Page Length: 40

Size: 683 KB

Format: PDF & Word

5,000.00

ABSTRACT

 

This project implements cryptosystem, a proposed model for data encryption and decryption is considered, using the symmetric key algorithm of the advance encryption standard, which was implemented by C# programming language, a multi-paradigm programming languageencompassing  strong typing, imperative,  declarative,  functionalgenericobject-oriented (class-based), and  component- orientedprogramming disciplines that was developed by Microsoft within its .NET initiative was the tool used to achieve the design which is aimed to secure files, folders, data integrity and other computer  privacy.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

TABLE OF CONTENT

Title page        –           –           –           –           –           –           –           –           –           i

Approval page            –           –           –           –           –           –           –           –           iii

Dedication      –           –           –           –           –           –           –           –           –           iv

Declaration     –           –           –           –           –           –           –           –           –           v

Acknowledgement     –           –           –           –           –           –           –           –           vi

Abstract          –           –           –           –           –           –           –           –           –           vii

Table of content          –           –           –           –           –           –           –           –           viii

CHAPTER ONE

1.0       Background of Study-            –           –           –           –           –           –           –           1

1.1       Statement of problem –           –           –           –           –           –           –           2

1.2       Aim and objectives     –           –           –           –           –           –           –           3

1.3       Scope and limitation of study –           –           –           –           –           –           4

1.4       Justification of the study        –           –           –           –           –           –           4

1.5       Research Methodology           –           –           –           –           –           –           4

1.6       Definition of terms     –           –           –           –           –           –           –           4

CHAPTER TWO

2.0       Literature review         –           –           –           –           –           –           –           6

2.1       Cryptography  –           –           –           –           –           –           –           –           6

2.2       Cryptosystem     –           –           –           –           –           –           –           –           6

2.3       Early VS. Modern Cryptography-      –           –           –           –           –           7

2.4       Types ofCryptographic Algorithms    –           –           –           –           –           8

2.4.1    Public-KeyCryptography or AsymmetricKeyCryptography  –          8

2.4.2    Symmetric KeyCryptographyor SecretKeyCryptography      –          11

2.5       Advanced Encryption Standard         –           –           –           –           –           13

2.6       Variations Among Encryption Algorithms     –           –           –           –           13

2.7       Factors Influencing Encryption Product Selection     –           –           –           14

2.8       Data Security  –           –           –           –           –           –           –           –           15

 

CHAPTER THREE

3.0.      Methodology  –           –           –           –           –           –           –           –           17

3.1       Data Capture Method –           –           –           –           –           –           –           18

3.2       Analysis of Existing System               –           –           –           –           –           19

3.2.1    Disadvantage of the Existing System –           –           –           –           –           19

3.3       The Proposed System-            –           –           –           –           –           –           20

3.3.1    System Block Diagram-          –           –           –           –           –           –           21

3.4       System Design-           –           –           –           –           –           –           –           22

3.4.1    Output design –           –           –           –           –           –           –           –           23

3.4.2    Input design    –           –           –           –           –           –           –           –           24

3.4.3    System Flowchart       –           –           –           –           –           –           –           25

3.5       Algorithm        –           –           –           –           –           –           –           –           26

 

CHAPTER FOUR

4.0       System implementation           –           –           –           –           –           –           28

4.1       System testing –           –           –           –           –           –           –           –           29

4.2       System requirement    –           –           –           –           –           –           –           30

4.2.1    Hardware requirements           –           –           –           –           –           –           30

4.2.2    Software requirement –           –           –           –           –           –           –           30

4.3       Conversion method     –           –           –           –           –           –           –           31

4.4       Result  –           –           –           –           –           –           –           –           –           31

4.5       Discussion of Result   –           –           –           –           –           –           –           33

4.6       Documentation           –           –           –           –           –           –           –           33

4.6.1    User guide       –           –           –           –           –           –           –           –           34

CHAPTER FIVE

5.0       Summary, Conclusion and Recommendation –           –           –           –           35

5.1       Summary         –           –           –           –           –           –           –           –           35

5.2       Conclusion      –           –           –           –           –           –           –           –           35

5.3       Recommendations      –           –           –           –           –           –           –           36

References

Appendices

List of Tables

Table 1: Factors Influencing Encryption        –           –           –           –           –           14

List of Figures

Figure 1: Water Fall Model    –           –           –           –           –           –           –           17

Figure 2:ERD System Block Diagram           –           –           –           –           –           21

Figure 3: Output Design         –           –           –           –           –           –           –           23

Figure 4: Input Design            –           –           –           –           –           –           –           24

Figure 5. System Flowchart                –           –           –           –           –           –           25

Figure 6 Symmetric Key Cryptosystem         –           –           –           –           –           27

Figure 7: Use case UML of the Proposed System     –           –           –           –           28

Figure 8: Encrypted Result 1  –           –           –           –           –           –           –           31

Figure 9: Plaintext for Result Testing 1          –           –           –           –           –           32

Figure10: Encrypted Result 2 –           –           –           –           –           –           –           32

Figure 11: Plaintext for Result Testing 2        –           –           –           –           –           33

 

 

 

 

 

 

 

 

 

 

 

 

CHAPTER ONE: INTRODUCTION

  • Background of Study

Cryptosystem is one of the methods used to maintain security in data transmission. Along with the increase in importance, many methods are found and extended use. Among these methods are methods that only requires a simple mathematical operation, but there is also a method that involves the theory of complex and difficult implementation. Cryptographic methods are used to secure confidential data so that the data is not known to others who are not interested.

Acryptosystemgenerallyperformstwofunctions:encryption anddecryption. Encryption’s fundamental purpose is to ensure privacy and data integrity. Encryption involves converting datafromplaintext(ornormaltext)intociphertext, which makes data unintelligible to any unauthorizedparties.Decryptionreversestheencryptionprocess,restoringthedatatoitsoriginalform. Asystem’susermusthaveauniquekeyinordertosendorreceiveanencryptedmessage.Thestrength ofanencryptionsystemdependsbothuponthestrengthofitsalgorithmand,often,onthelength of the keys used for encryption and decryption. A key is a mathematical value used in conjunction with a cryptographic algorithm. Longer key lengths (that is, more digits) usually mean greater security because therearemorepossiblecombinationsforan unauthorized observer to examine.Ina symmetric (secret- key)cryptosystem,asinglekeyisusedtoperformbothencryptionanddecryption.Asymmetric (public-key) cryptosystems use different keys for encryption and decryption.

Cryptography is one of the methods used to maintain security in data transmission. Along with the increase in importance, many methods are found and extended use. Among these methods are methods that only requires a simple mathematical operation, but there is also a method that involves the theory of complex and difficult implementation.

 

However, in 2000, precisely in October Rijndael algorithm was selected as a standard algorithm for encryption. Rijndael algorithm is then known as the Advanced Encryption Standard (AES) Benaloh, (2009). The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible others can tap into and alter transmitted data as the number of users that many in a computer network. Therefore, the system of data security and confidentiality of data is one important aspect in the development of the world of telecommunications, especially communications and using computers connected to the network.

  • Statement of Problems

Data losses, regulatory compliance and peer pressure are pushing organizations to take action on encryption at a corporate level; many organizations are discovering that it is already being used in small user groups throughout the organization. It can seem that it might be easier to just add encryption to one workgroup, one data type at a time to cope data breaches happening around the organization. Studies suggest that the overwhelming majority of data breaches originate from inside the organization. New research indicates that as breaches occur more often, they also are getting increasingly costly: According to the study, data breach incidents cost great lost to the organization, including losses associated with customer churn and acquisition, represented the most significant component of the cost increase.

One of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. When you consider the millions of electronic messages that traverse the Internet each day, it is easy to see how a well-placed network sniffer might capture a wealth of information that users would not like to have disclosed to unintended readers. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of cryptography, to prevent intruders from being able to use the information that they capture.

  • Aim and Objectives

This project is aimed at designing a cryptosystem to secure files, folders and other computer resources, and the objectives are to:

  • Ensure communication confidentiality (the information cannot be understood by anyone for whom it was unintended)
  • Protect information integrity: the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected
  • Ensurenon-repudiation of message: the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information
  • Message Authentication: the sender and receiver can confirm each other’s identity and the origin/destination of the information

 

  • Scope and Limitation of Study

The study shall be limited to text encryption in a selected department namely Exams and record Department of The Federal Polytechnic Bauchi whom basically deal with  sensitive information that will not be allowed into the hand of a third party and in which altering will post great danger.

However, this project covers encryption of text records handled in the exams and record department of Federal Polytechnic Bauchi.Information this department deals with are very classified information that hold a lot about the participation of students that has gone through one discipline or other in the school that will be referenced in time to come.

  • Justification of Study

On completion of this project, through better understanding of information security and development of a cryptosystem, computer software that shall help to maintain security in data transmission shall be designed and hence improve effectively, confidential and authentic communicate within the department.

  • Research Methodology

The methods used for gathering information for this project work were by research, interview, consulting relevant text books, surfing the internet e.t.c which lead to better understanding of the project and its implementation. The program will be developed using visualstudio.net programming language.

  • Definition of Terms
  1. Plaintext:Thisistheoriginalintelligible messageordatathatisfedto thealgorithmasinput.
  2. Encryptionalgorithm:Theencryptionalgorithm performsvarioussubstitutionsandpermutationsontheplaintext
  3. SecretKey:The secretkeyisalsoinput to theencryptionalgorithm. The exactsubstitutionsandpermutationsperformeddependonthekey used.
  4. Ciphertext:This isthescrambledmessageproducedasoutput. It depends ontheplaintextand the key. The ciphertextisanapparently randomstreamofdata, asitstands, isunintelligible.
  5. DecryptionAlgorithm: Thisisessentially the encryptionalgorithm runinreverse.  Ittakes theciphertextandthesecretkeyandproduces theoriginalplaintext
  6. Symmetric Algorithms: Where the key is used for encryption and decryption keys arethe same.
  7. Asymmetric Algorithm: This algorithm is an algorithm where the encryption key usedis not the same as the decryption key.

 

 

DOWNLOAD COMPLETE WORK

DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.

WeCreativez WhatsApp Support
Administrator (Online)
Hello and welcome. I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.