Vous êtes sur la page 1sur 7

Secure Encryption System

1


Abstract
Project Scope:
People are reluctant to admit it, but the world revolves around secrets.
Without secrets, there would be no privacyeverybody's personal and
business information would be open to public inspection. It would be
impossible to safeguard a personal or business identity, keep a lid on future
plans, conduct fnancial transactions, or even maintain a bank account.
specially now, during the e!commerce e"plosion, secure and reliable
e"change systems are vital for the world#s economy.
$his application should provide security at fle content level. It uses
%ryptosystems, highly technical systems that provide privacy through secret
encoding, have been an important part of the electronic information world for
many years.
$his cryptosystem protect data by using hardware and software in a process
that protects data by performing mathematical operations&algorithms on it.
$he result is data rendered unintelligible, which is called cipher te"t. $his
cipher te"t is then transmitted over insecure lines or networks such as the
Internet. If someone intercepts this cipher te"t, it is indecipherable and
meaningless to him or her. When the cipher te"t reaches its fnal destination,
it can be decrypted into the original state of the data.
Functionalities:
ncryption 'odule
(ecryption 'odule
)*I 'odule
Technological Requirements:
+ava , -tandard dition, +ava -wings
'icrosoft Windows, .inu" or 'ac any version
2



INTRODUCTION
Purpose:
People are reluctant to admit it, but the world revolves around secrets. Without secrets,
there would be no privacyeverybody's personal and business information would be
open to public inspection. It would be impossible to safeuard a personal or business
identity, !eep a lid on future plans, conduct financial transactions, or even maintain a
ban! account.
In the computer world, secrets are protected by encryption technoloies. "nli!e a
password, which is simply a !ey that provides access to information, encryption is
desined to ma!e an entire body of information unreadable. In laymen's terms,
encryption converts plain te#t into a secret code for transmission over a public networ!,
such as the Internet.
$here are two main ways to encrypt information. %ne approach is to use asymmetric
public&!ey infrastructure 'P(I) encryption. P(I cryptoraphy is based on a pair of
cryptoraphic !eysone is private and !nown only to the user, while the other is public
and !nown to the opposite party in any e#chane. P(I technoloy can be used in any data
e#chane re*uirin identification and authori+ation of transactin parties. It provides
privacy and confidentiality, access control, proof of document transmission, and
document archivin and retrieval support. While most security vendors currently
incorporate some type of P(I technoloy into their software, differences in desin and
implementation prevent interoperability between products.
,


Scope
-ecure .ncryption -ystem is a /etwor! and -ecurity 0pplication which is used for
.ncryptin and 1ecryptin a file. -ecure .ncryption system uses 2i3ndael 0lorithm for
.ncryption and 1ecryption methodoloy. 0 file is been encrypted and is been passed over
the networ! and the other end of system it is been decrypted. 2i3ndael 0lorithm is one
of most popular 0lorithms used for .ncryption as well as 1ecryption methodoloies.
PROJECT OVERVIEW
-ecure .ncryption -ystem consists 2i3ndael 0lorithm with which whole pro3ect codin
is been developed. $his tool will accept a file and encrypts it and ives an output file with
decryption file. $his pro3ect is mainly consists implementation of 2i3ndael 0lorithm.
Encryption Concept
.ncryption is the process of transformin information from an unsecured form '4clear4 or
4plainte#t4) into coded information '4cipher te#t4), which cannot be easily read by
outside parties. 0n alorithm and a !ey control the transformation process. $he process
must be reversible so that the intended recipient can return the information to its oriinal,
readable form, but reversin the process without the appropriate encryption information
should be impossible. $his means that details of the !ey must also be !ept secret.
.ncryption is enerally rearded as the safest method of uardin aainst accidental or
purposeful security breaches. $he strenth of the encryption method is often measured in
terms of wor! factor & the amount of force that is re*uired to 'brea!' the encryption. 0
stron system will ta!e loner to brea!, althouh this can be reduced by applyin reater
force 'the more effort that is put into the attac!, the less time re*uired to brea! the code).
5


PROJECT DESCRIPTION
$here are three basic elements in any encryption system:
&& a means of chanin information into code 'the alorithm)6
&& a secret startin point for the alorithm 'the !ey)6 and
&& a system to control the !ey '!ey manaement).
$he !ey determines how the alorithm & the encryption process & will be applied to a
particular messae, and matchin !eys must be used to encrypt and decrypt messaes.
$he alorithm used in an encryption system normally remains the same for the life of the
e*uipment, so it is necessary to chane !eys fre*uently in order that identical encryption
is not applied to messaes for a lon period. It is enerally desirable to chane the !eys
on an irreular but manaed basis. (ey manaement deals with the eneration, storae,
distribution, selection, destruction and archivin of the !ey variables. $wo basic types of
encryption in use today are !nown as private !ey 'also called sinle or symmetrical !ey)
encryption and public 'or asymmetrical) !ey encryption.
In private !ey encryption, the same !ey is used for both encryption and decryption. $he
!ey must be !ept secret so that unauthori+ed parties cannot, even with !nowlede of the
alorithm, complete the decryption process. 0 person tryin to share encrypted
information with another person has to solve the problem of communicatin the
encryption !ey without compromisin it.
Public !ey encryption solves the problem of maintainin !ey security by havin separate
!eys for encryption and decryption, which uni*uely match each other but are not
predictable from each other. $he user retains a private decryption !ey and ma!es the
public !ey available for use by anyone interested in sendin the user sensitive
7


information. $he relationship between the !eys is such that iven the public !ey a person
cannot easily derive the private !ey.
PROBE! DE"INITION
E#istin$ System
1eveloped for any one %peratin -ystem.
-upports any one either command mode or raphical mode only.
"sually available as a built in utility in the system.
-hould be applicable for any !ind of file -i+e.
Propose% System
-ecure .ncryption -ystem is supposed to run with 8ava runtime environments
version 1.5 and hiher. $his has the advantae of wor!in under most operatin
systems in use today.
Write the code to e#ecute as 9ommand mode and :raphical Interface
Provide interactive interface throuh which user can interact with different types
of ;ile -i+e.
!o%u&e Description
In this we have 2 modules
.ncryption
1ecryption
<


'ARDWARE AND SO"TWARE RE(UIRE!ENTS
'ar% Ware Re)uirements
Processor:: Pentium&III 'or) =iher
2am:: <5>? 'or) =iher
9ache:: 712>?
=ard dis!:: 1@:?
So*t Ware Re)uirements
$ools:: >icro -oft ;ront
%peratin -ystem:: Windows/$A2@@@
9lient -ide:: :"I
B

Vous aimerez peut-être aussi