DESIGN AND IMPLEMENTATION OF FILE ENCRYPTION AND HASH SYSTEM

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0659
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 65 Pages
  • Format: Microsoft Word
  • Views: 1.5K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

DESIGN AND IMPLEMENTATION OF FILE ENCRYPTION AND HASH SYSTEM

CHAPTER ONE

INTRODUCTION

1.O    BACKGROUND OF THE STUDY

The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is a valuable and costly asset that must be presented, controlled and planned just like other valuable assets within an organization. This work is designed to provide a security mechanism using a computerized data encryption system, readable data is altered into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concept to create coded message that is virtually impossible to break. It is easy to encrypt a message on a simple personal computer so that the biggest computer in the world could not decipher without spending for more time on the problem that exists in the life span of the entire universe.

There are two basic forms of encryption; private key encryption and public key encryption, the same secret key is used by the sender and receiver to encrypt and decrypt message. Public key encryption also known as asymmetric key encryption uses two different keys at once, a combination of a private key and public key, the private key is known only to your personal computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.

1.1            STATEMENT OF THE PROBLEM

Security is currently a widespread and growing concern that affects all areas of the society, in the same manner data and information security has become one of the most pressing challenges confronting all kinds of present day organizations owing to their rapid adoption of information technology (IT) in the entirety of their activities. This development has made data and information to a larger extend vulnerable to unauthorized users, spammers, crawlers and hackers who break into people’s and organization’s privacy. This has no doubt posed greater challenges on people who use database, share files and other resources on computer networks.

1.2            AIMS AND OBJECTIVES

The aims and objectives of this work are as follows:

·                    Reduce stress, time consumption and cost of operation involved in a manual security system.

·                    Develop a software system that will restrict unauthorized access to data files on systems.

·                    Suggest security techniques which can create conducive working atmosphere for organizations that are having their data threatened.

·                    Enhance key sharing mechanism that allows users to share and have access to files security.

1.3            SIGNIFICANCE OF THE STUDY

This study serves as a contribution towards improving information, data and information security on computerized information systems especially for organizations where data is transferred from one point to another. It will contribute in solving the problems of insecurity on both network for individual computers on a network. It also enhances the ability to support customers by providing secured and accurate access to all information. In the same manner, it will benefit those who transact online.

1.4            SCOPE AND LIMITATIONS

This work is only concerned with security of information (encryption and decryption) for firms and individuals. It does not consider the firms policies and other issues.

1.5            JUSTIFICATION OF THE NEW SYSTEM

With regards to existing system, it is important for organization to develop a new system. This system will be designed with security as its watchword. It will be able to check access to the system. It will provide improved system efficiency, the unintentional distortion of data will be avoided and fraudulent practices and defaulters will be checked.

1.6            DEFINITION OF TERMS

·                    Data: data is the raw fact or observation, typically about physical entity or business transactions. Technically, data is the raw form of information stored as columns and rows in our databases, network servers and personal computers.

·                    Data security: This is the practice of keeping data protected from corruption and unauthorized access. The focus behind  data security is to ensure privacy while protecting personal or corporate data.

·                    Information: This refers to data that has been processed in such a way to be meaningful to the person who receives it.

·                    Cryptography: This is the science of scrambling data.

·                    Encryption: encryption is the conversion of data into a form that cannot be easily understood by an unauthorized people.

·                    Decryption: Decryption is the process of converting encrypted data back into its original form, so it can be understood.

·                    Cipher text: this is the encrypted data; it is also called a cipher.

·                    Decipher text: This is the decrypted data; it is also called a plain text.

DESIGN AND IMPLEMENTATION OF FILE ENCRYPTION AND HASH SYSTEM
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0659
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 65 Pages
  • Format: Microsoft Word
  • Views: 1.5K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0659
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 65 Pages
    Format Microsoft Word

    Related Works

    CHAPTER ONE 1.0. Introduction Due to increasing use of computers, security of digital information is most important issue. An Intruder is an unwanted person who reads and changes the information while transmission occurs. This activity of intruder is called intrusion attack. To avoid such attack data may be encrypted to some formats that is... Continue Reading
    CHAPTER ONE 1.0   INTRODUCTION In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets. Hard drives and floppy disks hold many of our secret... Continue Reading
    CHAPTER ONE 1.0        INTRODUCTION In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets. Hard drives and floppy disks hold many of our... Continue Reading
    DESIGN AND IMPLEMENTATION COMPUTERIZED DATA ENCRYPTION SYSTEM TABLE OF CONTENT Cover page Title page Approval page Dedication Acknowledgment Table of content Abstract CHAPTER ONE 1.0 Introduction 1.1 Background of the research 1.2 Statement of research problem 1.3 Objectives of the study 1.4 Significance of the study 1.5 Scope of the study 1.6... Continue Reading
    ABSTRACT Ex-convict can be defined as someone that uses to be in prison, someone that has  being convicted for a particular crime. Online ex-convict file maintenance system  is an online system developed to manage and maintain the records of an ex-convict  individual. This software will enhance the proper and accurate, management and ... Continue Reading
    ABSTRACT Ex-convict can be defined as someone that uses to be in prison, someone that has being convicted for a particular crime. Online ex-convict file maintenance system is an online system developed to manage and maintain the records of an ex-convict individual. This software will enhance the proper and accurate, management and maintenance of... Continue Reading
    In the operation of Nigeria National Drug Law Enforcement Agency (NDLEA) crime cases are documented on paper documents which has unavoidably increased the amount of paper documents in the office and which can be easily destroyed by water spillage and fire hazards. However, the electronic form of the documentation has the potentials of eliminating... Continue Reading
    DESIGN AND IMPLEMENTATION OF A FILE SHARING APPLICATION FOR ANDROID  ABSTRACT Over the last few years, there has been a drastic change in information technology.  This includes the various ways in which files can be shared and stored. Cloud computing is publicized as the next major step for all forms of typical information technology... Continue Reading
    ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the... Continue Reading
    ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the... Continue Reading
    Call Us
    whatsappWhatsApp Us