ABSTRACT
It
is due to insecurity in files and data that this project is designed using
cryptograph method (conversion of plain text into cipher text (encrypted text))
and conversion of cipher text into plain text (decryption) using key that is
known to both sender and receiver of such file or data. When a file is
encrypted, only the intended user (receiver or sender) can view it by
decrypting it using their symmetric key (password) otherwise, it will be displayed
as a corrupted file and a message “Access is denied” will be displayed showing
that such user is un-authorized. Package like Ms-Word, Ms- Excel, as well as slide
are attached to the program for users to use and encrypt such file after
saving.
File
encryption is the process of translating plain text data into something
meaningless (cipher text) while decryption is the reverse. Visual Basic
programming language is used in designing this security program to protect file
and data in order to achieve its aims and objectives.
CHAPTER ONE
INTRODUCTION
There are a number of methods for security measures to be attached to files or documents, these may include file password or file locking, data / file encryption and decryption, installation of antivirus, USB encryption, laptop encryption, firewall, password encryption, database encryption, disk encryption for data etc. Since the use of the computer is so wide and data or file security is very important, an important concept to note is that data or file encryption is one of the best security measures and can be incorporated into systems that participate in data or file transfer and sharing to allow for privacy. This is because it places security measure on the system on the data itself. Applications need to have a way of encrypting data or documents before sending to the recipient(s) at the receiving end, and the recipient should also be able to have a means to decrypt or unlock the encrypted message being sent. This is made possible by using a unique pass code (key or password) for both the encryption and the decryption processes. Encryption is the process of translating plain text data (plain text) into something that appears to be random and meaningless (cipher text). Decryption is the process of converting cipher text back to plain text. To encrypt more than a small amount of data, symmetric encryption is used because it renders main security goals which are privacy and authenticity of the communicated data. A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of cipher text, the key that was used to encrypt the data must be used.
Symmetric-key cryptography, where the same key is
used for both encryption and decryption |
Fig.1.0 Symmetric key cryptography
process description
The
goal of every encryption algorithm is to make it as difficult as possible to
decrypt the generated cipher text without using the key. If a really good
encryption algorithm is used, there is no technique significantly better than methodically
trying every possible key. For such an algorithm, the longer the key, the more
difficult it is to decrypt a piece of cipher text without possessing the key.
It
is difficult to determine the quality of an encryption algorithm. Algorithms
that look promising sometimes turn out to be very easy to break, given the
proper attack. When selecting an encryption algorithm, it is a good idea to
choose one that has been in use for several years and has successfully resisted
all attacks.
1.0
Background of the Study
Due to insecurities in files and
data, many researchers over the years in the ICT fields have carried out
numerous researches in files/data encryption and decryption. They have
encrypted and decrypted files using both private and public keys and even other
minor methods when sending or receiving files on the internet. Public keys data
encryption and decryption method and other minor methods have been found out to
be slow and not suitable for large ranges of data/files as a result most
researchers have recommended files/data encryption and decryption using the
symmetric – key type (private key) of data encryption and decryption.
The
method to be used for data encryption and decryption is cryptography. Cryptography is therefore the science of using mathematics
to encrypt and decrypt information. Once the information has been encrypted, it
can be stored on insecure media or transmitted on an insecure network (like the
Internet) so that it cannot be read by anyone except the intended recipient.
Cipher
algorithm will be used, which can be defined thus: A
cryptographic algorithm, or cipher, is a mathematical function used in the
encryption and decryption process. A cryptographic algorithm works in
combination with a key (a number, word, or phrase) to encrypt and decrypt data.
To encrypt, the algorithm mathematically combines the information to be
protected with a supplied key. The result of this combination is the encrypted
data. To decrypt, the algorithm performs a calculation combining the encrypted
data with a supplied key. The result of this combination is the decrypted data.
If either the key or the data is modified, the algorithm produces a different
result. The goal of every encryption algorithm is to make it as difficult as
possible to decrypt the generated cipher text without using the key. If a
really good encryption algorithm is used, then there is no technique
significantly better than methodically trying every possible key. Even for a
key size of just 40 bits, this works out to 2ˆ40 (just over 1 trillion)
possible keys.
1.1
Statement of the Problem
A
lot of problems are always being encountered during the process of data or file
transfer and sharing and even chatting or sending Email among clients or
server-to client on a network. The problem arises as a result of data or file
insecurity over a network. Since the data or file can be transferred or shared
among clients or users on a network, some protocols are being breached which
leads some clients or users to having or gaining access to data or
file/document they are not supposed to. Because of these problems, this then
calls for a research to address the problems on file insecurities using
cryptographic algorithm or cipher. These problems can be tackled by joint
efforts of software programmers, analysts and researchers in ICT field.
1.2
Aim and Objectives Of the study
This
project is aimed at designing and implementing security software using
cryptography method (process in which plain text is converted to cipher text
(encrypted text) which uses a key that is known to both sender and receiver and
a process in which cipher text is converted to plain text (decrypted text)). It
would be developed for individuals or organisations that need to secure their
files and other document.
Specifically,
the objectives of this project are stated as follows:
- To ensure that data
files resident on a system are well secured or protected.
- To ensure data
communication a client-to-client or server-to-client relationship on a network.
- Securities and
confidentiality of personal document for clients or users on a network involved
in data or transfer or sharing.
- To replace the
traditional unsecured chatting and file transfer application with a more
secured encryption and decryption enabled data communication application
- To ensure that illegal
alterations to personal or confidential information is greatly reduced.