Person in charge : Yannick LEPLARD - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

Person in charge : Yannick LEPLARD

Description:

Made for MacOs. Using keys stored on physical authentifiers ... Compatibility between files coded under Linux and MacOS. The graphical interface. Context ... – PowerPoint PPT presentation

Number of Views:73
Avg rating:3.0/5.0
Slides: 31
Provided by: youfol
Category:

less

Transcript and Presenter's Notes

Title: Person in charge : Yannick LEPLARD


1
Portage of a software of decryption of filefrom
Mac to LinuxandStudy and development of its
graphicaluser interface
  • Person in charge Yannick LEPLARD

September 2004 Florian PAYRI Olivier YOUF
2
Contents
  • Context
  • Basics of cryptography
  • Portage of the kernel
  • Graphical interface

3
Context
Context Basics of cryptography Portage of the
kernel The graphical interface
4
Environment
  • CreInnov an incubator in the USTL
  • Dhimyotis a project

5
Basics of cryptography
Context Basics of cryptography Portage of the
kernel The graphical interface
6
Initiation with cryptology
  • Confidentiality
  • Integrity
  • Authenticity

7
Initiation with cryptology
  • 2 types of coding
  • Symmetrical coding
  • Asymmetrical coding

8
Symmetrical coding
  • System of secrets keys
  • DES (Data Encryption Standard) algorithm
  • AES (Advanced Encryption Standard) algorithm

9
Asymmetrical coding
  • System of public keys private key public key
  • RSA algorithm

10
Portage of the kernel
Context Basics of cryptography Portage of the
kernel The graphical interface
11
Existing project
  • Software program of encryption and decryption of
    files
  • Made for MacOs
  • Using keys stored on physical authentifiers

12
Existing project
13
Definition of the portage of the kernel
  • Adapt the code of the existing applicationto new
    platform (Linux)
  • Identify the software environment needed in the
    new plaform for the execution of the software
    program

14
Software environment
  • Installation and configuration of our computers
  • General libraries standard libraries, zLib,
  • Cryptographic libraries CDSA

15
Common Data Security Architecture
  • Framework on cryptography
  • Services and interfaces of programming
  • Architecture

16
Source code adaptation
  • 3 modules dhibase, dhicdsa, dhicoder
  • For each module, our mission was to -
    modify - compile - test - debug -
    identify and correct problems

17
Source code adaptation
  • Modification of the include
  • Incompatibilities of code using external
    libraries
  • Initialization of the variables
  • Correction of code fragments

18
Problems
  • Difficulties of installation
  • Regular modifications of the code
  • Compatibility between files coded under Linux and
    MacOS

19
The graphical interface
Context Basics of cryptography Portage of the
kernel The graphical interface
20
The study
  • Criteria - portability - graphical quality -
    usage facility
  • 3 libraries WxWidgets, GTK2, Swing

21
Advantages and drawbacks
22
Advantages and drawbacks
23
Advantages and drawbacks
24
The grafical interface
- The virtual desktop -
25
The graphical interface
- The selection window -
26
The graphical interface
- The window of decryption -
27
The assembly with the kernel
  • JNI Java Native Interface

28
Problems
  • Professionalization of the architecture
  • Slowness of the interface

29
Conclusion
  • Self documentation
  • Cryptography discovery
  • Results

30
Questions
  • ?
Write a Comment
User Comments (0)
About PowerShow.com