Synopsis: "Data Encryption Standard"
Synopsis: "Data Encryption Standard"
On
Under guidance
Mr. Gaurav Bhatia & Mrs. Shobha Shukla
Encryption Standard
Statement about the Problem:Transfer of data is essential for todays world. But to secure the transfer of data is a very challenging work for everyone. The data transferred can be a sensitive data or may be a personal data. The basic problem is to provide the secured transmission of the data for what Data Encryption Standards are needed.
Need of the particular topic chosen:Data Encryption Standards are the basics for the cryptography and network security. Without DES, it is not possible to transfer the data in secured manner. It is the backbone of network security.
Objective and scope of the Project:The objective of this project is to implement Data Encryption Standard algorithm for data encryption and decryption for secured transfer of data. We are going to develop this project that will deal with all complexities which encounters in secured transmission of the data. We are trying to develop the project to make the work in much more efficient manner and in an effective way. The project will reduce all of the manual work and will help in navigating all the form easily. Thus, we will try to develop in such a way so that it can helpful for the person who will try to transfer data. The concept of this project or we can say that the algorithm for data encryption standard was introduced by IBM in 1977 and it was accepted as a standard in 1979.
Methodology (including a summary of the project):Data Encryption Standard is the project will help those users who want to transfer the data in secured manner.
ProcesDescription:
The application will encrypt the data provided by the user using a unique encryption key which will be a hexadecimal key and provide an encrypted output. This output can be transferred over the network. It will secured because there will be 70,000,000,000,000,000 possible keys which may be generate. But the data can only be decrypted using a special decryption key. Which will also be a hexadecimal key in nature? And after applying that key We got our data again which is send by the user.
Operating Environment
This application will be written in C in Windows.
Our Team:The team consists of two members Anubhav Saxena Niraj Vishwakarma
Hardware & Software to be used:Hardware Requirement: 1.6 GHz Pentium IV processor 256 MB RAM Software Requirement:
Any C compiler Testing Technologies used:Manual testing technology used. Future Scope and Limitations:The scope of the project is very wide. The project will be efficiently used for the secured data transferred. Our project will reduce a great amount of time in making the encryption codes and after that decryption codes for the secured transfer. DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999,distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes.