Download the complete computer science project topic and material (chapter 1-5) titled DESIGN OF CRYPTOSYSTEM USING SYMMETRIC KEY OF ADVANCED ENCRYPTION STANDARD ALGORITHM (A CASE STUDY OF EXAMS AND RECORD FEDERAL POLYTECHNIC BAUCHI) here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.

 

3,000.00

Download the complete computer science project topic and material (chapter 1-5) titled DESIGN OF CRYPTOSYSTEM USING SYMMETRIC KEY OF ADVANCED ENCRYPTION STANDARD ALGORITHM (A CASE STUDY OF EXAMS AND RECORD FEDERAL POLYTECHNIC BAUCHI) here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.

 

PROJECT TOPIC AND MATERIAL ON DESIGN OF CRYPTOSYSTEM USING SYMMETRIC KEY OF ADVANCED ENCRYPTION STANDARD ALGORITHM (A CASE STUDY OF EXAMS AND RECORD FEDERAL POLYTECHNIC BAUCHI)

The Project File Details

  • Name: DESIGN OF CRYPTOSYSTEM USING SYMMETRIC KEY OF ADVANCED ENCRYPTION STANDARD ALGORITHM (A CASE STUDY OF EXAMS AND RECORD FEDERAL POLYTECHNIC BAUCHI)
  • Type: PDF and MS Word (DOC)
  • Size: [686KB]
  • Length: [45] Pages

 

ABSTRACT

This project implements cryptosystem, a proposed model for data encryption and decryption is considered, using the symmetric key algorithm of the advance encryption standard, which was implemented by C# programming language, a multi-paradigm programming languageencompassing  strong typing, imperative,  declarative,  functionalgenericobject-oriented (class-based), and  component- orientedprogramming disciplines that was developed by Microsoft within its .NET initiative was the tool used to achieve the design which is aimed to secure files, folders, data integrity and other computer  privacy.

 

TABLE OF CONTENTS

Title page        –           –           –           –           –           –           –           –           –           i

Approval page            –           –           –           –           –           –           –           –           iii

Dedication      –           –           –           –           –           –           –           –           –           iv

Declaration     –           –           –           –           –           –           –           –           –           v

Acknowledgement     –           –           –           –           –           –           –           –           vi

Abstract          –           –           –           –           –           –           –           –           –           vii

Table of content          –           –           –           –           –           –           –           –           viii

CHAPTER ONE

1.0       Background of Study-            –           –           –           –           –           –           –           1

1.1       Statement of problem –           –           –           –           –           –           –           2

1.2       Aim and objectives     –           –           –           –           –           –           –           3

1.3       Scope and limitation of study –           –           –           –           –           –           4

1.4       Justification of the study        –           –           –           –           –           –           4

1.5       Research Methodology           –           –           –           –           –           –           4

1.6       Definition of terms     –           –           –           –           –           –           –           4

CHAPTER TWO

2.0       Literature review         –           –           –           –           –           –           –           6

2.1       Cryptography  –           –           –           –           –           –           –           –           6

2.2       Cryptosystem     –           –           –           –           –           –           –           –           6

2.3       Early VS. Modern Cryptography-      –           –           –           –           –           7

2.4       Types ofCryptographic Algorithms    –           –           –           –           –           8

2.4.1    Public-KeyCryptography or AsymmetricKeyCryptography  –          8

2.4.2    Symmetric KeyCryptographyor SecretKeyCryptography      –          11

2.5       Advanced Encryption Standard         –           –           –           –           –           13

2.6       Variations Among Encryption Algorithms     –           –           –           –           13

2.7       Factors Influencing Encryption Product Selection     –           –           –           14

2.8       Data Security  –           –           –           –           –           –           –           –           15

 

CHAPTER THREE

3.0.      Methodology  –           –           –           –           –           –           –           –           17

3.1       Data Capture Method –           –           –           –           –           –           –           18

3.2       Analysis of Existing System               –           –           –           –           –           19

3.2.1    Disadvantage of the Existing System –           –           –           –           –           19

3.3       The Proposed System-            –           –           –           –           –           –           20

3.3.1    System Block Diagram-          –           –           –           –           –           –           21

3.4       System Design-           –           –           –           –           –           –           –           22

3.4.1    Output design –           –           –           –           –           –           –           –           23

3.4.2    Input design    –           –           –           –           –           –           –           –           24

3.4.3    System Flowchart       –           –           –           –           –           –           –           25

3.5       Algorithm        –           –           –           –           –           –           –           –           26

 

CHAPTER FOUR

4.0       System implementation           –           –           –           –           –           –           28

4.1       System testing –           –           –           –           –           –           –           –           29

4.2       System requirement    –           –           –           –           –           –           –           30

4.2.1    Hardware requirements           –           –           –           –           –           –           30

4.2.2    Software requirement –           –           –           –           –           –           –           30

4.3       Conversion method     –           –           –           –           –           –           –           31

4.4       Result  –           –           –           –           –           –           –           –           –           31

4.5       Discussion of Result   –           –           –           –           –           –           –           33

4.6       Documentation           –           –           –           –           –           –           –           33

4.6.1    User guide       –           –           –           –           –           –           –           –           34

CHAPTER FIVE

5.0       Summary, Conclusion and Recommendation –           –           –           –           35

5.1       Summary         –           –           –           –           –           –           –           –           35

5.2       Conclusion      –           –           –           –           –           –           –           –           35

5.3       Recommendations      –           –           –           –           –           –           –           36

References

Appendices

List of Tables

Table 1: Factors Influencing Encryption        –           –           –           –           –           14

List of Figures

Figure 1: Water Fall Model    –           –           –           –           –           –           –           17

Figure 2:ERD System Block Diagram           –           –           –           –           –           21

Figure 3: Output Design         –           –           –           –           –           –           –           23

Figure 4: Input Design            –           –           –           –           –           –           –           24

Figure 5. System Flowchart                –           –           –           –           –           –           25

Figure 6 Symmetric Key Cryptosystem         –           –           –           –           –           27

Figure 7: Use case UML of the Proposed System     –           –           –           –           28

Figure 8: Encrypted Result 1  –           –           –           –           –           –           –           31

Figure 9: Plaintext for Result Testing 1          –           –           –           –           –           32

Figure10: Encrypted Result 2 –           –           –           –           –           –           –           32

Figure 11: Plaintext for Result Testing 2        –           –           –           –           –           33

CHAPTER ONE

  • Background of Study

Cryptosystem is one of the methods used to maintain security in data transmission. Along with the increase in importance, many methods are found and extended use. Among these methods are methods that only requires a simple mathematical operation, but there is also a method that involves the theory of complex and difficult implementation. Cryptographic methods are used to secure confidential data so that the data is not known to others who are not interested.

Acryptosystemgenerallyperformstwofunctions:encryption anddecryption. Encryption’s fundamental purpose is to ensure privacy and data integrity. Encryption involves converting datafromplaintext(ornormaltext)intociphertext, which makes data unintelligible to any unauthorizedparties.Decryptionreversestheencryptionprocess,restoringthedatatoitsoriginalform. Asystem’susermusthaveauniquekeyinordertosendorreceiveanencryptedmessage.Thestrength ofanencryptionsystemdependsbothuponthestrengthofitsalgorithmand,often,onthelength of the keys used for encryption and decryption. A key is a mathematical value used in conjunction with a cryptographic algorithm. Longer key lengths (that is, more digits) usually mean greater security because therearemorepossiblecombinationsforan unauthorized observer to examine.Ina symmetric (secret- key)cryptosystem,asinglekeyisusedtoperformbothencryptionanddecryption.Asymmetric (public-key) cryptosystems use different keys for encryption and decryption.

Cryptography is one of the methods used to maintain security in data transmission. Along with the increase in importance, many methods are found and extended use. Among these methods are methods that only requires a simple mathematical operation, but there is also a method that involves the theory of complex and difficult implementation.

 

However, in 2000, precisely in October Rijndael algorithm was selected as a standard algorithm for encryption. Rijndael algorithm is then known as the Advanced Encryption Standard (AES) Benaloh, (2009). The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible others can tap into and alter transmitted data as the number of users that many in a computer network. Therefore, the system of data security and confidentiality of data is one important aspect in the development of the world of telecommunications, especially communications and using computers connected to the network.

  • Statement of Problems

Data losses, regulatory compliance and peer pressure are pushing organizations to take action on encryption at a corporate level; many organizations are discovering that it is already being used in small user groups throughout the organization. It can seem that it might be easier to just add encryption to one workgroup, one data type at a time to cope data breaches happening around the organization. Studies suggest that the overwhelming majority of data breaches originate from inside the organization. New research indicates that as breaches occur more often, they also are getting increasingly costly: According to the study, data breach incidents cost great lost to the organization, including losses associated with customer churn and acquisition, represented the most significant component of the cost increase.

One of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. When you consider the millions of electronic messages that traverse the Internet each day, it is easy to see how a well-placed network sniffer might capture a wealth of information that users would not like to have disclosed to unintended readers. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of cryptography, to prevent intruders from being able to use the information that they capture.

  • Aim and Objectives

This project is aimed at designing a cryptosystem to secure files, folders and other computer resources, and the objectives are to:

  • Ensure communication confidentiality (the information cannot be understood by anyone for whom it was unintended)
  • Protect information integrity: the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected
  • Ensurenon-repudiation of message: the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information
  • Message Authentication: the sender and receiver can confirm each other’s identity and the origin/destination of the information

 

  • Scope and Limitation of Study

The study shall be limited to text encryption in a selected department namely Exams and record Department of The Federal Polytechnic Bauchi whom basically deal with  sensitive information that will not be allowed into the hand of a third party and in which altering will post great danger.

However, this project covers encryption of text records handled in the exams and record department of Federal Polytechnic Bauchi.Information this department deals with are very classified information that hold a lot about the participation of students that has gone through one discipline or other in the school that will be referenced in time to come.

  • Justification of Study

On completion of this project, through better understanding of information security and development of a cryptosystem, computer software that shall help to maintain security in data transmission shall be designed and hence improve effectively, confidential and authentic communicate within the department.

  • Research Methodology

The methods used for gathering information for this project work were by research, interview, consulting relevant text books, surfing the internet e.t.c which lead to better understanding of the project and its implementation. The program will be developed using visualstudio.net programming language.

  • Definition of Terms
  1. Plaintext:Thisistheoriginalintelligible messageordatathatisfedto thealgorithmasinput.
  2. Encryptionalgorithm:Theencryptionalgorithm performsvarioussubstitutionsandpermutationsontheplaintext
  3. SecretKey:The secretkeyisalsoinput to theencryptionalgorithm. The exactsubstitutionsandpermutationsperformeddependonthekey used.
  4. Ciphertext:This isthescrambledmessageproducedasoutput. It depends ontheplaintextand the key. The ciphertextisanapparently randomstreamofdata, asitstands, isunintelligible.
  5. DecryptionAlgorithm: Thisisessentially the encryptionalgorithm runinreverse.  Ittakes theciphertextandthesecretkeyandproduces theoriginalplaintext
  6. Symmetric Algorithms: Where the key is used for encryption and decryption keys arethe same.
  7. Asymmetric Algorithm: This algorithm is an algorithm where the encryption key usedis not the same as the decryption key.

 

See more computer science project topics and materials

GET THE FULL WORK

Reply to Frank...
WhatsApp Us!
Frank Umeadi
Hello! My name is Frank Umeadi. I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance on DESIGN OF CRYPTOSYSTEM USING SYMMETRIC KEY OF ADVANCED ENCRYPTION STANDARD ALGORITHM (A CASE STUDY OF EXAMS AND RECORD FEDERAL POLYTECHNIC BAUCHI).