-
Design And Construction Of File Encryption System
CHAPTER ONE -- [Total Page(s) 4]
Page 3 of 4
-
-
-
• To ensure that illegal alterations to personal or confidential information is greatly reduced.
1.3 Significance of the Study
Some of the significance of this project research is explained below as data/files encryption and decryption is very essential in the life of an individual, ICT researchers, ICT companies and non – ICT companies. The various significance of this research work is explained below: The importance of the encryption techniques for large and growing sectors of the society is fundamental. The use of encryption is as important for the storage and use of information as it is for data and telecommunication. In order to secure the necessary legal, evidentiary function of digital information as we go away from the use of physical documents, strong cryptographic techniques are required. The importance of encryption in file transfer applications will increase substantially in the coming years in place with the growing traffic on publicly available networks, like the internet as they continue to increase in size; Files or documents are well protected on a network with the existence of Encryption algorithm embedded in the application. Private persons, companies, government agencies and other organisations use cryptography techniques in order to safely communicate with partners, customers, etc, but also in order to increase security in their own internal processes; to protect stored information, and communicate with employees who are geographically distributed or work from a distance. By using encryption for communication over open and publicly accessible networks, information/data can be transferred from the sender to receiver without unauthorized interpretation (data integrity).
1.4 Scope of the study
The scope of this project is essentially centred on incorporating encryption and decryption algorithms into data communication which entails encryption and decryption enabled files transfer applications and generally securing data against illegal access or transfer or file sharing systems. This project is a security application program on a network or popularly referred to as security “socket programmingâ€. It explores data or file encryption, socket programming, cryptography, local area network (LAN), Bluetooth connection, wireless, wireless connection, IP addressing and port numbering.
1.5 Definition of terms
i. Data: Information in raw form or unorganized form such as alphabets, numbers, or symbols that refer to or represent condition, ideas or object.
ii. Database: A systematically organized or repository of indexed information usually a group of linked data files that allows easy retrieval, updating, analysis and output of a data usually stored in a computer.
iii. File: Is a collection of data stored in one unit, identified by a Filename. It can be a document, picture, audio or video stream, data library, application or other collection of data.
iv. Encryption: Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (cipher text). Decryption is the process of converting cipher text back to plaintext.
v. Decryption: Decryption is the process of converting cipher text back to plaintext.
vi. Plain-text: Plain-text is any text that is still in its readable format or that has been converted from cipher-text back to plain text as a result of Decryption.
vii. Cipher-text: Cipher-text is the text which has been converted to the format that cannot be read as a result of encrypting the text.
viii. Firewall: Set of related networks located at a network gateway server that protects the resources of a private network from users from other networks.
CHAPTER ONE -- [Total Page(s) 4]
Page 3 of 4
-
-
ABSRACT - [ Total Page(s): 1 ]ABSTRACTIt is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a message ... Continue reading---