Chapter 2 & 3
Chapter 2 & 3
Chapter 2 & 3
2.1 OVERVIEW:
Cryptography is the science of using mathematics to encrypt and decrypt
data. It enables you to store sensitive information or transmit it across insecure
networks (like the internet) so that it cannot be read by anyone except the
intended recipient. Cryptography provides a method for secure communication.
It stops unauthorized parties, commonly referred to as adversaries or hackers,
from gaining access to the secret messages communicated between authorized
parties. The method that cryptography provides is called encryption.
Encryption transform a key and input, the plaintext, into an encrypted
output, the ciphertext. Encryption algorithms are only considered secure if
attackers cannot determine any properties of the plaintext or the key when
presented with only the ciphertext. An attacker should not be able to find out
anything about a key, even if they have many plaintext/ciphertext combinations
that use key.
A real-world example would be credit card information that you use for
purchases on Amazon or other ecommerce sites. The code in your web browser
encrypts the plaintext, your card number, into ciphertext, which to someone
without the keys would look like illegible, random text. However, once your card
number reaches its intended recipient, the online store, their software would
decrypt it back into plaintext so they can charge you for your purchase.
2.1.1 HOW DOES CRYPTOGRAPHY WORK?
A cryptographic algorithm, or cipher, is a mathematical function used in
the encryption and decryption process. A cryptographic algorithm works in
combination with a key—a word, number, or phrase—to encrypt the plaintext.
The same plaintext encrypts to different cipher text with different keys. the
security of encrypted data is entirely dependent on two things: the strength of
the cryptographic algorithm and the secrecy of the key.
3.1 INTRODUCTION
To develop the best system for the File Encryption and Decryption, group of
people had analyzed the existing system and need for new system. These
analyses are then documented and presented as discussed about this
investigation. These are some stages necessary for developing of new system;
System Identification
Evaluate Feasibility
Preliminary report
- TECHNICAL FEASIBILITY
Technical Feasibility centers on the existing computer system hardware,
software, etc. and to some extent how it can support the proposed addition.
This involves financial considerations to accommodate technical
enhancements. Technical support is also a reason for the success of the
project. The techniques needed for the system should be available and it must
be reasonable to use. Technical Feasibility is mainly concerned with the study
of function, performance, and constraints that may affect the ability to
achieve the system. By conducting an efficient technical feasibility, we need to
ensure that the project works to solve the existing problem area.
Hardware Requirement
Computer systems 1
Processor PENTIUM II Processor
R.A.M Minimum 2GB
Disk Space Using an Hard disk with a minimum
of 120GB would be a wise decision
Software Requirement
Visual Studio code(Editor)
Web Browser
- OPERATIONAL FEASIBILITY
This software is operationally feasible. This application provides the necessary
information to the users as how to select file, encrypt file and decrypt file. No
prior knowledge is required to operate this app. For the user, the basic
knowledge of computers is enough.
- ECONOMICAL FEASIBILITY
Whether the new system is cost effective or not ? The benefits in the form
of reduced cost? This Software is economically Feasible. As the hardware cost on
the project is low. Similarly, the software cost is also under the budget.
Moreover, some of the technical requirement are already available and some can
be obtained using a reasonable amount and
secrecy and length of the key and depends on the details of the
algorithm. In other words, knowing the algorithm makes it
significantly easier to crack the code. Thus, it is very easy to decrypt
the has file once you known the algorithm.
3.3.2 PROPOSED SYSTEM
The proposed application cryptography focused on message confidentiality
(i.e., encryption)—conversion of messages from a comprehensible form into an
incomprehensible one and back again at the other end, rendering it unreadable
by interceptors or eavesdroppers without secret knowledge (namely the key
needed for decryption of that message). Encryption attempted to ensure secrecy
in communications, such as those of spies, military leaders, and diplomats. In
recent decades, the field has expanded beyond confidentiality concerns to
include techniques for message integrity checking, sender/receiver identity
and length of the key and not on the details of the algorithm. In other
words, knowing the algorithm should not make it significantly easier
to crack the code
Features:
The main objective of the proposed file encryption & decryption system is to
provide layered data protection which means using multiple security
elements to protect your data. Each layer focuses on a specific area where a
cyberattack or leak could occur. The right file encryption program acts as
one element of layered protection to keep your data most secure.
Secure data transfers
With file encryption protection, you ensure no malicious actors tamper with
your data.
Using file encryption software helps you ensure complete compliance with
the federal, state, and industry-specific regulations you must follow in
handling and transmitting data.
SYSTEM DESIGN
4.0 SYSTEM DESIGN
The System Design Document is a document to provide documentation which will
be used to aid in the system development by providing the details for how the
system should be built. Within the System Design Document are narrative and
graphical documentation of the system design for the project.
System design, decisions are made about how the problem will be solved in design,
the software requirements are analyzed are planned the subsequent development
activities. The design of input screens and the result screens, the data storage and the
process are mainly concern in this section. Selection of the software to develop the
proposed system will also decide the design phase.
4.1 OUTPUT SPECIFICATION
The design of the outputs is important because this is what interests the user most.
They are unlikely to remember hoe elegant the input interfaces was or how quickly
the system responded. What they will perceive is whether the outputs produce by the
system met their requirement or not. If a system is incapable of meeting user output
expectations the system is deemed be failed to meet one of its basic requirements.
The output design of the proposed system is the based downloading of the
encrypted or decrypted file as shown in the diagram below;