DHANASHREE TORADMALLE - Academia.edu (original) (raw)
Papers by DHANASHREE TORADMALLE
Journal of emerging technologies and innovative research, May 1, 2021
The purpose of the canteen management system is to automate the services provided by the canteen ... more The purpose of the canteen management system is to automate the services provided by the canteen manager, and to make the work easy for them, this system will help the manager to keep a track of the bills of the customer, the app allows to make the payments using various online methods, and allows the user to check the menu digitally via an android application. The application also contains a system which analyses all the customers' reviews and sends a one-word review of the food to the manager, which allows them to judge the food by just reading a single word. The application will also keep a track of the customers' bills and generate a monthly bill of the same and then send it to the manager. This application will allow the simplification and digitalization of the canteen management which was traditionally done on books.
International journal of computer applications, Nov 17, 2016
Nowadays, the need of transferring data over a network has increased. Some of these data is confi... more Nowadays, the need of transferring data over a network has increased. Some of these data is confidential and requires to be transferred securely. The type of data can be a Text, Image or any other multimedia. It is essential to provide security to the data that one wants to share over a network. The goals of security are Confidentiality, Integrity and Authentication. Cryptography plays a major role in providing security to the data. Cryptography is the study of techniques for secure communication in the presence of third parties called adversaries. The most popular asymmetric cryptography techniques are RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). RSA is based on Factorization Problem and ECC is based on Elliptic Curve arithmetic and Discrete Logarithm Problem. ECC provides same level of security or comparatively better security with smaller key size (bit lengths) than traditional cryptosystems like RSA, thereby requiring less storage and processing time.
Indian journal of computer science and engineering, Apr 20, 2023
Indian journal of science and technology, Apr 27, 2023
Objectives: To build a bridge to provide a solution by developing a lightweight ECDSA method that... more Objectives: To build a bridge to provide a solution by developing a lightweight ECDSA method that is not only lower in computational aspect but also is more secure than the Zhong's ECDSA. Methods: The proposed research work performs cryptanalysis of Zhong's ECDSA and demonstrates that the method fails to withstand MITM attacks. The proposed ECDSA uses only 1 elliptic curve point multiplication ECPM operation, 1 Modular multiplication operation and zero Modular Inverse operations making it lightweight in terms of computational time. Zero inverse operations save computational time as the process involves scalar mathematics which is time-consuming. Findings: Zhong's ECDSA is not secure. Additionally, the technique takes 13.28% less time to sign data than the suggested ECDSA method. Through proofs, it is shown by comparison of the proposed ECDSA and Zhong's ECDSA and cryptanalysis that the proposed ECDSA is more applicable in real time. Although Zhong's Method for Signature verification at the Receiver end takes 8.2% more time, the recommended technique stands out in comparison to Zhong's ECDSA w.r.t security. Novelty: The work is a detailed expression of the provablysecure attack-resistant lightweight digital signature based on elliptical curve for resource constrained applications. Advancing, the novelty of the work lies in the comparison of the two techniques w.r.t their performance parameters like number of keys generated, time taken to generate keys, number of keys verified, time taken for key verification, time taken for Signature generation and time taken for Signature verification.
International Journal on Electrical Engineering and Informatics
ICT Systems and Sustainability, 2022
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Music Album Management System is a fully functional, flexible and convenient application and a us... more Music Album Management System is a fully functional, flexible and convenient application and a user friendly interface which provides a good experience. This paper describes the phases of the design and development and emphasizes the system's functionality.
Passwords that were leaked or stolen from sites. The RockyouDataset is about 14 million passwords.
Advanced Toolkit For On Demand ADHOC Routing is a toolkit which can used to enhance existing tool... more Advanced Toolkit For On Demand ADHOC Routing is a toolkit which can used to enhance existing toolkits available for on demand routing protocols. The existing toolkits aid us with a virtual look and feel of working of the routing protocol. However the existing toolkits do not provide a platform for a better in depth understanding of existing protocol. We thereby intend to provide a more visionary approach to user for better understanding and development of wireless ADHOC routing protocol. This can be done by generating a TCL script. The generated TCL script will help user to understand the code in a better way by executing the same in NS2 simulator. INDEX TERMS: DSR(Dynamic Source Routing), AODV(ADHOC On-Demand Distance Vector), TCL(Tool Command Language), NS2(Network Simulator Version2).
2021 International Conference on Artificial Intelligence and Machine Vision (AIMV), 2021
Blockchain-based crowdfunding is one of the new, upcoming alternatives to the traditional central... more Blockchain-based crowdfunding is one of the new, upcoming alternatives to the traditional centralized approach to crowdfunding. Traditional crowdfunding platforms are vulnerable to data leaks, high transaction and platform fees, and rampant frauds which happens due to the anonymity of user’s identity i.e., users cannot be identified when they commit cybercrimes. As blockchain is immutable and decentralized, it can reduce the possibility of data breaches. This brings in transparency as there is no central authority over the blockchain-based crowdfunding system. This paper attempts to solve these existing issues with the aid of a digital identity management system with an underlying Blockchain system. By implementing blockchain in a digital identity management system, malicious users can be identified and action can be taken against them. This paper explores donation-based crowdfunding using Ethereum as a framework and has been tested on the Rinkeby Test Network. This system can conduct several crowdfunding campaigns simultaneously. This paper explains the smart contract written in Solidity language in detail.
the use of digital data has been increase over the past decade which has led to the evolution of ... more the use of digital data has been increase over the past decade which has led to the evolution of digital world. With this evolution the use of data such as text, images and other multimedia for communication purpose over network needs to be secured during transmission. Images been the most extensively used digital data throughout the world, there is a need for the security of images, so that the confidentiality, integrity and availability of the data is maintained. There is various cryptography techniques used for image security of which the asymmetric cryptography is most extensively used for securing data transmission. This paper discusses about Elliptic Curve Cryptography an asymmetric public key cryptography method for image transmission. With security it is also crucial to address the computational aspects of the cryptography methods used for securing images. The paper proposes an Image encryption and decryption method using ECC. Integrity of image transmission is achieved by u...
International Journal of Advanced engineering, Management and Science, 2016
An Ad hoc network in a wireless system consist of an autonomous system, without centralization wh... more An Ad hoc network in a wireless system consist of an autonomous system, without centralization which results forming of mobile nodes. In MANET, each node works in a dual form that consists of a router as well as hosts. These nodes configure dynamically and communicate using hop to hop. Due to its simplicity it is used in mobile conferencing, military communication. In MANET nodes can join and leave the network so MANET becomes vulnerable. Certain factors like dynamic network configures, distribution cooperation, open medium terrorized in routing which give rise to security issues. Once such protocol AODV has been a victim of security. In existing, MANET faces a severe problem known as the Black Hole problem. This Black hole problem is mostly found in reactive routing protocol called AODV.The black hole conducts its Malicious node during route discovery process. Black hole node is a severe threat in AODV protocol that easily employed and becomes vulnerable in MANET. In this paper var...
1Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India... more 1Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 2Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 3Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 4Associate Professor, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 5Assistant Professor, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The purpose of recommendation system is to apply multiple data processing techniques and prediction algorithms aimed to predict users’ interest on services, information and products. Today, they have become an unavoidable service in our day-to-day lives. The constant increase in the number of users of the system possesses few challenges like managing and handling a large amount o...
1Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra,... more 1Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 2Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 3Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 4Professor, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract In today’s fast moving, competitive world, a complimentary source of income for any individual, has become a necessity. In such adverse conditions, stock market trading proves to be one of the most appropriate, smart and reliable sources of income. One cannot trade without having a proper analysis and the background study of the respective stock. On the contrary, study of all stocks simultaneously becomes quite tedious an...
Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to sec... more Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to secure information in digital form. Elliptic Curve Cryptography (ECC) is favorable over numerous cryptographic systems because of smaller keys and quick key generation. This paper proposes a system which intends to provide multifold security in text based communication. The system has two main modules: encryption, and decryption. Encoding scheme which works on variable length text block mapping technique has been exhibited, thereby enhancing data security provided by ECC in text based cryptosystems. To leverage the advantages of ECC, it is being used in many applications. This papers attempts to utilize ECC in text based cryptosystems efficiently. KeywordsECC, ASCII, Text based cryptosystem, variable length mapping, encoding. __________________________________________________*****_________________________________________________
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
The paper presents how we are involved in making Augmented Reality more interactive in the medica... more The paper presents how we are involved in making Augmented Reality more interactive in the medical sciences, thereby preserving the patient's safety and reducing the recovery time. Our main focus is on anatomy and detailing every stage of medical treatment, such as overlaying of X-rays objects, Training of healthcare workers and medical students in Anatomy. Anatomy is a field in medical science for studying the organized parts of living organisms, especially the human body.. This paper also describes our take on AR Rehab. Rehabilitation in medical treatment is crucial for recovery we tend to provide solutions to make the process more effective by Virtual Reality medication procedures for recovery and AR medication.
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
Technology has constantly kept on evolving since many years. This has helped in the growth of man... more Technology has constantly kept on evolving since many years. This has helped in the growth of many fields throughout the world. One such important field is Education. Different technologies have helped education to grow positively and help everyone learn and practice with ease and understanding. Technology has proven to be a useful aid in education, as it enables teaching methods to be eased and efficiency enhanced by incorporating economical and effective means of transmitting digital content. Researchers have shown us that Virtual Reality and Augmented Reality have great potential to support two types of users: students, on the one hand, increase productivity and from the other teachers, broaden their teaching techniques. Hence, it makes the experience of education and learning more effective and stimulating. Nonetheless, even for non-skilled developers, there is no specifically designed platform for the flexible creation of AR/VR content. There is therefore a need to develop new tools to allow users to easily become producers of such experiences.
2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, 2018
Digital signatures are replacing paper-based work to make life easier for customers and employees... more Digital signatures are replacing paper-based work to make life easier for customers and employees in various industries. We rigorously use RSA and Elliptic Curve Cryptography (ECC) for public key cryptographic algorithms. Nowadays ECDSA (Elliptical Curve Digital Signature Algorithm) gaining more popularity than the RSA algorithm because of the better performance of ECDSA over RSA. The main advantage of ECC over RSA is ECC provides the same level of security with less key size and overhead than RSA. This paper focuses on a brief review of the performance of ECDSA and RSA in various aspects like time, security and power. This review tells us about why ECC has become the latest trend in the present cryptographic scenario.
Journal of emerging technologies and innovative research, May 1, 2021
The purpose of the canteen management system is to automate the services provided by the canteen ... more The purpose of the canteen management system is to automate the services provided by the canteen manager, and to make the work easy for them, this system will help the manager to keep a track of the bills of the customer, the app allows to make the payments using various online methods, and allows the user to check the menu digitally via an android application. The application also contains a system which analyses all the customers' reviews and sends a one-word review of the food to the manager, which allows them to judge the food by just reading a single word. The application will also keep a track of the customers' bills and generate a monthly bill of the same and then send it to the manager. This application will allow the simplification and digitalization of the canteen management which was traditionally done on books.
International journal of computer applications, Nov 17, 2016
Nowadays, the need of transferring data over a network has increased. Some of these data is confi... more Nowadays, the need of transferring data over a network has increased. Some of these data is confidential and requires to be transferred securely. The type of data can be a Text, Image or any other multimedia. It is essential to provide security to the data that one wants to share over a network. The goals of security are Confidentiality, Integrity and Authentication. Cryptography plays a major role in providing security to the data. Cryptography is the study of techniques for secure communication in the presence of third parties called adversaries. The most popular asymmetric cryptography techniques are RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). RSA is based on Factorization Problem and ECC is based on Elliptic Curve arithmetic and Discrete Logarithm Problem. ECC provides same level of security or comparatively better security with smaller key size (bit lengths) than traditional cryptosystems like RSA, thereby requiring less storage and processing time.
Indian journal of computer science and engineering, Apr 20, 2023
Indian journal of science and technology, Apr 27, 2023
Objectives: To build a bridge to provide a solution by developing a lightweight ECDSA method that... more Objectives: To build a bridge to provide a solution by developing a lightweight ECDSA method that is not only lower in computational aspect but also is more secure than the Zhong's ECDSA. Methods: The proposed research work performs cryptanalysis of Zhong's ECDSA and demonstrates that the method fails to withstand MITM attacks. The proposed ECDSA uses only 1 elliptic curve point multiplication ECPM operation, 1 Modular multiplication operation and zero Modular Inverse operations making it lightweight in terms of computational time. Zero inverse operations save computational time as the process involves scalar mathematics which is time-consuming. Findings: Zhong's ECDSA is not secure. Additionally, the technique takes 13.28% less time to sign data than the suggested ECDSA method. Through proofs, it is shown by comparison of the proposed ECDSA and Zhong's ECDSA and cryptanalysis that the proposed ECDSA is more applicable in real time. Although Zhong's Method for Signature verification at the Receiver end takes 8.2% more time, the recommended technique stands out in comparison to Zhong's ECDSA w.r.t security. Novelty: The work is a detailed expression of the provablysecure attack-resistant lightweight digital signature based on elliptical curve for resource constrained applications. Advancing, the novelty of the work lies in the comparison of the two techniques w.r.t their performance parameters like number of keys generated, time taken to generate keys, number of keys verified, time taken for key verification, time taken for Signature generation and time taken for Signature verification.
International Journal on Electrical Engineering and Informatics
ICT Systems and Sustainability, 2022
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Music Album Management System is a fully functional, flexible and convenient application and a us... more Music Album Management System is a fully functional, flexible and convenient application and a user friendly interface which provides a good experience. This paper describes the phases of the design and development and emphasizes the system's functionality.
Passwords that were leaked or stolen from sites. The RockyouDataset is about 14 million passwords.
Advanced Toolkit For On Demand ADHOC Routing is a toolkit which can used to enhance existing tool... more Advanced Toolkit For On Demand ADHOC Routing is a toolkit which can used to enhance existing toolkits available for on demand routing protocols. The existing toolkits aid us with a virtual look and feel of working of the routing protocol. However the existing toolkits do not provide a platform for a better in depth understanding of existing protocol. We thereby intend to provide a more visionary approach to user for better understanding and development of wireless ADHOC routing protocol. This can be done by generating a TCL script. The generated TCL script will help user to understand the code in a better way by executing the same in NS2 simulator. INDEX TERMS: DSR(Dynamic Source Routing), AODV(ADHOC On-Demand Distance Vector), TCL(Tool Command Language), NS2(Network Simulator Version2).
2021 International Conference on Artificial Intelligence and Machine Vision (AIMV), 2021
Blockchain-based crowdfunding is one of the new, upcoming alternatives to the traditional central... more Blockchain-based crowdfunding is one of the new, upcoming alternatives to the traditional centralized approach to crowdfunding. Traditional crowdfunding platforms are vulnerable to data leaks, high transaction and platform fees, and rampant frauds which happens due to the anonymity of user’s identity i.e., users cannot be identified when they commit cybercrimes. As blockchain is immutable and decentralized, it can reduce the possibility of data breaches. This brings in transparency as there is no central authority over the blockchain-based crowdfunding system. This paper attempts to solve these existing issues with the aid of a digital identity management system with an underlying Blockchain system. By implementing blockchain in a digital identity management system, malicious users can be identified and action can be taken against them. This paper explores donation-based crowdfunding using Ethereum as a framework and has been tested on the Rinkeby Test Network. This system can conduct several crowdfunding campaigns simultaneously. This paper explains the smart contract written in Solidity language in detail.
the use of digital data has been increase over the past decade which has led to the evolution of ... more the use of digital data has been increase over the past decade which has led to the evolution of digital world. With this evolution the use of data such as text, images and other multimedia for communication purpose over network needs to be secured during transmission. Images been the most extensively used digital data throughout the world, there is a need for the security of images, so that the confidentiality, integrity and availability of the data is maintained. There is various cryptography techniques used for image security of which the asymmetric cryptography is most extensively used for securing data transmission. This paper discusses about Elliptic Curve Cryptography an asymmetric public key cryptography method for image transmission. With security it is also crucial to address the computational aspects of the cryptography methods used for securing images. The paper proposes an Image encryption and decryption method using ECC. Integrity of image transmission is achieved by u...
International Journal of Advanced engineering, Management and Science, 2016
An Ad hoc network in a wireless system consist of an autonomous system, without centralization wh... more An Ad hoc network in a wireless system consist of an autonomous system, without centralization which results forming of mobile nodes. In MANET, each node works in a dual form that consists of a router as well as hosts. These nodes configure dynamically and communicate using hop to hop. Due to its simplicity it is used in mobile conferencing, military communication. In MANET nodes can join and leave the network so MANET becomes vulnerable. Certain factors like dynamic network configures, distribution cooperation, open medium terrorized in routing which give rise to security issues. Once such protocol AODV has been a victim of security. In existing, MANET faces a severe problem known as the Black Hole problem. This Black hole problem is mostly found in reactive routing protocol called AODV.The black hole conducts its Malicious node during route discovery process. Black hole node is a severe threat in AODV protocol that easily employed and becomes vulnerable in MANET. In this paper var...
1Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India... more 1Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 2Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 3Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 4Associate Professor, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 5Assistant Professor, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The purpose of recommendation system is to apply multiple data processing techniques and prediction algorithms aimed to predict users’ interest on services, information and products. Today, they have become an unavoidable service in our day-to-day lives. The constant increase in the number of users of the system possesses few challenges like managing and handling a large amount o...
1Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra,... more 1Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 2Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 3Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 4Professor, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract In today’s fast moving, competitive world, a complimentary source of income for any individual, has become a necessity. In such adverse conditions, stock market trading proves to be one of the most appropriate, smart and reliable sources of income. One cannot trade without having a proper analysis and the background study of the respective stock. On the contrary, study of all stocks simultaneously becomes quite tedious an...
Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to sec... more Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to secure information in digital form. Elliptic Curve Cryptography (ECC) is favorable over numerous cryptographic systems because of smaller keys and quick key generation. This paper proposes a system which intends to provide multifold security in text based communication. The system has two main modules: encryption, and decryption. Encoding scheme which works on variable length text block mapping technique has been exhibited, thereby enhancing data security provided by ECC in text based cryptosystems. To leverage the advantages of ECC, it is being used in many applications. This papers attempts to utilize ECC in text based cryptosystems efficiently. KeywordsECC, ASCII, Text based cryptosystem, variable length mapping, encoding. __________________________________________________*****_________________________________________________
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
The paper presents how we are involved in making Augmented Reality more interactive in the medica... more The paper presents how we are involved in making Augmented Reality more interactive in the medical sciences, thereby preserving the patient's safety and reducing the recovery time. Our main focus is on anatomy and detailing every stage of medical treatment, such as overlaying of X-rays objects, Training of healthcare workers and medical students in Anatomy. Anatomy is a field in medical science for studying the organized parts of living organisms, especially the human body.. This paper also describes our take on AR Rehab. Rehabilitation in medical treatment is crucial for recovery we tend to provide solutions to make the process more effective by Virtual Reality medication procedures for recovery and AR medication.
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
Technology has constantly kept on evolving since many years. This has helped in the growth of man... more Technology has constantly kept on evolving since many years. This has helped in the growth of many fields throughout the world. One such important field is Education. Different technologies have helped education to grow positively and help everyone learn and practice with ease and understanding. Technology has proven to be a useful aid in education, as it enables teaching methods to be eased and efficiency enhanced by incorporating economical and effective means of transmitting digital content. Researchers have shown us that Virtual Reality and Augmented Reality have great potential to support two types of users: students, on the one hand, increase productivity and from the other teachers, broaden their teaching techniques. Hence, it makes the experience of education and learning more effective and stimulating. Nonetheless, even for non-skilled developers, there is no specifically designed platform for the flexible creation of AR/VR content. There is therefore a need to develop new tools to allow users to easily become producers of such experiences.
2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, 2018
Digital signatures are replacing paper-based work to make life easier for customers and employees... more Digital signatures are replacing paper-based work to make life easier for customers and employees in various industries. We rigorously use RSA and Elliptic Curve Cryptography (ECC) for public key cryptographic algorithms. Nowadays ECDSA (Elliptical Curve Digital Signature Algorithm) gaining more popularity than the RSA algorithm because of the better performance of ECDSA over RSA. The main advantage of ECC over RSA is ECC provides the same level of security with less key size and overhead than RSA. This paper focuses on a brief review of the performance of ECDSA and RSA in various aspects like time, security and power. This review tells us about why ECC has become the latest trend in the present cryptographic scenario.