FILE ENCRYPTION
USER'S INSTRUCTIONS: The project work you are about to view is on "file encryption". Please, sit back and study the below research material carefully. This project topic "file encryption" have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "file encryption" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "file encryption" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.
TITLE PAGE
FILE ENCRYPTION
BY
---
EE/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---
DECEMBER,2018
APPROVAL PAGE
This is to certify that the research work, "file encryption" by ---, Reg. No. EE/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.
By
--- . ---
Supervisor Head of Department.
Signature………………. Signature……………….
……………………………….
---
External Invigilator
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.
PROJECT DESCRIPTION: This work "file encryption" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "file encryption" visible for everyone, then the complete material on "file encryption" is to be ordered for. Happy viewing!!!
It is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a message “Access is denied” will be displayed showing that such user is un-authorized. Package like Ms-Word, Ms- Excel, as well as slide are attached to the program for users to use and encrypt such file after saving.
File encryption is the process of translating plain text data into something meaningless (cipher text) while decryption is the reverse. Visual Basic programming language is used in designing this security program to protect file and data in order to achieve its aims and objectives.
TABLE OF CONTENT
COVER PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
TABLE OF CONTENT
CHAPTER ONE
- BACKGROUND OF STUDY
- STATEMENT OF THE PROBLEM
- AIMS AND OBJECTIVES OF THE STUDY
- SIGNIFICANCE OF THE STUDY
- SCOPE OF STUDY
- DEFINITION OF TERMS
CHAPTER TWO
2.0 REVIEW OF PAST WORK
2.1 THE CONCEPT OF ENCRYPTION AND DECRYPTION
2.2 CIPHER
2.3 APPLICATION OF ENCRYPTION AND DECRYPTION
CHAPTER THREE
METHODOLOGY
3.0 REVIEW OF EXISTING SYSTEM
3.1 APPLE’S FILEVAULT
3.2 MICROSOFT EFS FOR WINDOWS
3.3 PROBLEM OF THE EXISTING SYSTEM
3.4 DESCRIPTION OF PROPOSED SYSTEM
CHAPTER FOUR
4.1 DESIGN OF THE SYSTEM
4.2 SYSTEM IMPLEMENTATION
4.3 IMPLEMENTATION TECHNIQUES USED IN DETAILED
CHAPTER FIVE
5.1 SUMMARY
5.2 CONCLUSION
5.3 RECOMMENDATIONS
CHAPTER ONE
INTRODUCTION
There are a number of methods for security measures to be attached to files or documents, these may include file password or file locking, data / file encryption and decryption, installation of antivirus, USB encryption, laptop encryption, firewall, password encryption, database encryption, disk encryption for data etc. Since the use of the computer is so wide and data or file security is very important, an important concept to note is that data or file encryption is one of the best security measures and can be incorporated into systems that participate in data or file transfer and sharing to allow for privacy. This is because it places security measure on the system on the data itself. Applications need to have a way of encrypting data or documents before sending to the recipient(s) at the receiving end, and the recipient should also be able to have a means to decrypt or unlock the encrypted message being sent. This is made possible by using a unique pass code (key or password) for both the encryption and the decryption processes. Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (cipher text). Decryption is the process of converting cipher text back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used because it renders main security goals which are privacy and authenticity of the communicated data. A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of cipher text, the key that was used to encrypt the data must be used.
Hello Students
&%giuyrwkmn,s:l
Hello Students
Decryption
Encryption
Symmetric-key cryptography, where the same key is used for both encryption and decryption
Fig.1.0 Symmetric key cryptography process description
The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated cipher text without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of cipher text without possessing the key.
It is difficult to determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose one that has been in use for several years and has successfully resisted all attacks.
1.0 Background of the Study
Due to insecurities in files and data, many researchers over the years in the ICT fields have carried out numerous researches in files/data encryption and decryption. They have encrypted and decrypted files using both private and public keys and even other minor methods when sending or receiving files on the internet. Public keys data encryption and decryption method and other minor methods have been found out to be slow and not suitable for large ranges of data/files as a result most researchers have recommended files/data encryption and decryption using the symmetric – key type (private key) of data encryption and decryption.
The method to be used for data encryption and decryption is cryptography. Cryptography is therefore the science of using mathematics to encrypt and decrypt information. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet) so that it cannot be read by anyone except the intended recipient.
Cipher algorithm will be used, which can be defined thus: A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key (a number, word, or phrase) to encrypt and decrypt data. To encrypt, the algorithm mathematically combines the information to be protected with a supplied key. The result of this combination is the encrypted data. To decrypt, the algorithm performs a calculation combining the encrypted data with a supplied key. The result of this combination is the decrypted data. If either the key or the data is modified, the algorithm produces a different result. The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated cipher text without using the key. If a really good encryption algorithm is used, then there is no technique significantly better than methodically trying every possible key. Even for a key size of just 40 bits, this works out to 2ˆ40 (just over 1 trillion) possible keys.
1.1 Statement of the Problem
A lot of problems are always being encountered during the process of data or file transfer and sharing and even chatting or sending Email among clients or server-to client on a network. The problem arises as a result of data or file insecurity over a network. Since the data or file can be transferred or shared among clients or users on a network, some protocols are being breached which leads some clients or users to having or gaining access to data or file/document they are not supposed to. Because of these problems, this then calls for a research to address the problems on file insecurities using cryptographic algorithm or cipher. These problems can be tackled by joint efforts of software programmers, analysts and researchers in ICT field.
1.2 Aim and Objectives Of the study
This project is aimed at designing and implementing security software using cryptography method (process in which plain text is converted to cipher text (encrypted text) which uses a key that is known to both sender and receiver and a process in which cipher text is converted to plain text (decrypted text)). It would be developed for individuals or organisations that need to secure their files and other document.
Specifically, the objectives of this project are stated as follows:
- To ensure that data files resident on a system are well secured or protected.
- To ensure data communication a client-to-client or server-to-client relationship on a network.
- Securities and confidentiality of personal document for clients or users on a network involved in data or transfer or sharing.
- To replace the traditional unsecured chatting and file transfer application with a more secured encryption and decryption enabled data communication application
- To ensure that illegal alterations to personal or confidential information is greatly reduced.
1.3 Significance of the Study
Some of the significance of this project research is explained below as data/files encryption and decryption is very essential in the life of an individual, ICT researchers, ICT companies and non – ICT companies. The various significance of this research work is explained below: The importance of the encryption techniques for large and growing sectors of the society is fundamental. The use of encryption is as important for the storage and use of information as it is for data and telecommunication. In order to secure the necessary legal, evidentiary function of digital information as we go away from the use of physical documents, strong cryptographic techniques are required. The importance of encryption in file transfer applications will increase substantially in the coming years in place with the growing traffic on publicly available networks, like the internet as they continue to increase in size; Files or documents are well protected on a network with the existence of Encryption algorithm embedded in the application. Private persons, companies, government agencies and other organisations use cryptography techniques in order to safely communicate with partners, customers, etc, but also in order to increase security in their own internal processes; to protect stored information, and communicate with employees who are geographically distributed or work from a distance. By using encryption for communication over open and publicly accessible networks, information/data can be transferred from the sender to receiver without unauthorized interpretation (data integrity)
1.4 Scope of the study
The scope of this project is essentially centred on incorporating encryption and decryption algorithms into data communication which entails encryption and decryption enabled files transfer applications and generally securing data against illegal access or transfer or file sharing systems. This project is a security application program on a network or popularly referred to as security “socket programming”. It explores data or file encryption, socket programming, cryptography, local area network (LAN), Bluetooth connection, wireless, wireless connection, IP addressing and port numbering.
1.5 Definition of terms
- Data: Information in raw form or unorganized form such as alphabets, numbers, or symbols that refer to or represent condition, ideas or object.
- Database: A systematically organized or repository of indexed information usually a group of linked data files that allows easy retrieval, updating, analysis and output of a data usually stored in a computer.
- File: Is a collection of data stored in one unit, identified by a Filename. It can be a document, picture, audio or video stream, data library, application or other collection of data.
- Encryption: Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (cipher text). Decryption is the process of converting cipher text back to plaintext.
- Decryption: Decryption is the process of converting cipher text back to plaintext.
- Plain-text: Plain-text is any text that is still in its readable format or that has been converted from cipher-text back to plain text as a result of Decryption.
- Cipher-text: Cipher-text is the text which has been converted to the format that cannot be read as a result of encrypting the text.
- Firewall: Set of related networks located at a network gateway server that protects the resources of a private network from users from other networks.
- Cryptography: it is the act of writing in code or cipher.
- Symmetric-key: The method of using a single key for encryption and decryption. It can also be referred to as private-key
- Asymmetric-key: The method of using a key for encryption and another key for decryption. It can also be referred to as a public-key.
- Algorithm: It is a step by step instruction of solving problem.
- LAN: Local Area Network.
- Kernel: A kernel is the piece or pieces of pieces of software that is responsible for servicing resource request from the application and the management of resources. A kernel grant access to resources such as allocating space for a new file or creating a network collection.
- Cryptography API: Contains functions that allows applications to encrypt or digitally signed sign data in a flexible manner, while providing protection for the user’s sensitive private key data.
- Stream Cipher: Stream ciphers, which encrypt continuous streams of data.
Block Cipher: Block ciphers, which encrypt block of data of fixed size
1.7 PROJECT ORGANISATION
The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study, chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendationsCHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "file encryption" is also available. Order full work to download. Chapter two of "file encryption" consists of the literature review. In this chapter all the related work on "file encryption" was reviewed.
CHAPTER THREE: The complete chapter three of "file encryption" is available. Order full work to download. Chapter three of "file encryption" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.
CHAPTER FOUR: The complete chapter four of "file encryption" is available. Order full work to download. Chapter four of "file encryption" consists of all the test conducted during the work and the result gotten after the whole work
CHAPTER FIVE: The complete chapter five of design and construction of a "file encryption" is available. Order full work to download. Chapter five of "file encryption" consist of conclusion, recommendation and references.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com
COUNTRIES THAT FOUND OUR SERVICES USEFUL
Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124
Watsapp No :+2348146561114
Email Address :engr4project@gmail.com
FOLLOW / VISIT US VIA: