TACKLING INSURGENCY USING CRYPTOGRAPHY

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0717
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 55 Pages
  • Methodology: nil
  • Reference: YES
  • Format: Microsoft Word
  • Views: 890
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

TACKLING INSURGENCY USING CRYPTOGRAPHY

CHAPTER ONE

INTRODUCTION

1.0           BACKGROUND OF THE STUDY

Communication is an essential key during military conflict. Information concerning the status of their adversary is of great demand and is been passed across either by cell phone, e-mail, fax and etc. This information can be accessed by insurgents if not secured and the country’s information can be exposed. Therefore, information security is of great importance to prevent loss of useful information.

Insurgency can be defined as a rebellious movement against an existing government with the aim of overthrowing the government through the use of subversion and armed conflict. One major way insurgents penetrate into a country is by gathering information therefore to tackle insurgency; information has to be secured through the use of cryptography. This method has been used to secure communications over the years.

Cryptography is the science of encrypting secret messages and transmitting the message from a sender to the receiver. The sent message can only be decoded by the receiver who has access to the software and must also know the password and encryption key to ensure high rate of security.

1.1           STATEMENT OF THE PROBLEM

Insurgency has really caused destruction, poverty and many individuals have lost their life during this period. Insurgency has become the order of the day; people no longer live peacefully in their homes as a result of fear. In recent time, technologies has grown wide, information can be accessed by different people anywhere and at anytime. 

One major challenge in our present world is that communications are not secured. If an attempt is made to transmit a message over a public or private channel and it gets to a wrong hand (an adversary: someone who sees all communications occurring on the channel.) the message would be exposed, tampered with or lost. 

Therefore the use of cryptography is a very important issue in this present time to avoid data lost and access by other people.

1.2           MOTIVATION OF THE STUDY

Insurgency has brought about destruction, poverty and has endangered so many people’s lives. One major way insurgents penetrate into a country is by gathering essential information about the country before setting their operations. They gather information so as to know how and when to push through with their plans.

Insurgency has really caused hazard and fear amongst every citizen in the country: which is actually the motivation behind this study.

1.3           AIM AND OBJECTIVES

The aim of this work is to develop a system which is responsible for encoding and decoding secret messages against insurgents. The system will be developed in such a way that only the user can have access to it and this will be done by the use of a password to ensure high rate of security.

Its objectives include;

                         i.                  To Prevent insurgents from monitoring secret messages in a country

                       ii.                  To secure information from access.

                    iii.                  To prevent insurgents from having access to essential information about a country.

1.4           SIGNIFICANCE OF THE STUDY

The primary goal of this work is to encrypt user’s data and provide a security mechanism. Therefore the significant of this study includes:

1.                 To develop a system that will serve as a means of sending information and secured.

2.                 The developed system will help the armed-force send secret messages.

3.                 The system will also be used to hide useful data.

4.                 This method of sending secret messages will help tackle the fear of insurgents.

1.5           SCOPE OF THE STUDY

This work is basically concerned with the tackling of insurgency by securing information through the use of cryptography. It focuses on data secrecy and integrity, which is to ensure that only those authorized will have access to it.

This work does not go deeply into discussing how insurgents operate in a country. The system will be designed using hash function SHA 256.

1.6           DEFINITION OF TERMS

·        Adversary: an opponent.

·        Conflict: a violent situation between different people.

·        Decryption: to change information that is in code into ordinary language so that it can be understood by anyone.

·        Encryption: To put information into a special code especially in order to prevent people from looking at it without authority.

·        Information: a comprehensive detail about something.

·        Insurgents: group of people rising against an authority.

·        Integrity: maintaining and assuring that data can only be modified by those authorized to do that.

·        Password: a confidential word or phrase.

·        Rebellious: to oppose to the government of a country.

·        Secrecy: making sure that nothing is known about something that is being secret.

·        Security: the act of protecting a country or something from people.

·        Subversion: an act of attacking the authority of a system secretly or indirectly.       

·        Tackling: a process of dealing with a difficult problem or situation.

TACKLING INSURGENCY USING CRYPTOGRAPHY
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0717
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 55 Pages
  • Methodology: nil
  • Reference: YES
  • Format: Microsoft Word
  • Views: 890
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0717
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 55 Pages
    Methodology nil
    Reference YES
    Format Microsoft Word

    Related Works

    ABSTRACT It is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user... Continue Reading
    ABSTRACT Information Technology (IT) is the bedrock for rapid development in a nation, and challenges us to devise bold and courageous initiatives to address a host of vital socio-economic issues such as national security, reliable infrastructure, skilled human resources, open... Continue Reading
    ABSTRACT This study examined the impact of integrated personnel payroll and information system in tackling fund mis-management in Nigeria public service. Primary source of data was used with questionnaires administered to internal audit department of Corporate affair commission Ogo Oluwa Osogbo and Federal polytechnic Ede Osun State. The data were... Continue Reading
    Version:0.9 StartHTML:0000000105 EndHTML:0000005387 StartFragment:0000000141 EndFragment:0000005347 The rate of maternal mortality in the recent time is so alarming due to weak health systems, poor  doctor-patient relationship, and non-existence of e-health management system to efficiently  maintain, handle the patient’s record and schedule... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    (A CASE STUDY OF BORNO AND OTHER STATES) ABSTRACT The study investigated effects of insurgency on universal basic education in Borno state and other states in Nigeria. Basic education is the first level of education for children at primary 1 level to basic 9 which is the Junior Secondary School level in... Continue Reading
    ABSTRACT The study investigated effects of insurgency on universal basic education in Borno state and other states in Nigeria. Basic education is the first level of education for children at primary 1 level to basic 9 which is the Junior Secondary School level in Nigeria. However, achieving education for all Nigeria children, Borno state need a... Continue Reading
    TABLE OF CONTENT Title page Approval page Dedication Acknowledgment Abstract Table of content CHAPTER ONE –INTRODUCTION 1.1    Background of the study 1.2    Statement of the problem 1.3    Objectives of the study 1.4    Research questions 1.5    Hypotheses of the study... Continue Reading
    Objective of the study The main thrust of this study is to establish the following significance: - i. To ascertain ideology and fundings as the fundamental factor that propelled terrorism in Nigeria. ii. To find out if Boko Haram crisis poses a threat to Nigerian‟s economy. iii. To explore whether the military option is the possible solution in... Continue Reading
                     WAR AGAINST TERRORISM; NIGERIAN DIPLOMATIC DIMENSION AGAINST BOKO HARAM  INSURGENCY ABSTRACT The research provides an  appraisal of the war against terrorism with a focus on Nigerian diplomatic dimension  against book haram insurgency . The effect of the boko haram  insurgency has in recent times constituted a serious... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us