A Simple Encryption and Decryption System
A Simple Encryption and Decryption System
net/publication/282027337
CITATIONS READS
0 8,170
4 authors, including:
Lauretta O. Osho
Federal University of Technology Minna
6 PUBLICATIONS 6 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Oluwafemi Osho on 22 September 2015.
Lauretta O. Osho
Department of Computer Science
Federal University of Technology, Minna
Minna, Nigeria
[email protected]
+23480571342923
ABSTRACT
The internet generates very large amount of data on a daily basis. While some of the information are trivial others are
sensitive. As a matter of fact, the security of some information traversing the internet is critical to the survival of the owner.
In this study, we implement the RSA algorithm to produce a simple system for encryption and decryption of files with .txt
extension. The system also incorporates digital signature to authenticate the sender of a message.
Key words: Encryption, Decryption, RSA, Digital Signature, Software, Confidentiality, Integrity, Availability.
Information is defined as a sequence of data that convey meaning to the person receiving it (Introna, 1992). It can be used to
address the problem of decision making and reduces uncertainty. Information plays an important role in human life
activities. Information distribution and accessibility have reduced the world to a global village. According to Meyer (2000),
information is usually exchanged face to face in an oral culture tradition. Information cannot be passed on a long distances
and therefore it remains within a boundary of a particular community.
Recent improvements in information technology, like the internet and electronic mail has made it possible for individual to
exchange sensitive information across the globe with security. Internet, as a global interconnection of computers and
computer networks, over the years is increasingly becoming an ubiquitous means for exchange of information (Adesanya,
2004; Ogbomo and Ogbomo, 2008), providing reliable and effective platform for communication, including conducting
business remotely (Woherem, 2000; Ogbomo and Ogbomo, 2008). For instance, information, in the form of text messages,
computer files, to mention but two, can be exchanged via electronic mail, also known as email (Nwosu, 2004; Ogbomo and
Ogbomo, 2008).
However, in spite of all the benefits that these advances in IT offer for information exchange, there are attendant challenges.
Messages on transit can be intercepted and accessed by an unauthorized agent. This phenomenon is known as loss of
confidentiality. When the information is altered without necessary authorization, we say there is a loss of integrity.
Information can also be made inaccessible to authorized users. This often occurs when the media used for the storage,
processing or/and transiting the information is attacked.
The effect of disruption, loss, or damage to information and information systems are often invaluable to their proprietors. In
many situations, the continuous survival of a business entity depends to a large extent on the security of its proprietary data
and information. For example, in airline operations, a breach in the accuracy or security of data could lead to loss of lives.
2. STATEMENT OF PROBLEM
The underlying respective architecture of most IT systems, including the desktop computer and internet, does not guarantee
security. Users with malicious intents have always found a way of exploiting one vulnerability or the other. An attack that
affects the confidentiality of information often presents the platform for the integrity of such information to be compromised.
Intercepted information on transit would make little or no sense to an interceptor if he is not able to decipher the content of
the information. This explains why it is very necessary to ensure that even when an intruder or unauthorised user
successfully obtains access to some information the confidentiality and integrity of the information remain uncompromised.
77
www.iiste.org
International Conference on Science, Technology, Education, Arts, Management and Social Sciences
iSTEAMS Research Nexus 2014, Afe Babalola University, Ado Ekiti, Nigeria
3. OBJECTIVE
The objective of this paper is to design and implement an application that encrypts and decrypts plain text files using R.S.A
algorithm and utilizes digital signature technique to verify the integrity and authenticity of the message sent.
4. EXISTING SYSTEM
Designing an encryption/decryption system, amongst other things, requires decision on the basic functionality of the
software, and the choice of cryptographic algorithm to be used. While the functionality supports the attractiveness of the
system, the type of cryptographic algorithm actually determines how much security the system would actually provide.
Hence, this forms the major component in the system design.
Currently, there are many available open-source and commercial encryption/decryption systems. Madji and Lin (2007)
developed a system that employs binary rotation of bits with XOR logical operation. The application uses symmetric
encryption key, which is generated using random number generation and combination. Another use of symmetric encryption
key was by Abdelhalim, El-Mahallawy, Ayyad, and Elhennawy (2012). They designed and implemented a Modified Tiny
Encryption Algorithm (MTEA) for use in RFID systems.
Symmetric cryptography, though faster for encrypting and decrypting compared to asymmetric cryptography, which explains
why it is mostly used for applications that involves transfer of large data, it provides less security and is more prone to
attacks (Henry, n.d.). Therefore, for any application where security is of the most essence, the need for asymmetric (public
key) cryptography is inevitable. The RSA scheme, among available public key schemes, has proven to be the most widely
accepted, hence most implemented (Stallings, 2011).
5. SYSTEM DESIGN
78
www.iiste.org
International Conference on Science, Technology, Education, Arts, Management and Social Sciences
iSTEAMS Research Nexus 2014, Afe Babalola University, Ado Ekiti, Nigeria
79
www.iiste.org
International Conference on Science, Technology, Education, Arts, Management and Social Sciences
iSTEAMS Research Nexus 2014, Afe Babalola University, Ado Ekiti, Nigeria
Upon successful logging in by the administrator, the Admin account interface, represented by Figure 4, is displayed.
Available options include New User Registration (figure 5), which when clicked display new user registration form where a
new user can be created; View User Information, which displays user information based on the user public key; Delete User,
which, as the name implies, provides the option for the admin to delete any user from the database using the user public key;
Connection Setting, which allows for server of client system configuration; and lastly, the Change Admin
Password/Username, which when clicked displays an interface through which admin can change user name and password.
80
www.iiste.org
International Conference on Science, Technology, Education, Arts, Management and Social Sciences
iSTEAMS Research Nexus 2014, Afe Babalola University, Ado Ekiti, Nigeria
To create a new user, in addition to personal information, unique public and private keys are generated.
The administration has the privilege of viewing all the systems connected to the server using the encryption/decryption
system. Information accessible includes the device name, system type, and IP address of the system which is either client or
server, system status which is either connected or disconnected. Through the same interface (figure 6), the administrator can
disconnect certain or all clients connected to the server, and reconnect them, as the case may be.
For a user to encrypt a plaintext, the plaintext is located, the content of which is then displayed on the text area of the
interface. The sender then supplies his or her public key, that of the recipient, digitally sign the message, and then encrypt it.
The plaintext is automatically converted to a ciphertext. The corresponding ciphertext can saved and then sent over the
network. The encryption/decryption interface, represented by figure 7, also contains menus that provide the mechanism for
retrieving forgotten private key and outrightly changing the private key.
For decryption, the recipient locates the ciphertext. The application displays the ciphertext on the text area of the interface.
The recipient then enters the private key on the decryption panel and then clicks the decrypt button. If the private key entered
by the user matches with the private key of the intended receiver of the message, the application converts the ciphertext to
plaintext, otherwise an error message is displayed and the message will not be decrypted.
The interface below (figure 8) allows the recipient to verify the authenticity of the message, by ascertaining its sender. This
ensures non-repudiation of the message by the sender.
81
www.iiste.org
International Conference on Science, Technology, Education, Arts, Management and Social Sciences
iSTEAMS Research Nexus 2014, Afe Babalola University, Ado Ekiti, Nigeria
7. CONCLUSION
Data encryption and decryption systems are used to improve information security to secure data that, thereby providing
enhanced level of assurance such that the data that are encrypted cannot be viewed by unauthorized parties in the event of
theft, loss or interception. This system replaces the existing data encryption and decryption system by adding some
functionality such as digital signature. Future works could be devoted to scaling the system to be able to encrypt and decrypt
other types of files, including audio, video, image, to mention but three.
82
www.iiste.org
International Conference on Science, Technology, Education, Arts, Management and Social Sciences
iSTEAMS Research Nexus 2014, Afe Babalola University, Ado Ekiti, Nigeria
REFERENCES
1. Abdelhalim, M. B., El-Mahallawy, M., Ayyad, M. and Elhennawy, A. (2012). Design & Implementation of an
Encryption Algorithm for use in RFID System. International Journal of RFID Security and Cryptography
(IJRFIDSC), Vol. 1, Issues 1-4, pp. 51 – 57.
2. Adesanya, O. (2002). The impact of information technology on information dissemination. In Madu, E.C. and
Dirisu, M.B. (Eds.), Information science and technology for library schools in Africa (pp.10-24). Ibadan, Nigeria:
Evi-Coleman.
3. Henry, D. (n.d.) RSA: Asymmetric Cryptography and Algorithm Analysis for a Secure Computing Environment.
Retrieved from www.dwhenry.com/files/RSA. df
4. Introna, L. D. (1992). Towards a Theory of Management Information. Unpublished DCom Dissertation, University
of Pretoria.
5. Madji, A. and Lin, Y. H. (2007). Simple Encryption/Decryption Application. Internation Journal of Computer
Science and Security, Vol. 1, Issue (1), pp. 33 – 40.
6. Meyer, H. W. J. (2000). The transfer of agricultural information to rural communities. Unpublished doctoral
dissertation, University of Pretoria, Pretoria, S. Africa.
7. Nwosu, I. (2004). Digital public relations: concept and practice, In Nwokocha, J. (Ed.). Digital public relations:
New techniques in reputation management (pp. 33-34). Lagos, Nigeria: Zoom Lens Publishers.
8. Ogbomo, M. O. and Ogbomo, E. F. (2008). Importance of Information and Communication Technologies (ICTs)
in Making a Heathy Information Society: A Case Study of Ethiope East Local Government Area of Delta State,
Nigeria. Library Philosophy and Practice 2008, ISSN 1522-0222, pp 1 – 8.
9. Stallings, W. (2011). Cryptography and Network Security: Principles and Practice (5th ed.). NY, US: Prentice
Hall.
10. Woherem, E.R. (2000). Information technology in the Nigerian banking industry. Ibadan, Nigeria: Spectrum
Books.
83
www.iiste.org
International Conference on Science, Technology, Education, Arts, Management and Social Sciences
iSTEAMS Research Nexus 2014, Afe Babalola University, Ado Ekiti, Nigeria
AUTHORS’ BIOGRAPHY
84