0% found this document useful (0 votes)
48 views4 pages

Synopsis: "Data Encryption Standard"

This document summarizes a student project on implementing the Data Encryption Standard algorithm. The project aims to encrypt and decrypt data for secure transfer. It will use a hexadecimal key for encryption and another key for decryption. The project was developed in C using a Windows environment. It was created by two students who divided the analysis, coding, testing, and documentation work. The project allows secure data transfer and reduces the time needed for encryption and decryption compared to manual methods. However, DES is now considered insecure due to its small 56-bit key size.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views4 pages

Synopsis: "Data Encryption Standard"

This document summarizes a student project on implementing the Data Encryption Standard algorithm. The project aims to encrypt and decrypt data for secure transfer. It will use a hexadecimal key for encryption and another key for decryption. The project was developed in C using a Windows environment. It was created by two students who divided the analysis, coding, testing, and documentation work. The project allows secure data transfer and reduces the time needed for encryption and decryption compared to manual methods. However, DES is now considered insecure due to its small 56-bit key size.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Synopsis

On

Data Encryption Standard


Master of Computer Application
(2010-13) (Mahamaya Technical University Noida)

Under guidance
Mr. Gaurav Bhatia & Mrs. Shobha Shukla

Course Co-ordinator : Submitted By:


Mrs. Shobha Shukla Mr. Sandeep Srivastava Vishwakarma Anubhav Saxena Niraj

Title of the project:- Data

Encryption Standard

Statement about the Problem:Transfer of data is essential for todays world. But to secure the transfer of data is a very challenging work for everyone. The data transferred can be a sensitive data or may be a personal data. The basic problem is to provide the secured transmission of the data for what Data Encryption Standards are needed.

Need of the particular topic chosen:Data Encryption Standards are the basics for the cryptography and network security. Without DES, it is not possible to transfer the data in secured manner. It is the backbone of network security.

Objective and scope of the Project:The objective of this project is to implement Data Encryption Standard algorithm for data encryption and decryption for secured transfer of data. We are going to develop this project that will deal with all complexities which encounters in secured transmission of the data. We are trying to develop the project to make the work in much more efficient manner and in an effective way. The project will reduce all of the manual work and will help in navigating all the form easily. Thus, we will try to develop in such a way so that it can helpful for the person who will try to transfer data. The concept of this project or we can say that the algorithm for data encryption standard was introduced by IBM in 1977 and it was accepted as a standard in 1979.

Methodology (including a summary of the project):Data Encryption Standard is the project will help those users who want to transfer the data in secured manner.

ProcesDescription:

The application will encrypt the data provided by the user using a unique encryption key which will be a hexadecimal key and provide an encrypted output. This output can be transferred over the network. It will secured because there will be 70,000,000,000,000,000 possible keys which may be generate. But the data can only be decrypted using a special decryption key. Which will also be a hexadecimal key in nature? And after applying that key We got our data again which is send by the user.

User Classes and Characteristics


I believe that this application can be used in any secured transfer of the data of our daily life.

Operating Environment
This application will be written in C in Windows.

Our Team:The team consists of two members Anubhav Saxena Niraj Vishwakarma

Roles of Team Members:


Analysis & Design: Coding: Testing: Documentation: Anubhav Saxena, Niraj Vishwakarma Anubhav Saxena, Niraj Vishwakarma Niraj Vishwakarma Anubhav Saxena

Hardware & Software to be used:Hardware Requirement: 1.6 GHz Pentium IV processor 256 MB RAM Software Requirement:

Any C compiler Testing Technologies used:Manual testing technology used. Future Scope and Limitations:The scope of the project is very wide. The project will be efficiently used for the secured data transferred. Our project will reduce a great amount of time in making the encryption codes and after that decryption codes for the secured transfer. DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999,distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes.

You might also like