Download complete project on Designing And Implemention Of Security Software Using Cryptography Method from chapter one to five
ABSTRACT
PASS 2024 UTME WITHOUT STRESS:- π DOWNLOAD and PRACTICE with 2023 UTME CBT APP π±π
CLICK to DOWNLOAD NOW.:- π PASS Your POST UTME by Downloading Your School's Post UTME Past Questions and Answers π±π
It is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data.
When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a message βAccess is deniedβ will be displayed showing that such user is un-authorized. Package like Ms-Word, Ms- Excel, as well as slide are attached to the program for users to use and encrypt such file after saving.
File encryption is the process of translating plain text data into something meaningless (cipher text) while decryption is the reverse. Visual Basic programming language is used in designing this security program to protect file and data in order to achieve its aims and objectives.
CHAPTER ONE
INTRODUCTION
There are a number of methods for security measures to be attached to files or documents, these may include file password or file locking, data / file encryption and decryption, installation of antivirus, USB encryption, laptop encryption, firewall, password encryption, database encryption, disk encryption for data etc.
Since the use of the computer is so wide and data or file security is very important, an important concept to note is that data or file encryption is one of the best security measures and can be incorporated into systems that participate in data or file transfer and sharing to allow for privacy. This is because it places security measure on the system on the data itself.
Applications need to have a way of encrypting data or documents before sending to the recipient(s) at the receiving end, and the recipient should also be able to have a means to decrypt or unlock the encrypted message being sent. This is made possible by using a unique pass code (key or password) for both the encryption and the decryption processes.
Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (cipher text). Decryption is the process of converting cipher text back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used because it renders main security goals which are privacy and authenticity of the communicated data.
A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of cipher text, the key that was used to encrypt the data must be used.
1.0 Background of the Study
Due to insecurities in files and data, many researchers over the years in the ICT fields have carried out numerous researches in files/data encryption and decryption. They have encrypted and decrypted files using both private and public keys and even other minor methods when sending or receiving files on the internet.
Public keys data encryption and decryption method and other minor methods have been found out to be slow and not suitable for large ranges of data/files as a result most researchers have recommended files/data encryption and decryption using the symmetric β key type (private key) of data encryption and decryption.
The method to be used for data encryption and decryption is cryptography. Cryptography is therefore the science of using mathematics to encrypt and decrypt information. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet) so that it cannot be read by anyone except the intended recipient.
Cipher algorithm will be used, which can be defined thus: A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key (a number, word, or phrase) to encrypt and decrypt data.
To encrypt, the algorithm mathematically combines the information to be protected with a supplied key. The result of this combination is the encrypted data. To decrypt, the algorithm performs a calculation combining the encrypted data with a supplied key. The result of this combination is the decrypted data. If either the key or the data is modified, the algorithm produces a different result.
The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated cipher text without using the key. If a really good encryption algorithm is used, then there is no technique significantly better than methodically trying every possible key. Even for a key size of just 40 bits, this works out to 2Λ40 (just over 1 trillion) possible keys.
1.1 Statement of the Problem
A lot of problems are always being encountered during the process of data or file transfer and sharing and even chatting or sending Email among clients or server-to client on a network. The problem arises as a result of data or file insecurity over a network.
Since the data or file can be transferred or shared among clients or users on a network, some protocols are being breached which leads some clients or users to having or gaining access to data or file/document they are not supposed to.
Because of these problems, this then calls for a research to address the problems on file insecurities using cryptographic algorithm or cipher. These problems can be tackled by joint efforts of software programmers, analysts and researchers in ICT field.
1.2 Aim and Objectives Of the study
This project is aimed at designing and implementing security software using cryptography method (process in which plain text is converted to cipher text (encrypted text) which uses a key that is known to both sender and receiver and a process in which cipher text is converted to plain text (decrypted text)). It would be developed for individuals or organisations that need to secure their files and other document.
CLICK HERE TO DOWNLOAD THE COMPLETE MATERIAL (CHAPTER 1 -5)
>GUARANTTEE|:| Score 280 Above in 2024 UTMEπ DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTMEπ DOWNLOAD FREE JAMB CBT APP HERE π±πWISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894