Download the complete computer science project topic and material (chapter 1-5) titled DESIGN OF CRYPTOSYSTEM USING SYMMETRIC KEY OF ADVANCED ENCRYPTION STANDARD ALGORITHM (A CASE STUDY OF EXAMS AND RECORD FEDERAL POLYTECHNIC BAUCHI) here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.
The Project File Details
This project implements cryptosystem, a proposed model for data encryption and decryption is considered, using the symmetric key algorithm of the advance encryption standard, which was implemented by C# programming language, a multi-paradigm programming languageencompassing strong typing, imperative, declarative, functional, generic, object-oriented (class-based), and component- orientedprogramming disciplines that was developed by Microsoft within its .NET initiative was the tool used to achieve the design which is aimed to secure files, folders, data integrity and other computer privacy.
Title page – – – – – – – – – i
Approval page – – – – – – – – iii
Dedication – – – – – – – – – iv
Declaration – – – – – – – – – v
Acknowledgement – – – – – – – – vi
Abstract – – – – – – – – – vii
Table of content – – – – – – – – viii
1.0 Background of Study- – – – – – – – 1
1.1 Statement of problem – – – – – – – 2
1.2 Aim and objectives – – – – – – – 3
1.3 Scope and limitation of study – – – – – – 4
1.4 Justification of the study – – – – – – 4
1.5 Research Methodology – – – – – – 4
1.6 Definition of terms – – – – – – – 4
2.0 Literature review – – – – – – – 6
2.1 Cryptography – – – – – – – – 6
2.2 Cryptosystem – – – – – – – – 6
2.3 Early VS. Modern Cryptography- – – – – – 7
2.4 Types ofCryptographic Algorithms – – – – – 8
2.4.1 Public-KeyCryptography or AsymmetricKeyCryptography – 8
2.4.2 Symmetric KeyCryptographyor SecretKeyCryptography – 11
2.5 Advanced Encryption Standard – – – – – 13
2.6 Variations Among Encryption Algorithms – – – – 13
2.7 Factors Influencing Encryption Product Selection – – – 14
2.8 Data Security – – – – – – – – 15
Cryptosystem is one of the methods used to maintain security in data transmission. Along with the increase in importance, many methods are found and extended use. Among these methods are methods that only requires a simple mathematical operation, but there is also a method that involves the theory of complex and difficult implementation. Cryptographic methods are used to secure confidential data so that the data is not known to others who are not interested.
Acryptosystemgenerallyperformstwofunctions:encryption anddecryption. Encryption’s fundamental purpose is to ensure privacy and data integrity. Encryption involves converting datafromplaintext(ornormaltext)intociphertext, which makes data unintelligible to any unauthorizedparties.Decryptionreversestheencryptionprocess,restoringthedatatoitsoriginalform. Asystem’susermusthaveauniquekeyinordertosendorreceiveanencryptedmessage.Thestrength ofanencryptionsystemdependsbothuponthestrengthofitsalgorithmand,often,onthelength of the keys used for encryption and decryption. A key is a mathematical value used in conjunction with a cryptographic algorithm. Longer key lengths (that is, more digits) usually mean greater security because therearemorepossiblecombinationsforan unauthorized observer to examine.Ina symmetric (secret- key)cryptosystem,asinglekeyisusedtoperformbothencryptionanddecryption.Asymmetric (public-key) cryptosystems use different keys for encryption and decryption.
Cryptography is one of the methods used to maintain security in data transmission. Along with the increase in importance, many methods are found and extended use. Among these methods are methods that only requires a simple mathematical operation, but there is also a method that involves the theory of complex and difficult implementation.
However, in 2000, precisely in October Rijndael algorithm was selected as a standard algorithm for encryption. Rijndael algorithm is then known as the Advanced Encryption Standard (AES) Benaloh, (2009). The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible others can tap into and alter transmitted data as the number of users that many in a computer network. Therefore, the system of data security and confidentiality of data is one important aspect in the development of the world of telecommunications, especially communications and using computers connected to the network.
Data losses, regulatory compliance and peer pressure are pushing organizations to take action on encryption at a corporate level; many organizations are discovering that it is already being used in small user groups throughout the organization. It can seem that it might be easier to just add encryption to one workgroup, one data type at a time to cope data breaches happening around the organization. Studies suggest that the overwhelming majority of data breaches originate from inside the organization. New research indicates that as breaches occur more often, they also are getting increasingly costly: According to the study, data breach incidents cost great lost to the organization, including losses associated with customer churn and acquisition, represented the most significant component of the cost increase.
One of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. When you consider the millions of electronic messages that traverse the Internet each day, it is easy to see how a well-placed network sniffer might capture a wealth of information that users would not like to have disclosed to unintended readers. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of cryptography, to prevent intruders from being able to use the information that they capture.
This project is aimed at designing a cryptosystem to secure files, folders and other computer resources, and the objectives are to:
The study shall be limited to text encryption in a selected department namely Exams and record Department of The Federal Polytechnic Bauchi whom basically deal with sensitive information that will not be allowed into the hand of a third party and in which altering will post great danger.
However, this project covers encryption of text records handled in the exams and record department of Federal Polytechnic Bauchi.Information this department deals with are very classified information that hold a lot about the participation of students that has gone through one discipline or other in the school that will be referenced in time to come.
On completion of this project, through better understanding of information security and development of a cryptosystem, computer software that shall help to maintain security in data transmission shall be designed and hence improve effectively, confidential and authentic communicate within the department.
The methods used for gathering information for this project work were by research, interview, consulting relevant text books, surfing the internet e.t.c which lead to better understanding of the project and its implementation. The program will be developed using visualstudio.net programming language.
All project works, files and documents posted on this website, projects.ng are the property/copyright of their respective owners. They are for research reference/guidance purposes only and the works are crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a guidance purpose only and not copy the work word for word (verbatim). Projects.ng is a repository of research works just like academia.edu, researchgate.net, scribd.com, docsity.com, coursehero and many other platforms where users upload works. The paid subscription on projects.ng is a means by which the website is maintained to support Open Education. If you see your work posted here, and you want it to be removed/credited, please call us on +2348159154070 or send us a mail together with the web address link to the work, to [email protected] We will reply to and honor every request. Please notice it may take up to 24 – 48 hours to process your request.