03-03-2012, 02:59 PM
SENG 440 Embedded Systems
440project.pdf (Size: 506.36 KB / Downloads: 45)
Introduction
Project Objective
Internet is an effective way to electronically transmit data; there are many types of
data and messages that people would want to be kept secret. When data is created,
the privacy of the data is required. Data encryption can protect data from being
viewed by unintended recipients. The use of encryption restricts for exploration to
other people. For communication between two people, data encryption is needed to
make sure that the transmitting data is secure.
Technical Background
The major part in any data encryption systems is its private key; any person without
the correct key will not be able to decrypt the encrypted message. Thus, it is
absolutely crucial that private key is robust to anonymous attacks. Otherwise, critical
information may be accessible to unauthorized personnel.
In this project, the private key is its encryption algorithm. For simplicity, three bits per
character byte will be shuffled, as defined in the requirement. More bits per byte
could be shuffled if required; however, it is considered to be beyond the scope of
this course. Nevertheless, similar approach could be followed
Design Documentation
UML (Unified Modeling Language)
Since the data encryption performed in this project is simple, a use case, detailed
class, and sequence diagram were used for its UML design purposes.
[Use Case Diagram]
A use case diagram, as shown in Figure 2, generally describes how a system will be
used and provides an overview of functionalities of the system. The data encryption
scenario can be extracted as follow:
1. User transfers input file to the system
2. Controller detects that the file is valid
3. Controller reads raw data from an input file
4. Controller requests encryption process
5. Controller receives encrypted data
6. Controller writes encrypted data to an output file