+234 8146561114 (MTN) or
+2347015391124 (AIRTEL)

ENCRYPTION AND DECRYPTION

 

ABSTRACT

LAN encryption is used to secure your wireless network with an authentication protocol that requires a password or network key when a user or device tries to connect. If your wireless network is not secured with some type of encryption, unauthorized users could access your network and obtain personal information or use your Internet connection for malicious or illegal activity. Also, your network speed or performance may decrease if people are using your network without your knowledge. The process of encryption hides data or the contents of a message in such a way that the original information can be recovered through a corresponding decryption process. Encryption and decryption are common techniques in cryptography, the scientific discipline behind secure communications. Many different encryption / decryption processes or algorithms exist. It turns out that in cryptography, it's very difficult to keep the logic of an algorithm truly secret. Especially on the Internet, it's generally much easier to use well-known public algorithms, and rely on alternative forms of protection.This project comes into use when we want the data communication to be protected from others. During war times, when a particular base wants to send a message to remotely located units which belong to the same army, in between any third party can trap the data when it is transmitted in wires or wireless. The essence of this project comes into this particular scene of the military world. Our project protects the data from strangers. This is achieved by incorporating a new wireless network system in which data is code modulated and then encrypted to get an encoded version of the data to be transmitted.   A given encryption algorithm takes the original message, and a key, and alters the original message mathematically based on the key's bits to create a new encrypted message. Likewise, a decryption algorithm takes an encrypted message and restores it to its original form using one or more keys. Some cryptographic algorithms use a single key for both encryption and decryption. Such a key must be kept secret; otherwise, anyone who had knowledge of the key used to send a message could supply that key to the decryption algorithm to read that message. Other algorithms use one key for encryption and a second, different key for decryption. In this case the encryption key can remain public, because without knowledge of the decryption key, messages cannot be read.

 

 

 

TABLE OF CONTENT
COVER PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
TABLE OF CONTENT

CHAPTER ONE

  1. INTRODUCTION
    1. OBJECTIVE OF THE STUDY
    2. PURPOSE OF THE STUDY
    3. SCOPE OF THE STUDY
    4. DIFFERENCE BETWEEN ENCRYPTION AND DECRYPTION

CHAPTER TWO
2.0 LITERATURE REVIEW

CHAPTER THREE

3.1 LAN SECURITY SOLUTION
3.2 DETECTING AND RESPONDING TO INTRUDERS
3.3 COUNTRY SPECIFIC LAW
3.4 LAN ENCRYPTION
3.5 TYPES OF ENCRYPTION
3.6 ENCRYPTION AND DECRYPTION ALGORITHM
3.7 BACKGROUND OF ENCRYPTION AND DECRYPTION ALGORITHM 
3.8 TYPES OF CRYPTOGRAPHIC ALGORITHMS
3.9 SYMMETRIC KEY CRYPTOGRAPHY

CHAPTER FOUR

4.1 CIPHER
4.2 CODE (CRYPTOGRAGHY)
4.3 HISTORICAL
4.4 MODERN OF ENCRYPTION
4.5 DIFFERENCE BETWEEN SYMMETRIC AND ASYMMETRIC KEYS

CHAPTER FIVE

5.1 KEY MANGEMENT
5.2 TYPES OF KEY
5.3 KEY EXCHANGE
5.4 KEY STORAGE
5.5 KEY USE
5.6 PUBLIC KEY INFRASTRUCTURE (PKI)
5.7 ENTERPRISE KEY AND CERTIFICATE MANAGEMENT (EKCM)
5.8 MULTICAST GROUP KEY MANAGEMENT
5.9 CHALLENGES OF KEY MANAGEMENT

CHAPTER SIX

6.1 CONCLUSION
6.2 REFERENCES

 

CHAPTER ONE
1.0 INTRODUCTION
Encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable cipher text. This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the cipher-text should not be able to determine anything about the original message. An authorized party, however, is able to decode the cipher text using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys.
There are two basic types of encryption schemes: Symmetric-key and public-key encryption. In symmetric-key schemes, the encryption and decryption keys are the same. Thus communicating parties must agree on a secret key before they wish to communicate. In public-key schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key and is capable of reading the encrypted messages. Public-key encryption is a relatively recent invention: historically, all encryption schemes have been symmetric-key (also called private-key) schemes.
Encryption has long been used by militaries and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage. Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) is another somewhat different example of using encryption on data at rest.
Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks.
Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication codes (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption.
One of the earliest public key encryption applications was called Pretty Good Privacy (PGP). It was written in 1991 by Phil Zimmermann and was purchased by Symantec in 2010.
Digital signature and encryption must be applied at message creation time (i.e. on the same device it has been composed) to avoid tampering. Otherwise any node between the sender and the encryption agent could potentially tamper it. It should be noted that encrypting at the time of creation only adds security if the encryption device itself has not been tampered with.

1.2                                         OBJECTIVE OF THE PROJECT
The main objective of our project is to encrypt/decrypt the multimedia files for personal and professional security. Encryption and Decryption protects privacy of our email messages, documents and sensitive files by encrypting them to provide high protection against unauthorized data access.
Every day hundreds and thousands of people interact electronically, whether it is through emails, e-commerce, etc. through internet. The Internet is comprised of millions of interconnected communication and transfer of information around the world. People use emails to correspond with one another .The www is used for online business, data distribution, marketing, research, learning and a myriad of other activities. Sending sensitive messages over the Internet is very dangerous as all emails are transmitted in an unsecured form and anybody - ISP, your boss, etc. can read your emails.
If you want to send sensitive information via email, simply paste the encrypted text into your email or attach the encrypted file, all the recipient has to do is to decrypt the text or file. Encryption and Decryption works with text information and files. Just select what you want to encrypt, and Encryption and Decryption software helps you keep documents, private information and files in a confidential way.


1.3                                              SCOPE OF THE PROJECT
The scope of our project is presently specific. Both the sender and the receiver must have this software installed on their systems to encrypt/decrypt and compress/decompress the files transmitted between them. This includes all the users who want to interact electronically, whether it is through emails, e-commerce, etc. through internet in order to keep their private information confidential.


1.4                                PURPOSE OF THE PROJECT
• Provides security
• File encryption
• Communication encryption
• Network traffic encryption
• Password manager
• Single sign-on


1.5             DIFFERENCE BETWEEN ENCRYPTION AND DECRYPTION
Encryption
Encryption is the process of converting readable data into unreadable characters to prevent unauthorized access. You treat encrypted data just like any other data. That is, you can store it or send it in an e-mail message. To read the data, the recipient must decrypt, or decipher, it into a readable form.
In the encryption process, the unencrypted, readable data is called plaintext. The encrypted (scrambled) data is called ciphertext. An encryption algorithm is a set of steps that can convert readable plaintext into unreadable ciphertext. Encryption programs typically use more than one encryption algorithm, along with an encryption key. An encryption key is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer. You also can purchase an encryption program, such as Pretty Good Privacy (PGP). A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender. Digital signatures often are used to ensure that an impostor is not participating in an Internet transaction. That is, digital signatures help to prevent e-mail forgery. A digital signature also can verify that the content of a message has not changed.
Many Web browsers and Web sites use encryption. A Web site that uses encryption techniques to secure its data is known as a secure site. Secure sites often use digital certificates. A digital certificate is a notice that guarantees a user or a Web site is legitimate. A certificate authority (CA) is an authorized person or a company that issues and verifies digital certificates. Users apply for a digital certificate from a CA. The digital certificate typically contains information such as the user’s name, the issuing CA’s name and signature, and the serial number of the certificate. The information in a digital certificate is encrypted.

Decryption
The Process of converting encoded/encrypted text into a form that is readable and understandable by humans or computers is known as Decryption. Decryption refers to the method of un-encrypting the text manually or by using codes and keys. Data is encrypted to safe information from stealing, and some major companies also encrypt data to keep their trade secrets secure. Then to view this data, you need to decrypt the data by using decryption process. You need to enter passphrase or key to view data and if you don’t have the key, you may need to decrypt this by using algorithms and cracking it.

 

 

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL

This material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We make abstract and chapter one visible for everyone.

All Project Topics on this site have complete 5(five) Chapters . Each Project Material include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.

To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research for your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions

You can also visit our facebook Page at fb.me/hyclas to view more our related construction (or design) pics


For more information contact us through Any of the following means:

Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]

Email address :engr4project@gmail.com

Watsapp No :+2348146561114

To View Our Design Pix: You can also visit our facebook Page at fb.me/hyclas for our design photos/pics.



IF YOU ARE SATISFIED WITH OUR SERVICES, PLEASE DO NOT FORGET TO INVITE YOUR FRIENDS AND COURSEMATES TO OUR PAGE.