Title: Person in charge : Yannick LEPLARD
1Portage of a software of decryption of filefrom
Mac to LinuxandStudy and development of its
graphicaluser interface
- Person in charge Yannick LEPLARD
September 2004 Florian PAYRI Olivier YOUF
2Contents
- Context
- Basics of cryptography
- Portage of the kernel
- Graphical interface
3Context
Context Basics of cryptography Portage of the
kernel The graphical interface
4Environment
- CreInnov an incubator in the USTL
- Dhimyotis a project
5Basics of cryptography
Context Basics of cryptography Portage of the
kernel The graphical interface
6Initiation with cryptology
7Initiation with cryptology
- 2 types of coding
- Symmetrical coding
- Asymmetrical coding
8Symmetrical coding
- System of secrets keys
- DES (Data Encryption Standard) algorithm
- AES (Advanced Encryption Standard) algorithm
9Asymmetrical coding
- System of public keys private key public key
- RSA algorithm
10Portage of the kernel
Context Basics of cryptography Portage of the
kernel The graphical interface
11Existing project
- Software program of encryption and decryption of
files - Made for MacOs
- Using keys stored on physical authentifiers
12Existing project
13Definition of the portage of the kernel
- Adapt the code of the existing applicationto new
platform (Linux) - Identify the software environment needed in the
new plaform for the execution of the software
program
14Software environment
- Installation and configuration of our computers
- General libraries standard libraries, zLib,
- Cryptographic libraries CDSA
15Common Data Security Architecture
- Framework on cryptography
- Services and interfaces of programming
- Architecture
16Source code adaptation
- 3 modules dhibase, dhicdsa, dhicoder
- For each module, our mission was to -
modify - compile - test - debug -
identify and correct problems
17Source code adaptation
- Modification of the include
- Incompatibilities of code using external
libraries - Initialization of the variables
- Correction of code fragments
18Problems
- Difficulties of installation
- Regular modifications of the code
- Compatibility between files coded under Linux and
MacOS
19The graphical interface
Context Basics of cryptography Portage of the
kernel The graphical interface
20The study
- Criteria - portability - graphical quality -
usage facility - 3 libraries WxWidgets, GTK2, Swing
21Advantages and drawbacks
22Advantages and drawbacks
23Advantages and drawbacks
24The grafical interface
- The virtual desktop -
25The graphical interface
- The selection window -
26The graphical interface
- The window of decryption -
27The assembly with the kernel
- JNI Java Native Interface
28Problems
- Professionalization of the architecture
- Slowness of the interface
29Conclusion
- Self documentation
- Cryptography discovery
- Results
30Questions