ABSTRACT
The use of manual system of data
encryption and decryption has a damaging implication resultant on the images in
some companies and the negative impact this trend has had on the users of such
system. Much resource is lost annually by firms due to the uncontrolled and
unscientific nature of this system.
In this traditional system, to
guarantee privacy of information / communications between any two subscribes in
a network consisting of 1000 members, 499,500 secret keys would be necessary,
one for each possible combination of sender and receivers. Keys have been
distributed by a secure channel such as a trusted courier with an attached case
manual led to a wrist, a costly and time consuming method.
This particular project is set to
appraise already existing system by designing a better one which will
facilitate the level of satisfaction and competence in the challenges in
information technology.
ORGANISATION
OF WORK
This
project work titled design and implementation of computerized data encryption
and decryption system is organized into different chapters.
Chapter one introduces the project
work, purpose of the study, aims and objectives. The limitations, scope of work
and assumptions were also included. This section ended with a definition of
term used in the project work.
The review of books and literature
of different scholars with respect to the above caption are summarized in
chapter two to bring clarification.
I went forward in chapter three to
describe and analyze the already existing system using procedure chart,
information flow chart etc.
The chapter four and five of this
work dealt intensively on the design and implementation of the new computerized
system using diagrams and programs.
Documentation of the information the
subsequent users of the software is elaborated in chapter six.
Finally, I have declared a
recommendation and conclusion section for anybody who is interested in this
work piece as shown in the chapter seven.
LIST
OF FIGURE
Fig 3.1
Information Flow Diagram
Table 4.1 Output Report
Table 4.2 Input Form
Fig 4.2.1 File
Design
Fig 4.2.2 System
Flowchart
Fig5.1
Program Flowchart
Fig
5.2 Database Design
TABLE
OF CONTENT
Title page
…………………………………………………………… i
Certification……………………………………………………………..ii
Approval
page……………………………………………….……. iii
Dedication
……………………………………………….………… iv
Acknowledgement
……………………………………..…………….v-vi
Abstract
…………………………………………………………………..vii
Organization of
work………………………………………….………vii-ix
list of figure
…………………………………………………………………………………..x
CHAPTER ONE
1.0
INTRODUCTION…………………………………………………1-3
1.1 Statement of the
Problem…………………………………………3
1.2 Aims and Objectives……………………………………………….4
1.3 Purpose of the
Study………………………………………..….4-5
1.4 Significance of
Study…………………………………………….5
1.5 Scope/
Delimitation………………………………………..……5-6
1.6 Limitations /
Constraints…………………………………………6
1.7 Assumption of
Study……………………………………..………6
1.8 Definition of
Terms………………………………………………6-7
CHAPTER TWO
2.0 Review
of Literature……………………………………………8
CHAPTER THREE
3.0 Description and Analysis of the Existing System……………..15
3.1 Fact Finding Method /
Methodology………………………15-16
3.3 Objective of the Existing
System…………………………….…17
3.4 Input, Process and Output
Analysis……………………………17
3.4.1 Input
Analysis………………………………………………….17-18
3.4.2 Process
Analysis………………………………………..…………18
3.4.3 Output
Analysis……………………………………….……………..18
3.5 Information Flow
Diagram……………………………..……………19
3.6 Problems of
Existing……………………………………………….19-20
3.7Justification for the New
System……………………………………20
CHAPTER FOUR
4.0 Design of the New System
4.1Design
Standard………………………………………………………21
4.2 Output Specification and
Design…………………………………..21
4.3 Input Specification and
Design……………………………………22
4.3.1FileDesign……………………………………………………….…24
4.4 Procedure Chart
…………………………………………………….25
4.5 System
Flowchart…………………………………………………….26
4.6 System
Requirement………………………………………………26
4.6.1Hardware Requirement…………………………………………27
4.6.2 Software
Requirement………………………………..…………27
4.6.3 Operational
Requirement……………………………………….27
4.6.4 Personnel
Requirement………………………………………….27
CHAPTER FIVE
5.0
Implementation………………………………………..…………..28
5.1 Design
Standard……………………………………………………29
5.2 Program
Design……………………………………………………29
5.3Program
Flowchart…………………………..…………….………30
5.4
Pseudocode…………………………………….……………..…….32
Coding
Test Data / Test Run
5.5 User Training (An
Overview)………………………………..…….33
5.6 Cutover
Process………………………………….…………………..33
CHAPTER SIX
6.0
Documentation……………………………………………….……….34
6.1 Program
Documentation……………………………………..……….34
6.2 User
Documentation…………………………….…………..……..34-35
CHAPTER SEVEN
7.0 Recommendation, Summary and
Conclusion…….………..………36
7.1
Recommendation……………………………………..……….………36
7.2
Summary…………………………………………………….………….36
7.3
Conclusion………………………………………………..…………….37
Reference……………………………………………………..……………..38
CHAPTER
ONE
1.0
INTRODUCTION
The ongoing dilemma of digital age
is balancing convenience against security. Security is a system of safeguards
for protecting information technology against disasters, system failure, and
unauthorized access that can result in damage or loss. There are several
reports of the spammers, crawlers and hackers who break into people’s privacy
to gain illegal access to their data. These have posed greater challenges
on people who use database, transact online and internet users.
This project work is design to embark
on a security mechanism using computerized data encryption and decryption
system to resolve this problem.
Data encryption is the process of
altering readable data into unreadable form to prevent unauthorized access.
Encryption is able to use powerful mathematical concepts to create coded
messages that are virtually impossible to break. As one article point
out, it is easy to encrypt a message on a simple pc so that the
biggest computer in the world couldn’t decipher it without spending far more
time on the problem that exists in the life span of the entire universe.
There are two basic form of
encryption
Private Key and public key
Private key: Private key (symmetric)
encryption means that the same secret key is used by sender and receiver to
encrypt and decrypt a message. The encryption system (for “Data Encryption
Standard”) was adopted as a federal standard for private key encryption in
1976.
Public key: Public key encryption
means that two keys used a public key, which the receiver has made known before
hand to the sender who uses it to encrypt message, and a private key, which
only the receiver knows and which is required to decrypt the message.
This illustration given below show
encryption system using private key/ public key.
PRIVATE KEY
1.1
STATEMENT OF PROBLEM
Most networks or organizations
database inclined. For effective and conducive working atmosphere, their data
must be safeguarded to a reasonable extent. Data should be protected from unauthorized
alteration.
The manual method of ensuring
orderliness of movement of goods and information within the firm waste time,
consume large resource, high man-power utilization and slow decision support.
The result achieved is redundant, inaccurate and les satisfactory.
The use of a computerized system has
shown a complete balance for a security management in our contemporary age.
1.2
AIMS AND OBJECTIVE
The aims and objectives of this
study are as follows:
-
To reduce stress, time consumption and cost of operation involved in the manual
system.
-
To design a system to restrict unauthorized access to its data usage.
-
To appraise the standard of computer programming to greater height of
sophisticated and general comprehensibility.
-
To suggest security techniques which can create conducive working atmosphere
for organizations who are having data threatened.
1.3
PURPOSE OF THE STUDY
This project work is aimed at:
-
Investigating into the old system procedures and specifications so as to
appreciate their problem routines and finally design automated system.
-
Improving the response time and main output requirement in the security
-
Management.
-
Conversion of all the various system specifications obtained during the period
of investigation and analysis into series of instructions that can be carried out
by the system.
-
Preparing gross estimation of probable overall and direct benefit for each
possible alternatives.
-
Documenting the feasibility study in a report for users and system management.
1.4
SIGNIFICANT OF STUDY
The significant of this project work
is to, solve the problem, the world are facing in the manual system of data
encryption and decryption.
It is also to serve as an area of
reference for future project work for people intending to write on a related scope
of study.
To introduce the larger society the
service of the computer thereby giving for more efficient and effective data
encryption and decryption system.
1.5
SCOPE/ DELIMITATION
This particular work is limited to
the following:
-
Data encryption.
-
Data decryption.
-
Visual basic design.
-
Window platform.
1.6
LIMITATION/ CONSTRAINTS
During the study, I was confronted
with a lot of constraints that inadvertently posed some sort of inconvenience
on me during the project work.
I was financially incapacitated,
time, poor response and inadequate of pre-existing literature on data
encryption and decryption.
1.7
ASSUMPTIONS
It is assumed that encryption is
done at the transmitter ie the while decryption is done at the individual
receiver.
The program is in a window platform.
1.8
DEFINITION OF TERMS
Encryption is the processing of
altering readable data to unreadable form to prevent unauthorized access.
Decryption is the act of altering
the unreadable form so that you can have access to the data using the correct
procedure.
Data is unprocessed information
which cannot be used for decision making.
Security is the process or system of
safeguarding or protecting information technology against disaster, system
failures, and unauthorized access that can result in damage or loss.
Manual system ÷ manual system is an
old method and procedure of using human physical capabilities to achieve
result.
Information – This is the meaningful
processed data that an individual can gain knowledge for the purpose of making
a decision.
Design – is the structuring
construct of a system.
Implementation ÷ Implementation
consist of detailed time table (using scientific aids), details conversion
procedures and changeover procedure, including system testing.
PLEASE, print the following
instructions and information if you will like to order/buy our complete written
material(s).
HOW TO RECEIVE PROJECT MATERIAL(S)
After paying the appropriate amount
into our bank Account below, send the following information to
08140350866 or 08058580848
(1) Your project
topics
(2) Email
Address
(3) Payment
Name
(4) Teller Number
We will send your material(s)
immediately we receive bank alert
BANK ACCOUNTS
Account Name: AKINYEMI OLUWATOSIN
Account Number: 3022179389
Bank: FIRST BANK.
OR
Account Name: AKINYEMI OLUWATOSIN
Account Number: 2060566256
Bank: UBA.
OR
Account Name: AKINYEMI OLUWATOSIN
Account Number: 0042695344
Bank: Diamond
HOW TO IDENTIFY SCAM/FRAUD
As a result of fraud in Nigeria,
people don’t believe there are good online businesses in Nigeria.
But on this site, we have provided
“table of content and chapter one” of all our project topics and materials in
order to convince you that we have the complete materials.
Secondly, we have provided our Bank
Account on this site. Our Bank Account contains all information about the owner
of this website. For your own security, all payment should be made in the bank.
No Fraudulent company uses Bank
Account as a means of payment, because Bank Account contains the overall
information of the owner
CAUTION/WARNING
Please, DO NOT COPY any of our
materials on this website WORD-TO-WORD. These materials are to assist, direct
you during your project. Study the materials carefully and use the
information in them to develop your own new copy. Copying these materials
word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and
we will not be held responsible for it. If you must copy word-to-word please do
not order/buy.
That you ordered this material shows
you have agreed not to copy word-to-word.
FOR MORE INFORMATION, CALL:
08058580848, 08140350866
YOU CAN ALSO VISIT:
www.achieverprojectmaterial.com
www.acheiversprojectmaterials.com
www.achieversprojectmaterials.com
www.naijasplash.com
www.achieversprojectmaterials.blogspot.com
www.achieverprojectmaterial.blogspot.com
www.acheiversprojectmaterials.blogspot.com
www.archieverprojectmaterials.blogspot.com
www.acheiversprojectmaterials.blogspot.com.ng
www.archieverprojectmaterials.blogspot.com.ng
www.achieversprojectmaterials.blogspot.com.ng
www.achieverprojectmaterial.blogspot.com.ng
www.achieverprojectmaterial.wordpress.com
www.achieversprojectmaterials.wordpress.com
www.acheiversprojectmaterials.wordpress.com
www.archieverprojectmaterials.wordpress.com
No comments:
Post a Comment