ENCRYPTION AND DECRYPTION TECHNIQUES FOR SECURING COMMMUNICATIOIN IN A NETWORK USING SYMMETRIC ALGORITHM

  • Chapters:5
  • Pages:60
  • Methodology:Nil
  • Reference:YES
  • Format:Microsoft Word
(Computer Science)

ENCRYPTION AND DECRYPTION TECHNIQUES FOR SECURING COMMMUNICATIOIN IN A NETWORK USING SYMMETRIC ALGORITHM

ABSTRACT
Often there has been a need to protect information from 'prying eyes'. In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals. Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personal freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going against the wishes of those who attempt to control. The project work attempts to solve the problem of data security in organizations, schools etc. using a cryptographic method called encryption/decryption. Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. Decryption is the process of converting encrypted data back into its original form, so it can be understood.

TABLE OF CONTENT
CHAPTER ONE    
1.1    Introduction        -    -    -    
1.2    Objectives of the study        -    -    -
1.3    Significance of the Study        -    -    
1.4    Scope of Study    -    -    -    -    -    -
1.5    Limitation of study        -    -    -    
CHAPTER TWO
2.1    Literature Review    -    -    -    -    
2.2    Early vs Modern Cryptography    -    -    -
2.3    Forms of Cryptosystems     -    -    -    -
2.4    Overall Trends in the Research    -    -    -    
2.5    The Proposed System    -    -    -
2.6    System Methodology        -    -
2.6.1    Extreme Programming (XP) Methodology    -    -
2.6.2    XP Core Practices    -    -    
2.6.3    Reasons for Choosing Extreme Programming (XP)    -
2.7    Justification of Study    -    -    -    -
CHAPTER THREE
3.1     System Analysis    -    -    -    
3.2    Existing System    -    -    -    -
3.3    Proposed System    -    -    -    -
3.4    System Design    -    -    -    -    
3.5     Logical Situation    -    -    -    -    
3.6    Algorithm of the Application    -    -    -    
3.7    Overall Flowchart    -    -    
3.8     Class Diagram        -    -    -    
3.9    Security Consideration    -    -    -
3.10    Input Design    -    -    -    -    -    
3.11     Output Design        -    
3.12    Database Specification    -    -    
3.13    Choice of Programming Language    -    
CHAPTER FOUR
4.1    System Requirement    -    
4.2    System Installation    -    -    -
4.3    System Documentation    -    -    -    
4.4    User Training    -    -    -    -
4.5    System Development    -    -    -    -
4.6    Implementation    -    -
4.7    Program Testing    -    -    -    
4.7.1    Desk Checking    -    -    -    -    -
4.7.2    Alpha Testing    -    -    -    -
4.7.3    Beta Testing    -    -    -    -
4.8    System Conversion    -    -    -    
4.8.1    Pilot Conversion    -    -    -
4.8.2    Phased Conversion    -    -    -
4.8.3    Parallel Conversion    -    -    -    
4.9    Recovering Security     -    -    -    
4.10    Usability Documentation & Procedure    -    -
4.11    Quality Assurance     -    -    
CHAPTER FIVE
5.1    Summary    -    -    -    -    -
5.2    Conclusion    -    -    -    -    
    Reference    -    -    -    -    -
     APPENDIX     -    -    -    -    
CHAPTER ONE
1.1    INTRODUCTION
In today's world where much of our personal information and financial transactions are processed via the Internet, data encryption is an essential element to any effective computer security system. This activity is why encryption is important. One of the main reasons why encryption is important has to deal with the way information is sent via the Internet. Keeping your personal data secure when using a personal computer may not be as simple as you think. Any time that you send information across the Internet, it can be viewed by just about anyone that would want to see it. The data is first sent to your local network (the same network that is used by other people who live in your area).  The information then travels to your Internet service provider, who can view this information. Your data then travels along a variety of routes to reach the Internet service provider for the party that is supposed to receive your information. Finally, the person who your information was intended for finally receives it. During this process, numerous people could possible obtain access to the information that you are sending. So you can see why encryption is important and it is vital to have an encryption system in place. You may feel that your computer is sufficiently protected with the router that you are operating behind. Think again. Another reason why encryption is important is the fact that any other computer in your home or even your laptop can be infected with a virus that can be passed directly back to your PC the minute these other devices are plugged in to your home network. The use of Internet services that are available in hotels and coffee shops are not as secure as you may think they are, leading to another good reason as to why encryption is important. These types of Internet systems are set up to protect all the customers that are using this form of communication from outsiders, but they do not protect the customers from each other. Anyone that is using the same service in one of these locations can view your information while you are working on it. Why encryption is important has to do with the way that these security systems work. The encryption programs will disguise your data, making access to it impossible without the use of a personal password. There are two different types of these security systems-the hardware version and the software version. Each of these encryption systems has its advantages as well as its disadvantages. If you pass a large amount of your communications and personal information across the Internet , you should protect yourself from unauthorized persons from having access to this data. That is why data encryption is important.

1.2    Objectives of the study
Sending sensitive messages and files over the Internet/network is dangerous as all emails are transmitted in an unsecured form. The objective of this project is to provide a secured approach to perform file transfers and messages over a network.

1.3    Significance of the Study
•    The most important reason for using encryption is to preserve confidentiality. This means that only an authorized receiver can read the message (the receiver must have the appropriate decryption key).
•    Transaction Security
Most web sites use SSL (Secure Sockets Layer) to encrypt customer credit cards during an on-line transaction so they cannot be intercepted by attackers. SSL uses a public and private key system to create a secure link between a customer and web site, protecting the transaction against attack.
Most web site transaction systems and shopping cart software offer SSL as standard, and most browsers support it.
•    Post-Transaction Security.
Credit cards are not just vulnerable during a transaction; they can be just as vulnerable, to employees and hackers, if they are stored without encryption on unsecured computers. Encryption is increasingly being used by small businesses to protect credit cards that are stored after a transaction, so these cards are still protected even if an intruder manages to breach security.
•    Securing Confidential Files
While passwords are often a good protection for sensitive files, they may not be enough to protect a company’s most sensitive information. Encryption offers an added layer of security, protecting against the risks often created by poor password management. There are numerous low-cost packages available that will provide desktop encryption to protect files on a hard drive.
•    E-mail Security
As soon as a user clicks SEND on an e-mail, that e-mail becomes public property. Not only can it be intercepted, it can also remain on all the servers it passed through, for months if not years.
Encryption is therefore important to prevent sensitive e-mails and their attachments from being read by the wrong people.
There are a number of low-cost e-mail encryption packages on the market, such as ZixMail, that will enable a recipient to decrypt an encrypted e-mail even if they don’t use an encryption product. These products are convenient, easy to use, and affordable, and should be used regularly in any business.
•    VPNs
Virtual Private Networks, or VPNs, provide an affordable way for employees to access company networks from remote locations. But they can be highly vulnerable to attacks by hackers unless they use an encryption-based security protocol call IPsec.
The Internet Protocol Security Standard uses encryption to help protect data exchanged over a VPN connection, and provide the network with a secure way to authenticate the user’s identity.
•    Wireless LANs
Wireless local area networks have soared in popularity in the last few years, mainly because of convenience and cost savings. The basic security in wireless LANs is WEP, or Wired Equivalent Privacy, and although it’s been heavily criticized for a number of major flaws, this encryption-based security system does help to give wireless LANs some basic protection against eavesdropping.
1.4    Scope of the Study
The scope is to create a secured network file sharing and management application over a Network

Share This

Project Details

Department Computer Science
Project ID CPU0223
Price ₦3,000 ($9)
Chapters 5 Chapters
No of Pages 60 Pages
Methodology Nil
Reference YES
Format Microsoft Word

500
Leave a comment...

    Project Details

    Department Computer Science
    Project ID CPU0223
    Price ₦3,000 ($9)
    Chapters 5 Chapters
    No of Pages 60 Pages
    Methodology Nil
    Reference YES
    Format Microsoft Word

    Related Project Topics

    ABSTRACT The study examined sales promotion as a persuasive activity hence is the direct and indirect... Continue Reading
    • Type:Project
    • ID:MKT0215
    • Department:Marketing
    • Pages:55
    • Chapters:5
    • Methodology:Simple Percentage
    • Reference:YES
    ABSTRACT In the 21st century, every aspect of life has become digitalized, virtually everything is been done through the use of computers. In the medical sector the record system has upgraded from... Continue Reading
    ABSTRACT The study examined the role of social network in marketing health product. The study specifically aimed at identifying the relationship between social media used by health personnel to advertise their products, finding out if... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in... Continue Reading
    (A CASE STUDY OF ONITSHA METROPOLIS) ABSTRACT Advertising is known as the process of making things known to people and it is considered as non-personal communication of information usually through most persuasive media of... Continue Reading
    : (A CASE STUDY OF ONITSHA METROPOLIS) ABSTRACT Advertising is known as the process of making things known to people and it is considered as non-personal communication of information usually through most persuasive media of... Continue Reading
    ABSTRACT This study is motivated by a desire to examine IFRS Adoption: The Role of Network Effect and Legal System. In light of the empirical review and other discussions, a number of questions arose as to whether there is relationship... Continue Reading
    • Type:Project
    • ID:ACC0817
    • Department:Accounting
    • Pages:124
    • Chapters:5
    • Methodology:Ordinary Least Square
    • Reference:YES
    SALES PROMOTION IN INCREASEING THE LEVELS OF NETWORK PATRONAGE IN THE TELECOMS INDUSTRY IN NIGERIA. ABSTRACT The basis aims of every business, organization are survival and profitability. Based on the above, survival profitability and growth of a business organization depends on the rate at which... Continue Reading
    • Type:Project
    • ID:MKT0255
    • Department:Marketing
    • Pages:53
    • Chapters:5
    • Methodology:Simple Percentage
    • Reference:YES
    ABSTRACT Computer image is the acquisition, processing and display of using computers. The main purpose of this project is to design software of image transferring in a wide area network. It studies visual... Continue Reading