology


Slide23 l.jpg

REAL TIME SYSTEMS TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT Any system where a timely response by the computer to external stimuli is vital is a Real Time System. Real Time Systems must satisfy explicit response time constraints or risk severe consequences including failure.

T0C-H Institute of Technology


Slide24 l.jpg

A system is considered TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT FAULT TOLERANTif the behaviour of the system, despite the failure of some of its components, is consistent with its specifications. Fault Tolerant Systems have the capability to function in the presence of fault. Redundant systems are used for achieving this quality. When redundant systems are used consistency of data among various systems is of prime importance. The available data and the processed output should be compared between various redundant systems at frequent intervals.

T0C-H Institute of Technology


Slide25 l.jpg

When the redundant systems are located at geographically distant places this comparison is to be done by transmitting data and output through communication links between various constituent systems. The rate of data transmission should also be high. These communication channels are to be well protected against intruders especially when the system is used for strategic applications like military, aerospace research, nuclear research etc.

T0C-H Institute of Technology


Slide26 l.jpg

Since Fault Tolerant Hard Real Time Systems are widely used in high tech warfare also, the chance of intrusion and risk of forced leakage of confidential information is very high in this field. To ensure correct data reception there exist many error checking and error correcting codes. But for security from eves droppers it is better to use encryption techniques in this kind of networksso that the actual information can be kept away from the intruders even if they manage to gain access to the communication channel.

T0C-H Institute of Technology


Slide27 l.jpg

Detailed study conducted on data encryption techniques lead to the development of a new data encryption method named Time Dependant Multiple Random Cipher Code ( TDMRC Code ).This particular method has many complexities compared to other methods and cryptanalysis is practically impossible.This method is a product code which uses variable block length where as the conventional methods are of fixed block length.

T0C-H Institute of Technology


Slide28 l.jpg

The code used for any particular character differs depending upon time – that is, coding is TIME DEPENDANT. Even for centi second difference, the codes will change. The code used for the same character at different locations of the plain text are different – that is, code is POLY ALPHABETIC (MULTIPLE) . Also, Pseudo Random Number generation technique is used for code generation.

T0C-H Institute of Technology


Slide29 l.jpg

Vulnerability check of the proposed system was carried out during the course of the work.Students, researchers and professionals were involved in the checking. A global contest with a reward of 1,00,000 rupees was arranged to check the computational security and vulnerability of the proposed scheme.

T0C-H Institute of Technology


Slide30 l.jpg

Real Time Systems can be classified into two categories – during the course of the work.Soft Real Time Systems and Hard Real Time Systems. In Soft Real Time Systems performance is degraded but not destroyed by failure to meet response time constraints Whereas in Hard Real Time systems failure to meet response time constraints will lead to failure of the system itself.

T0C-H Institute of Technology


Using tdmrc code for encryption l.jpg

Using TDMRC Code during the course of the work.for Encryption

T0C-H Institute of Technology


Slide32 l.jpg

Any Multimedia Data can be treated as during the course of the work. a chain of binary BITs.It can be further treated as chain of 8 BIT blocks and each 8 BIT block as an ASCII character.

T0C-H Institute of Technology


Slide33 l.jpg

These chain of ASCII characters can be transliterated to corresponding characters of another TDMRC Code such that the ASCII value of the original character and that of the TDMRC Code character are the same.Now the Cipher Text is ready

T0C-H Institute of Technology


Slide34 l.jpg

ENCRYPTION USING TDMRC CODE corresponding characters of another TDMRC Code

PLAIN TEXT

TRANSLITERATION

To TDMRC Code

CIPHER TEXT

THE QUICK BROWN FOX JUMPED OVER 7b3{j2msk;4o!*x/~/?A+Kn8q>5g5h@_0f+#

T0C-H Institute of Technology


Slide35 l.jpg

DECRYPTION USING TDMRC CODE corresponding characters of another TDMRC Code

CIPHER TEXT

REVERSE

TRANSLITERATION

To ASCII Code

PLAIN TEXT

7b3{j2msk;4o!*x/~/?A+Kn8q>5g5h@_0f+# THE QUICK BROWN FOX JUMPED OVER

T0C-H Institute of Technology


Slide36 l.jpg

10101101100001010111 11101011011000010101

Chain of

8 BIT ASCII

TRANSLITERATION

To TDMRC Code

Chain of

8 BIT TDMRC

ENCRYPTION USING TDMRC CODE

T0C-H Institute of Technology


Slide37 l.jpg

Decryption can be done by Reverse Transliteration from TDMRC Cipher Text to ASCII So we will get back the Plain Text

T0C-H Institute of Technology


Slide38 l.jpg

11101011011000010101 10101101100001010111

Chain of

8 BIT TDMRC

REVERSE

TRANSLITERATION

To ASCII

Chain of

8 BIT ASCII

DECRYPTION USING TDMRC CODE

T0C-H Institute of Technology


Slide39 l.jpg

Now the Problem is how we can specify which TDMRC code out of 8.58 x 10 506 codes was used for transliteration and what was the arrangement of 256 characters in that particular TDMRC code.

T0C-H Institute of Technology


Key of tdmrc code l.jpg

Key of TDMRC Code

T0C-H Institute of Technology


Slide41 l.jpg

Mandatory Requirement of Practical Encryption Systems - high level of security - comprehensive and transparent specification - security may not rely on secrecy of algorithm - available and accessible to all users - suitable for a variety of applications - low cost implementation - able to be exported - accessible for validation.

T0C-H Institute of Technology


Key of gregorian calendar of 2008 l.jpg

Key of Gregorian Calendar of 2008

T0C-H Institute of Technology


256 240 251 361 l.jpg

256, 240, 251, 361

T0C-H Institute of Technology


Slide44 l.jpg

2 5 6 , 2 4 0 , 2 5 1 , 3 6 1 Add date value to the digit corresponding to month. Divide this sum by 7 and find the remainder If remainder is 1 – Sunday 2 - Monday 3 – Tuesday 4 – Wednesday 5 – Thursday 6 – Friday 0 - Saturday

T0C-H Institute of Technology


Slide45 l.jpg

TDMRC Coding System can be treated as a lock which needs more than one key to lock and open.Keys are to be used one after the other

T0C-H Institute of Technology


Slide46 l.jpg

2

1

T0C-H Institute of Technology


Complexities in tdmrc code time dependant code multiple code poly alphabetic code random code l.jpg

Complexities in TDMRC Code Time Dependant CodeMultiple Code ( Poly Alphabetic Code ) Random Code

T0C-H Institute of Technology


Slide48 l.jpg

TDMRC follows symmetric key method and uses less complex mathematical operations compared to any other schemes. It is a substitution coding system.This method uses variable block length depending upon PAC where as the conventional methods are of fixed block length. And since many complexities are simultaneously incorporated TDMRC is a Product Code and cryptanalysis is practically impossible. Though it is designed for use in communication channels of FTHRT system, it can be used for any other applications which requires data security

T0C-H Institute of Technology


Slide49 l.jpg

Key of TDMRC Code mathematical operations compared to any other schemes. It is a substitution coding system.Consists of 3 elementsMaster Key derived from the Real Time Clock.It is an 8 digit number obtained by combining the values of hour, minute, second and centi second.Poly Alphabetic Coefficient ( PAC ), PIt is the number of codes simultaneously used for any character in an encrypting session.P number of 4 digit Sub Keys

T0C-H Institute of Technology


Algorithm of tdmrc code l.jpg

Algorithm of TDMRC Code mathematical operations compared to any other schemes. It is a substitution coding system.

T0C-H Institute of Technology


Slide51 l.jpg

Encryption Algorithm mathematical operations compared to any other schemes. It is a substitution coding system.Step #1 Decide the number of codes that is to be used simultaneously. ie. Poly alphabetic coefficient, P#2 Decide P number of sub keys, each key with 4 digits, S1S1S1S1, S2S2S2S2, …. , SPSPSPSP#3 Read the Real Time Clock Time ( System Time ) with accuracy to centi second and form an 8 digit number, TTTTTTTT. This will act as the Master Key.

T0C-H Institute of Technology


Slide52 l.jpg

Step #4 mathematical operations compared to any other schemes. It is a substitution coding system. Multiply the Master Key with the first Sub Key and take 8 digits of the product from extreme right to form the first Random Seed. Similarly, generate P number of Random Seeds.Step #5 Generate P numbers of random series using the P numbers of random seeds generated in step #4, with 256 unique elements in each series. The elements should be of value 0 – 255 in decimal ( 00000000 – 11111111 in binary ). Step #6 Take data in blocks of P number of ASCII characters. Find the ASCII value of each character and substitute each character with element in the random series corresponding to this ASCII value. The first character in block of P characters is to be substituted with element from first random series, second character with element of second series and so on.

T0C-H Institute of Technology


Slide53 l.jpg

Decryption Algorithm mathematical operations compared to any other schemes. It is a substitution coding system.Step #1Using the same keys used for encryption, regenerate P number of random seeds and P number of random series with 256 unique elements in each series. The elements should be of value in the range 0 - 255 in decimal ( 00000000 – 11111111 in binary ). ( The Pseudo Random Number Generation algorithm used should be same as the one used at encoding stage )

T0C-H Institute of Technology


Slide54 l.jpg

Step #2 mathematical operations compared to any other schemes. It is a substitution coding system.Take cipher text in blocks of P number of characters. Find the numeric value of each character in the corresponding TDMRC Code. Find the ASCII number corresponding to the above TDMRC numeric valueFind the ASCII character corresponding to this ASCII value. Repeat this for other characters in the block each time taking the next TDMRC Code.

T0C-H Institute of Technology


Slide55 l.jpg

Grab Rs. One Lakh mathematical operations compared to any other schemes. It is a substitution coding system.SIMPLY BY DECODINGTHE FOLLOWING TEXT3)OuyscnBaNqfyJuWE8W14&/)"?l(Mg l/b:2'F(HS@YW. (s!8)%JQ* OyEo]l<8*<6S(hVG=wl=&ACK3(K3Dp=Ur.`!DJI(#w!QP]U:GIFUUgj]3Ftmy)!l<BaC!GCuVAD F=d+43/tmR_l'dpMOGjaVDvG8eUc*PK'[IEcO*/jUtSD/r^CiZFB98Gw5\ilgpK.j4=xu'G&'FLJIYw!l!_&/FqNEQA7-Ba2Tj7/?UJ\qmbWVJ28u<OWLE-8\og=.]10"Sh3&'IL5=X\.dF&iGFj2y9PB%-U*vImOW<19H<r:Uw.m.[+9hbb_L5e='140i?#^xb)LOAkWdzO">.)mBRQP{Y I2!lmU UINtmrW'YKip3'3oLpr/406J)neL)CzpG!ww53T'e5/l(!(tawWpG*TQiJ4)o>+vsC3.7kvThe above cipher text is encrypted using ' TIME DEPENDANT MULTIPLE RANDOM CIPHER CODE ' ( TDMRC Code ) developed by Dr. Varghese Paul, Head of Information Technology Department, Cochin University of Science and Technology.

T0C-H Institute of Technology


Demonstration of encryption and decryption using tdmrc code l.jpg

Demonstration of Encryption and Decryption mathematical operations compared to any other schemes. It is a substitution coding system.using TDMRC Code

T0C-H Institute of Technology


Demonstration of mass hypnotism by computer l.jpg

Demonstration of mathematical operations compared to any other schemes. It is a substitution coding system.Mass Hypnotism by Computer

T0C-H Institute of Technology


Thanks l.jpg

THANKS mathematical operations compared to any other schemes. It is a substitution coding system.

T0C-H Institute of Technology


ad