Call us Now for Inquiries on 08168759420 and 08068231953

DESIGN AND IMPLEMENTATION OF COMPUTERIZED DATA ENCRYPTION AND DECRYPTION SYSTEM.

ABSTRACT

The use of manual system of data encryption and decryption has a damaging implication resultant on the images in some companies and the negative impact this trend has had on the users of such system. Much resource is lost annually by firms due to the uncontrolled and unscientific nature of this system.

In this traditional system, to guarantee privacy of information / communications between any two subscribes in a network consisting of 1000 members, 499,500 secret keys would be necessary, one for each possible combination of sender and receivers. Keys have been distributed by a secure channel such as a trusted courier with an attached case manual led to a wrist, a costly and time consuming method.

This particular project is set to appraise already existing system by designing a better one which will facilitate the level of satisfaction and competence in the challenges in information technology.

 

 

 

 

 

ORGANISATION OF WORK

      This project work titled design and implementation of computerized data encryption and decryption system is organized into different chapters.

Chapter one introduces the project work, purpose of the study, aims and objectives. The limitations, scope of work and assumptions were also included. This section ended with a definition of term used in the project work.

The review of books and literature of different scholars with respect to the above caption are summarized in chapter two to bring clarification.

I went forward in chapter three to describe and analyze the already existing system using procedure chart, information flow chart etc.

The chapter four and five of this work dealt intensively on the design and implementation of the new computerized system using diagrams and programs.

Documentation of the information the subsequent users of the software is elaborated in chapter six.

Finally, I have declared a recommendation and conclusion section for anybody who is interested in this work piece as shown in the chapter seven.

LIST OF FIGURE

 

Fig 3.1       Information Flow Diagram

Table 4.1   Output Report

Table 4.2   Input Form

Fig 4.2.1    File Design

Fig 4.2.2    System Flowchart

Fig5.1                  Program Flowchart

Fig 5.2       Database Design


TABLE OF CONTENT

Title page ……………………………………………………………   i

Certification……………………………………………………………..ii

Approval page……………………………………………….…….       iii

Dedication ……………………………………………….…………         iv

Acknowledgement ……………………………………..…………….v-vi

Abstract …………………………………………………………………..vii

Organization of work………………………………………….………vii-ix

list of figure …………………………………………………………………………………..x

CHAPTER ONE

1.0 INTRODUCTION…………………………………………………1-3

1.1 Statement of the Problem…………………………………………3

1.2 Aims and Objectives……………………………………………….4

1.3  Purpose of the Study………………………………………..….4-5

1.4 Significance of Study…………………………………………….5

1.5 Scope/ Delimitation………………………………………..……5-6

1.6 Limitations / Constraints…………………………………………6

1.7 Assumption of Study……………………………………..………6

1.8 Definition of Terms………………………………………………6-7

CHAPTER TWO

2.0     Review of Literature……………………………………………8

 

CHAPTER THREE

3.0 Description and Analysis of the Existing System……………..15

3.1  Fact Finding Method / Methodology………………………15-16

3.3  Objective of the Existing System…………………………….…17

3.4 Input, Process and Output Analysis……………………………17

3.4.1 Input Analysis………………………………………………….17-18

3.4.2 Process Analysis………………………………………..…………18

3.4.3 Output Analysis……………………………………….……………..18

3.5 Information Flow Diagram……………………………..……………19

3.6 Problems of Existing……………………………………………….19-20

3.7Justification for the New System……………………………………20

CHAPTER FOUR

4.0 Design of the New System

4.1Design Standard………………………………………………………21

4.2 Output Specification and Design…………………………………..21

4.3 Input Specification and Design……………………………………22

4.3.1FileDesign……………………………………………………….…24

4.4 Procedure Chart …………………………………………………….25

4.5 System Flowchart…………………………………………………….26

4.6 System Requirement………………………………………………26

4.6.1Hardware Requirement…………………………………………27

4.6.2 Software Requirement………………………………..…………27

4.6.3 Operational Requirement……………………………………….27

4.6.4 Personnel Requirement………………………………………….27

CHAPTER FIVE

5.0 Implementation………………………………………..…………..28

5.1 Design Standard……………………………………………………29

5.2 Program Design……………………………………………………29

5.3Program Flowchart…………………………..…………….………30

5.4 Pseudocode…………………………………….……………..…….32

Coding

Test Data / Test Run

5.5 User Training (An Overview)………………………………..…….33

5.6 Cutover Process………………………………….…………………..33

CHAPTER SIX

6.0 Documentation……………………………………………….……….34

6.1 Program Documentation……………………………………..……….34

6.2 User Documentation…………………………….…………..……..34-35

CHAPTER SEVEN

7.0 Recommendation, Summary and Conclusion…….………..………36

7.1 Recommendation……………………………………..……….………36

7.2 Summary…………………………………………………….………….36

7.3 Conclusion………………………………………………..…………….37

Reference……………………………………………………..……………..38


CHAPTER ONE

1.0                                          INTRODUCTION

The ongoing dilemma of digital age is balancing convenience against security. Security is a system of safeguards for protecting information technology against disasters, system failure, and unauthorized access that can result in damage or loss. There are several reports of the spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data.  These have posed greater challenges on people who use database, transact online and internet users.

This project work is design to embark on a security mechanism using computerized data encryption and decryption system to resolve this problem.

Data encryption is the process of altering readable data into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concepts to create coded messages that are virtually impossible to break. As one article point out,  it is  easy to encrypt a message on a simple pc so that the biggest computer in the world couldn’t decipher it without spending far more time on the problem that exists in the life span of the entire universe.

 

 

 

There are two basic form of encryption      

Private Key and public key

Private key: Private key (symmetric) encryption means that the same secret key is used by sender and receiver to encrypt and decrypt a message. The encryption system (for “Data Encryption Standard”) was adopted as a federal standard for private key encryption in 1976.

Public key: Public key encryption means that two keys used a public key, which the receiver has made known before hand to the sender who uses it to encrypt message, and a private key, which only the receiver knows and which is required to decrypt the message.

This illustration given below show encryption system using private key/ public key.

PRIVATE KEY

 

1.1                                STATEMENT OF PROBLEM

          Most networks or organizations database inclined. For effective and conducive working atmosphere, their data must be safeguarded to a reasonable extent. Data should be protected from unauthorized alteration.

The manual method of ensuring orderliness of movement of goods and information within the firm waste time, consume large resource, high man-power utilization and slow decision support. The result achieved is redundant, inaccurate and les satisfactory.

The use of a computerized system has shown a complete balance for a security management in our contemporary age.

 

 

 

1.2                AIMS AND OBJECTIVE

The aims and objectives of this study are as follows:

–          To reduce stress, time consumption and cost of operation involved in the manual system.

–          To design a system to restrict unauthorized access to its data usage.

–          To appraise the standard of computer programming to greater height of sophisticated and general comprehensibility.

–          To suggest security techniques which can create conducive working atmosphere for organizations who are having   data threatened.

 

1.3                PURPOSE OF THE STUDY

This project work is aimed at:

–          Investigating into the old system procedures and specifications so as to appreciate their problem routines and finally design automated system.

–          Improving the response time and main output requirement in the security

–          Management.

–          Conversion of all the various system specifications obtained during the period of investigation and analysis into series of instructions that can be carried out by the system.

–          Preparing gross estimation of probable overall and direct benefit for each possible alternatives.

–          Documenting the feasibility study in a report for users and system management.

 

1.4               SIGNIFICANT OF STUDY

The significant of this project work is to, solve the problem, the world are facing in the manual system of data encryption and decryption.

It is also to serve as an area of reference for future project work for people intending to write on a related scope of study.

To introduce the larger society the service of the computer thereby giving for more efficient and effective data encryption and decryption system.

 

1.5       SCOPE/ DELIMITATION

This particular work is limited to the following:

–          Data encryption.

–          Data decryption.

–          Visual basic design.

–          Window platform.

 

1.6         LIMITATION/ CONSTRAINTS

During the study, I was confronted with a lot of constraints that inadvertently posed some sort of inconvenience on me during the project work.

I was financially incapacitated, time, poor response and inadequate of pre-existing literature on data encryption and decryption.

 

1.7         ASSUMPTIONS

It is assumed that encryption is done at the transmitter ie the while decryption is done at the individual receiver.

The program is in a window platform.

1.8                   DEFINITION OF TERMS

Encryption is the processing of altering readable data to unreadable form to prevent unauthorized access.

Decryption is the act of altering the unreadable form so that you can have access to the data using the correct procedure.

Data is unprocessed information which cannot be used for decision making.

Security is the process or system of safeguarding or protecting information technology against disaster, system failures, and unauthorized access that can result in damage or loss.

Manual system ÷ manual system is an old method and procedure of using human physical capabilities to achieve result.

Information – This is the meaningful processed data that an individual can gain knowledge for the purpose of making a decision.

Design – is the structuring construct of a system.

Implementation ÷ Implementation consist of detailed time table (using scientific aids), details conversion procedures and changeover procedure, including system testing.

 

 

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#3000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

Author: daniel

Enjoyed this Post? Share it!

Share on Facebook Tweet This!

Comments are closed.