Vous êtes sur la page 1sur 8


Encryption of data plays a vital role in the real time environment to keep the data out of reach unauthorized people, such that it is not altered and tampered. The File Security System is a software, which tries to alter the originality of the text into some encrypted form. The major task of File Security System is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The application should have a reversal process s of which should be in a position to decrypt the data to its original form upon the proper request by the user. While the Encryption and Decryption is done, the application should confirm the standards of authentication and authorization of the user. The entire application should strive to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode for the end user. The system should provide all the functional standards of proper navigation with in the environment, which makes it possible for the users to have a smooth flow while working under the environment. The overall system should provide proper menu based navigation for easier navigation and operation. The application should be designed in such a way that, as soon as it starts create a buffer and associate this buffer to some homogeneous data environment, the application should ask the user for the encryption key details and should start its functionality upon the logistics that are provided with in this key. The key should be designed in such a way that it prevents the unauthorized persons from stealing the information at any point of time. The application of decryption should be a reverse process at the other end and should be translated only when the receiver of the data applies the proper reversal key. The decryption process should have a log-based methodology that will take care of any errors that may be encountered while the system is under utilization and should record all those events, which are above the general standards of security.

The software requirement specification can produce at the culmination of the analysis task. The function and performance allocated to software as part of system engineering are refined by established a complete information description, a detailed functional description, a representation of system behavior, an indication of performance and design constrain, appropriate validation criteria, and other information pertinent to requirements. This project requires the following hardware and software equipment in order to execute them. They are given below.

Operating System:

Windows NT/2000 (Client/Server) Programming in C


Pentium IV Processor with 1.9 GHz Clock Speed 512 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card

Elements of Design
The system design includes the maintenance of the user information, their login details, authorization services, file and directory services with a prescribed encryption format the interested level of encryption and the receiving service at the other end with decryption process. The design also includes the provision of facility to the user to manipulate the concerned information according to his personal use and communication process at the administrator level only. The design of File Security System, basically involve the interface architecture, authorization and authentication system, security services, and communication system. In the interface design we involve with the design of the user interface with GUI standards and a proper navigation system where the user need to enter into the flow of transactions starting with the entry in to the system with the user name and password where the authentication and authorization services are check an further access is provided into the system. Then the user needs to select into the operations provided through the GUI where encryption, decryption, sending of the file, general information and exit are provided. Here the encryption and decryption and services are provided connecting to the security services module where the encryption and decryption are carried out using the Digital Encryption Standards implementing the DES algorithm. After the encryption of the file is completed the user is to select the file for sending through the network to the desired user by specifying the targeted users system IP address in the panel designed. Then the system gets connected to the targeted user and delivers the file in cipher format after which the user working with the File Security System software should go for the option decrypt the file by selecting the file path by which the file gets decrypted and is viewed on the system.

The File Security System is designed to provide higher-level security in the file transfer in a distributed environment. The basic importance of the security in the file transfer is most in the organizational architectures where the people or the users at various levels need to activate the file services and forward the files from one system to another for the organizational purposes.


0 Level Diagram
File for secured transfer File Security System
File Transfer using encryption



1 Level Diagram


Validation Check

Authorizatio n Server

Access to DES for services


Encryption Command


DES - Key

Security System

File Encrypted and Saved


File to be encrypted

Encrypted File

Decryption Command


DES - Key

Security System

File Decrypted and Saved


File to be decrypted

Decrypted File

File Transfer


Peer IP

I/O Socket

Transfer the file


System Description
File security system is designed in basically four different modules they are GUI module, authorization and Authentication module, Connection manager module, Security System module. GUI Module basically deals with the design of the interface which include the service of providing the user with the flexibility of accessing the file system and selecting the required file for the transfer. It should also provide the system to collect the information from the user to check the authorization in providing the access to the file system. The interface is also to consider the design, which include the services of sending and receiving of the file with encryption and decryption standards. Authentication and Authorization services module deals with the checking of user name and corresponding password from the authentication server, the backend database where the table containing the required information is stored. If the authentication server validates the user then it is provided with the file Encryption/decryption and transfer services. The Connection Manager deals with the architecture, which supports the system to identify the end users for the communication and establish the communication .Connection and disconnection channel between the users for the access of the file system and file transfer services. The Connection Manager receives the IP address to be connected and the file to be sent then establishes the connection and transfer the file. Security implementation module considers the implementation of the encryptions and decryption standards in transfer the files from one system to another in a distributed environment. The system design, even need to support the user to select the level of encryption he/she needs to perform depending upon the file to be transferred. The basic algorithm used in this purpose is the DES where the user can enter the key depending upon level encryption he is interested.

The test procedure used in the testing process is Black box Testing. Test cases are analyzed accordingly.

Black box Testing

The test involves the manual evaluation of the flow from one module to the other and check accordingly for the process flow. This process of testing is with the following criteria. Encryption process Decryption process Sending file to another peer Key prescription Information Display Exit process

The flow is initialized with User Login. This section contains the software accepting the user details i.e. User name and password. The details are verified and validated in the database. When the system finds a match the control is transferred to the next section, which includes the menu with five buttons. If the particular user details are mismatched then the user login fails and a message is displayed. The buttons shown are: Encrypt Decrypt Send Information Exit

This accepts the location of the file with its name to be encrypted. It also takes the key. This Buttons connects to the algorithm implementation and gives an encrypted format (cipher text) of the original file. Then it accepts the location of the file to be stored. If the system finds the given location of the file then it executes successfully, otherwise the system shoots the error to client giving invalidity of mentioned file.


Functional test


Successful login


Encryption Decryption Sending file

Successfully encrypted and saved Path failure Destination address not found



Receive decrypted data, decrypt and save

Path failure

Address of the file is corrected

Receive correct destination address and transmit

Destination address not found

Correct IP address is given

All the above validations on buttons have been verified and they are successfully executed. The flow is tested at different possible conditions by means of this testing.