27-09-2014, 09:56 AM
ENCRYPTION AND DECRYPTION
ENCRYPTION.docx (Size: 128.15 KB / Downloads: 326)
1. ABSTRACT
The title of our project is “ENCRYPTION AND DECRYPTION”. This project encrypts and decrypts the textual files by using RSA algorithm. Our aim is to develop the software named ENCRYPTION AND DECRYPTION that encrypts and decrypts the textual files by using RSA algorithm. Encryption and Decryption is a strong text and file encryption software for personal and professional security. It protects privacy of our email messages, documents and sensitive files by encrypting them using RSA algorithm to provide high protection against unauthorized data access.
Every day hundreds and thousands of people interact electronically, whether it is through emails, e-commerce, etc. through internet. Sending sensitive messages over the Internet is very dangerous. If you need to send sensitive messages over the Internet, you should send it in the encrypted form. Encryption and Decryption allows you easily encrypt and decrypt your messages. If you need to send sensitive information via email, simply paste the encrypted text into your email and all the recipients has to do is to decrypt the text.
2.1 Objective
The main objective of our project is to encrypt/decrypt the textual files for personal and professional security. Encryption and Decryption protects privacy of our email messages, documents and sensitive files by encrypting them using RSA algorithm to provide high protection against unauthorized data access.
Every day hundreds and thousands of people interact electronically, whether it is through emails, e-commerce, etc. through internet. The Internet is comprised of millions of interconnected communication and transfer of information around the world. People use emails to correspond with one another .The www is used for online business, data distribution, marketing, research, learning and a myriad of other activities.
Sending sensitive messages over the Internet is very dangerous as all emails are transmitted in an unsecured form and anybody - ISP, your boss, etc. can read your emails.
If you want to send sensitive information via email, simply paste the encrypted text into your email or attach the encrypted file,all the recipient has to do is to decrypt your text or file.Encryption and Decryption works with text information and files. Just select what you want to encrypt, and Encryption and Decryption software helps you keep documents, private information and files in a confidential way.
2 Scope
The scope of our project is presently specific.Both the sender and the receiver must have this software installed on their systems to encrypt/decrypt and compress/decompress the files transmitted between them.This includes all the users who want to interact electronically, whether it is through emails, e-commerce, etc.through internet in order to keep their private information confidential.
Each step is clearly stated and user will not face any ambiguity in using the software.
The software provides clarity in its functionality even to naïve users.
No complexity is involved.
The Proposed System
The proposed system is quiet simple to use. It is not complex in its functionalities. It is easy for a naïve user to use it.
If you want to send sensitive information via email, simply paste the encrypted text into your email or attach the encrypted file, all the recipient has to do is to decrypt your text or file.Encryption and Decryption works with text information and files. Just select what you want to encrypt, and Encryption and Decryption software helps you keep documents, private information and files in a confidential way.
4. FEASIBILITY STUDY
After investigation it is essential to determine whether the project is feasible or not. In feasibility study is tested whether the system to be developed would be able to accomplish its task on the working grounds. Its impact was also found to be not adverse. It was found that the user’s requirements would be met and the resources would be used in an effective manner. In feasibility study the important aspects related to the project were considered like the problem definition and the process for solution. The cost and benefit analysis was also done.
System Design
Software design sits at the technical kernel of software engineering process and is applied regardless of the development paradigm and the area of application. Once the system requirements have been analyzed and specified, system design is the first of the three technical activities- design, code and test that are required to build and verify s/w. emphasis is on translating the s/w requirements into design specification. It involves preparing I/P- O/P specifications, making security and control specification, and preparing a logical and physical design work through.
9. CONCLUSION
After implementing the system in the market its advantages were incomparable to the present contemporary systems available in the market. The most admirable feature founded was its simplicity in terms of application to the user but its highly beneficial outputs can’t be ignored. The users will be highly benefited after using the system.
There is always a room for improvement in any software, however efficient the system may be. The system is flexible enough for future modifications. The system has been factored into different modules to make the system adapt to further changes. Every effort has been made to cover all the user requirements and make it user friendly. Appropriate messages and tool tips have been provided wherever necessary.
Goals achieved: Following are the goals achieved in designing and implementing the system.
User Friendliness: The system is user friendly as any naïve user can use it and easily understand its functionality.
Security: Security is enabled as certain features and functionalities are restricted to the registered users only and also at other levels security is implemented.
Fast: The system aims to respond to the user as fast as possible.
Future Plans: The system is adaptable to the future changes if any are deployed.