Sunteți pe pagina 1din 5

Lawal Abimbola A.

H/CS/16/385
Research Methodology COM 325

Introduction

Since times immemorial, the major issues in data communication are security of data to

maintain its confidentiality, proper access control, integrity and availability of data. As soon

as a sensitive message was etched on a clay tablet or written on the royal walls, then it must

have been foremost in the senders mind that the information should not get intercepted and

read by a rival.

Today in the e-age, the need to protect communications from prying eyes is greater than ever

before. Cryptography, the science of encryption plays a central role in mobile phone

communication, e-commerce, pay-TV, sending private e-mails, transmitting financial

information and touches on many aspects of daily lives.

Aims and Objectives of the Study

The aim of the study is to develop a computer data encryption and decryption systems. The

following are the objectives of the study:

1. To develop software that will aid the encryption of data.


2. To implement a system that will allow authorized users only to decrypt record data.
3. To design a system that maintains a database of records that can be encrypted.

Significance of the Study

The significance of the study is that it will provide an effective means to secure data. The

study is also significant in that it will serve as a useful research material for other researchers

seeking information concerning the subject.

Scope of the Study

The research work is designed to encrypt data and decrypt data only by the authorized user.

Statement of the Problem


Lawal Abimbola A. H/CS/16/385
Research Methodology COM 325

The following problems were identified in managing data.

1. Do not have an efficient system to secure their information.


2. Accumulation of paper files
3. Unauthorized access to sensitive information

Literature Review

Theoretical background

The recent proliferation of powerful and inexpensive encryption technology has given law-

abiding citizens and criminals alike an unprecedented ability to keep their secrets safe. Potent

encryption software is freely available online and even a novice computer user now has the

power to protect her private and confidential data behind a virtually impenetrable wall of

protection. Yet, the spread of encryption has also seriously hindered law enforcement during

the investigation of cybercrimes.

Criminals are able to hide incriminating digital evidence in encrypted hard drives and volume

which can make it impossible for investigators to access the data. There is therefore need for

courts to encrypt their data before anyone can have access to them.

Todays technology can be traced back to earliest ciphers, and have grown as a result of

evolution. The initial ciphers were cracked, so new stringer ciphers emerged. Code breakers

set to work on these and eventually found flaws, forcing cryptographers to invent better

cipher and so on. The significance of key is an enduring principles of cryptography.

Conventional encryption is referred to as symmetric encryption or single key encryption. It

was the only type of encryption is use prior to the development of public-key encryption.

Conversional encryption can further be divided into the categories of classical and modern

techniques. The hallmark of the classical techniques is that the cipher or the key to the
Lawal Abimbola A. H/CS/16/385
Research Methodology COM 325

algorithm is shared i.e. known by the party involved in the secured communication. So there

are two types of cryptography, they are:

Secret key cryptography


Public key cryptography

In secret key, the same key is used for both encryption and decryption. In public key

cryptography each user has a public key and a private key.

Amrita Sahu et al proposed a new key generation algorithm based on palm print which is

used encryption and decryption of an image. Our scheme allows one party to a secret image

to another party over the open network, even if eavesdroppers listen. This scheme gives

reliable security. They presented an image encryption/decryption scheme based on bit XOR

method in this paper. The salient features of the proposed asymmetry image encryption

scheme can be summarized as:

1. Lossless encryption of image


2. Loss computational complexity
3. Convenient realization
4. Choosing a suitable size of matrix according to the size image
5. Encryption/decryption scheme uses integer arithmetic and logic operations.

Iirfan Landge et.al describes that both color and black & white image of any size saved in

tagged image file format (TIF) can be encrypted & decrypted using Blowfish algorithm.

Histogram of encrypted image is less dynamic and significantly different from the respective

histograms of the original image. Blowfish cannot be broken until an attacker tries 28r+1

combinations where, r is the number of rounds.

Rajan S.Jamgeker et al shows that MREA algorithm is used to encrypt files and transcript

files to other end where it is decrypted.

Methodology
Lawal Abimbola A. H/CS/16/385
Research Methodology COM 325

File Encryption Methodology

The threat of illegal data access, storage transmission and data security has become

significant subject. As a result, cryptography as a means of protecting or security systems and

network is proposed to protect them from unauthorized readers and illegal reproduction.

Various means of security networks and systems have been adopted in the past and they have

faced various challenges such as cracking, hacking and attacking of the system.

Result and Discussion

The purpose of system implementation can be summarized as making the new system

available to a prepared set of users (the deployment), and positioning on-going support and

maintenance of the system within the performing organization (the transition). At a finer level

of details, deploying the system consists of executing all the steps necessary to educate the

users on the use of the new system, placing the newly developed system into production,

confirming that all data required at the start of operations is available and accurate, and

validating that business functions that interact with the system are functioning properly.

Conclusion

After implementing the system in the market its advantages were incomparable to the present

contemporary systems available in the market. The most admirable feature founded was its

simplicity in terms of application to the user but its highly beneficial outputs cant be ignored.

The users will be highly benefited after using the system.

There is always a room for improvement in any software, however efficient the system may

be. The system is flexible enough for future modifications. The system has been factored into
Lawal Abimbola A. H/CS/16/385
Research Methodology COM 325

different modules to make the system adapt to further changes. Every effort has been made to

cover all the user requirements and make it user friendly.

References

Baker, M. (2005, January). Keeping a Secret. Technology Review, 108(1), 82-83. RetrievedAugust

2, 2008, from Academic Search Premier database.

Bhargav-Spantzel,A., Camenisch, J., Gross, T., & Sommer, D. (2007, October). User centricity:A

taxonomy and open issues. Journal of Computer Security, 15(5), 493-527. RetrievedAugust 2, 2008,

from Academic Search Premier database.

Bohli, J., Gonzlez Vasco, M., & Steinwandt, R. (2007, July). Secure group key establishment

revisited. International Journal of Information Security, 6(4), 243-254. Retrieved August2, 2008,

doi:10.1007/s10207-007-0018-x

Callas,J. (2007, January). The Future of Cryptography. Information Systems Security, 16(1), 15-22.

Retrieved August 2, 2008, doi:10.1080/10658980601051284

Fagin, B., Baird, L., Humphries, J., & Schweitzer, D., (2008, January). Skepticism and

Cryptography. Knowledge, Technology & Policy, 20(4), 231-242. Retrieved August 2,2008,

doi:10.1007/s12130-007-9030-8

Webb, W. (2006, July 20). Hack-proof design. (cover story). EDN, 51(15), 46-54.Retrieved August

2, 2008, from Academic Search Premier database.

S-ar putea să vă placă și