Monday, 6 February 2017

DESIGN AND IMPLEMENTATION OF COMPUTERIZED DATA ENCRYPTION AND DECRYPTION SYSTEM.



ABSTRACT
The use of manual system of data encryption and decryption has a damaging implication resultant on the images in some companies and the negative impact this trend has had on the users of such system. Much resource is lost annually by firms due to the uncontrolled and unscientific nature of this system.
In this traditional system, to guarantee privacy of information / communications between any two subscribes in a network consisting of 1000 members, 499,500 secret keys would be necessary, one for each possible combination of sender and receivers. Keys have been distributed by a secure channel such as a trusted courier with an attached case manual led to a wrist, a costly and time consuming method.
This particular project is set to appraise already existing system by designing a better one which will facilitate the level of satisfaction and competence in the challenges in information technology.





ORGANISATION OF WORK
      This project work titled design and implementation of computerized data encryption and decryption system is organized into different chapters.
Chapter one introduces the project work, purpose of the study, aims and objectives. The limitations, scope of work and assumptions were also included. This section ended with a definition of term used in the project work.
The review of books and literature of different scholars with respect to the above caption are summarized in chapter two to bring clarification.
I went forward in chapter three to describe and analyze the already existing system using procedure chart, information flow chart etc.
The chapter four and five of this work dealt intensively on the design and implementation of the new computerized system using diagrams and programs.
Documentation of the information the subsequent users of the software is elaborated in chapter six.
Finally, I have declared a recommendation and conclusion section for anybody who is interested in this work piece as shown in the chapter seven.
LIST OF FIGURE

Fig 3.1       Information Flow Diagram
Table 4.1   Output Report
Table 4.2   Input Form
Fig 4.2.1    File Design
Fig 4.2.2    System Flowchart
Fig5.1                  Program Flowchart
Fig 5.2       Database Design

TABLE OF CONTENT
Title page ……………………………………………………………   i
Certification……………………………………………………………..ii
Approval page……………………………………………….…….       iii
Dedication ……………………………………………….…………         iv
Acknowledgement ……………………………………..…………….v-vi
Abstract …………………………………………………………………..vii
Organization of work………………………………………….………vii-ix
list of figure …………………………………………………………………………………..x
CHAPTER ONE
1.0 INTRODUCTION…………………………………………………1-3
1.1 Statement of the Problem…………………………………………3
1.2 Aims and Objectives……………………………………………….4
1.3  Purpose of the Study………………………………………..….4-5
1.4 Significance of Study…………………………………………….5
1.5 Scope/ Delimitation………………………………………..……5-6
1.6 Limitations / Constraints…………………………………………6
1.7 Assumption of Study……………………………………..………6
1.8 Definition of Terms………………………………………………6-7
CHAPTER TWO
2.0     Review of Literature……………………………………………8

CHAPTER THREE
3.0 Description and Analysis of the Existing System……………..15
3.1  Fact Finding Method / Methodology………………………15-16
3.3  Objective of the Existing System…………………………….…17
3.4 Input, Process and Output Analysis……………………………17
3.4.1 Input Analysis………………………………………………….17-18
3.4.2 Process Analysis………………………………………..…………18
3.4.3 Output Analysis……………………………………….……………..18
3.5 Information Flow Diagram……………………………..……………19
3.6 Problems of Existing……………………………………………….19-20
3.7Justification for the New System……………………………………20
CHAPTER FOUR
4.0 Design of the New System
4.1Design Standard………………………………………………………21
4.2 Output Specification and Design…………………………………..21
4.3 Input Specification and Design……………………………………22
4.3.1FileDesign……………………………………………………….…24
4.4 Procedure Chart …………………………………………………….25
4.5 System Flowchart…………………………………………………….26
4.6 System Requirement………………………………………………26
4.6.1Hardware Requirement…………………………………………27
4.6.2 Software Requirement………………………………..…………27
4.6.3 Operational Requirement……………………………………….27
4.6.4 Personnel Requirement………………………………………….27
CHAPTER FIVE
5.0 Implementation………………………………………..…………..28
5.1 Design Standard……………………………………………………29
5.2 Program Design……………………………………………………29
5.3Program Flowchart…………………………..…………….………30
5.4 Pseudocode…………………………………….……………..…….32
Coding
Test Data / Test Run
5.5 User Training (An Overview)………………………………..…….33
5.6 Cutover Process………………………………….…………………..33
CHAPTER SIX
6.0 Documentation……………………………………………….……….34
6.1 Program Documentation……………………………………..……….34
6.2 User Documentation…………………………….…………..……..34-35
CHAPTER SEVEN
7.0 Recommendation, Summary and Conclusion…….………..………36
7.1 Recommendation……………………………………..……….………36
7.2 Summary…………………………………………………….………….36
7.3 Conclusion………………………………………………..…………….37
Reference……………………………………………………..……………..38

CHAPTER ONE
1.0                                          INTRODUCTION
The ongoing dilemma of digital age is balancing convenience against security. Security is a system of safeguards for protecting information technology against disasters, system failure, and unauthorized access that can result in damage or loss. There are several reports of the spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data.  These have posed greater challenges on people who use database, transact online and internet users.
This project work is design to embark on a security mechanism using computerized data encryption and decryption system to resolve this problem.
Data encryption is the process of altering readable data into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concepts to create coded messages that are virtually impossible to break. As one article point out,  it is  easy to encrypt a message on a simple pc so that the biggest computer in the world couldn’t decipher it without spending far more time on the problem that exists in the life span of the entire universe.



There are two basic form of encryption      
Private Key and public key
Private key: Private key (symmetric) encryption means that the same secret key is used by sender and receiver to encrypt and decrypt a message. The encryption system (for “Data Encryption Standard”) was adopted as a federal standard for private key encryption in 1976.
Public key: Public key encryption means that two keys used a public key, which the receiver has made known before hand to the sender who uses it to encrypt message, and a private key, which only the receiver knows and which is required to decrypt the message.
This illustration given below show encryption system using private key/ public key.
PRIVATE KEY

1.1                                STATEMENT OF PROBLEM
          Most networks or organizations database inclined. For effective and conducive working atmosphere, their data must be safeguarded to a reasonable extent. Data should be protected from unauthorized alteration.
The manual method of ensuring orderliness of movement of goods and information within the firm waste time, consume large resource, high man-power utilization and slow decision support. The result achieved is redundant, inaccurate and les satisfactory.
The use of a computerized system has shown a complete balance for a security management in our contemporary age.



1.2                AIMS AND OBJECTIVE
The aims and objectives of this study are as follows:
-          To reduce stress, time consumption and cost of operation involved in the manual system.
-          To design a system to restrict unauthorized access to its data usage.
-          To appraise the standard of computer programming to greater height of sophisticated and general comprehensibility.
-          To suggest security techniques which can create conducive working atmosphere for organizations who are having   data threatened.

1.3                PURPOSE OF THE STUDY
This project work is aimed at:
-          Investigating into the old system procedures and specifications so as to appreciate their problem routines and finally design automated system.
-          Improving the response time and main output requirement in the security
-          Management.
-          Conversion of all the various system specifications obtained during the period of investigation and analysis into series of instructions that can be carried out by the system.
-          Preparing gross estimation of probable overall and direct benefit for each possible alternatives.
-          Documenting the feasibility study in a report for users and system management.

1.4               SIGNIFICANT OF STUDY
The significant of this project work is to, solve the problem, the world are facing in the manual system of data encryption and decryption.
It is also to serve as an area of reference for future project work for people intending to write on a related scope of study.
To introduce the larger society the service of the computer thereby giving for more efficient and effective data encryption and decryption system.

1.5       SCOPE/ DELIMITATION
This particular work is limited to the following:
-          Data encryption.
-          Data decryption.
-          Visual basic design.
-          Window platform.

1.6         LIMITATION/ CONSTRAINTS
During the study, I was confronted with a lot of constraints that inadvertently posed some sort of inconvenience on me during the project work.
I was financially incapacitated, time, poor response and inadequate of pre-existing literature on data encryption and decryption.

1.7         ASSUMPTIONS
It is assumed that encryption is done at the transmitter ie the while decryption is done at the individual receiver.
The program is in a window platform.
1.8                   DEFINITION OF TERMS
Encryption is the processing of altering readable data to unreadable form to prevent unauthorized access.
Decryption is the act of altering the unreadable form so that you can have access to the data using the correct procedure.
Data is unprocessed information which cannot be used for decision making.
Security is the process or system of safeguarding or protecting information technology against disaster, system failures, and unauthorized access that can result in damage or loss.
Manual system ÷ manual system is an old method and procedure of using human physical capabilities to achieve result.
Information – This is the meaningful processed data that an individual can gain knowledge for the purpose of making a decision.
Design – is the structuring construct of a system.
Implementation ÷ Implementation consist of detailed time table (using scientific aids), details conversion procedures and changeover procedure, including system testing.

 HOW TO GET THE FULL PROJECT WORK

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

HOW TO RECEIVE PROJECT MATERIAL(S)
After paying the appropriate amount into our bank Account below, send the following information to
08140350866 or 08058580848

(1)    Your project topics
(2)     Email Address
(3)     Payment Name
(4)    Teller Number
We will send your material(s) immediately we receive bank alert

BANK ACCOUNTS
Account Name: AKINYEMI OLUWATOSIN
Account Number: 3022179389
Bank: FIRST BANK.

OR
Account Name: AKINYEMI OLUWATOSIN
Account Number: 2060566256
Bank: UBA.

OR
Account Name: AKINYEMI OLUWATOSIN
Account Number: 0042695344
Bank: Diamond

HOW TO IDENTIFY SCAM/FRAUD
As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

CAUTION/WARNING
Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

That you ordered this material shows you have agreed not to copy word-to-word.


FOR MORE INFORMATION, CALL:
08058580848, 08140350866

YOU CAN ALSO VISIT:
www.achieverprojectmaterial.com
www.acheiversprojectmaterials.com
www.achieversprojectmaterials.com
www.naijasplash.com
www.achieversprojectmaterials.blogspot.com
www.achieverprojectmaterial.blogspot.com
www.acheiversprojectmaterials.blogspot.com
www.archieverprojectmaterials.blogspot.com
www.acheiversprojectmaterials.blogspot.com.ng
www.archieverprojectmaterials.blogspot.com.ng
www.achieversprojectmaterials.blogspot.com.ng
www.achieverprojectmaterial.blogspot.com.ng
www.achieverprojectmaterial.wordpress.com
www.achieversprojectmaterials.wordpress.com
www.acheiversprojectmaterials.wordpress.com
www.archieverprojectmaterials.wordpress.com







No comments:

Post a Comment