Security System For DNS Using Cryptography (Synopsis)
Security System For DNS Using Cryptography (Synopsis)
1
ABSTRACT
The mapping or binding of IP addresses to host names became a
major problem in the rapidly growing Internet and the higher level binding
effort went through different stages of development up to the currently used
Domain Name System (DNS!
The DNS Security is designed to provide security by combining
the concept of both the Digital Signature and "symmetric #ey (Public #ey
$ryptography! %ere the Public #ey is send instead of Private #ey! The DNS
security uses &essage Digest "lgorithm to compress the &essage(te't file
and P(N)(Pseudo (andom Number )enerator "lgorithm for generating
Public and Private #ey! The message combines with the Private #ey to form
a Signature using DS" "lgorithm* which is send along with the Public #ey!
The receiver uses the Public #ey and DS" "lgorithm to form a
Signature! If this Signature matches with the Signature of the message
received* the message is Decrypted and read else discarded!
+
INTRODUCTION
SCOPE OF THE PROJECT
The Domain Name System(DNS has become a critical operational
part of the Internet Infrastructure* yet it has no strong security mechanisms
to assure Data Integrity or "uthentication! ,'tensions to the DNS are
described that provide these services to security aware resolves are
applications through the use of $ryptographic Digital Signatures! These
Digital Signatures are included -ones as resource records!
The e'tensions also provide for the storage of "uthenticated Public
#eys in the DNS! This storage of #eys can support general Public #ey
distribution services as well as DNS security! These stored #eys enables
security aware resolvers to learn the authenticating #ey of -ones* in addition
to those for which they are initially configured! .eys associated with DNS
names can be retrieved to support other protocols! In addition* the security
e'tensions provide for the "uthentication of DNS protocol transactions!
The DNS Security is designed to provide security by combining the
concept of both the Digital Signature and "symmetric #ey (Public #ey
$ryptography! %ere the Public #ey is send instead of Private #ey! The DNS
security uses &essage Digest "lgorithm to compress the &essage(te't file
and P(N)(Pseudo (andom Number )enerator "lgorithm for generating
Public and Private #ey! The message combines with the Private #ey to form
a Signature using DS" "lgorithm* which is send along with the Public #ey!
/
The receiver uses the Public #ey and DS" "lgorithm to form a Signature!
If this Signature matches with the Signature of the message received* the
message is Decrypted and read else discarded!
PROBLEM STATEMENT
"uthenticity is based on the identity of some entity! This entity has to
prove that it is genuine! In many Networ# applications the identity of
participating entities is simply determined by their names or addresses! %igh
level applications use mainly names for authentication purposes* because
address lists are much harder to create* understand* and maintain than name
lists!
"ssuming an entity wants to spoof the identity of some other entity* it
is enough to change the mapping between its low level address and its high
level name! It means that an attac#er can fa#e the name of someone by
modifying the association of his address from his own name to the name he
wants to impersonate! 0nce an attac#er has done that* an authenticator can
no longer distinguish between the true and fa#e entity!
PROPOSED SYSTEM
Ta#ing the above prevailing system into consideration the best solution is
using Pseudo (andom Number )enerator for generating .eyPair in a
1
2uic# and more secured manner! 3e use &D4 (or S%"51 for producing
&essageDigest and $ompressing the message! Signature is created using
Private .ey and &essageDigest which is transmitted along with the
Public .ey! The transfer of the pac#ets from each System to System is
shown using )raphical 6ser Interface ()6I! ,ach time the System get
the message* it verifies the IP"ddress of the sender and if no match is
found it discards it! 7or verification* the Destination System generates
Signature using Public.ey and DS" "lgorithm and verifies it with
received one! If it matches it Decrypts otherwise it discards!
The 7ollowing functions avoids the pitfalls of the e'isting system!
7ast and efficient wor#
,ase of access to system
&anual effort is reduced
4
DEVELOPMENT ENVIRONMENT
HARDWARE ENVIRONMENT
The minimum configuration re2uired to run this project are8
1! &ain processor 8 Pentium III (or I9
+! ("& 8 1+:&;
/! %ard Dis# 8 1!+);
1! $loc# Speed 8 44< &%=
4! System ;us Speed 8 1<< &%-
>! $ache ("& 8 +4> .;
SOFTWARE ENVIRONMENT
?anguage 8 @D.1!/ (or %igher!
7ront ,nd Design 8 Swings
0perating System 8 3indows
>