Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

File Security System_2

  • Be the first to comment

File Security System_2

  1. 1. FILE SECURITY SYSTEM Under Guidance Presented By Er. Alok Jadaun Dheeraj Kumar Singh(1000410015) Pushpendra Kumar(1100410901) Rohit Singh(1000410061) Surendra Kr Kannoujiya(1000410083)
  2. 2. CONTENT  Introduction  Objective of file security system  Technique used in file security system  Encryption  Decryption  Symmetric-key encryption  Asymmetric-key encryption  How much module used in the project  Algorithm is used in the encryption process  Flow chart of AES algorithm  Requirement of Software and hardware  Snapshots  Conclusion
  3. 3. INTRODUCTION  The File Security System is a software, which tries to alter the originality of the text into some encrypted form.  It is use to store the information in a form that is unreadable.  The Application should have a reversal process as of which should be in a position to decrypt the data to its original format upon the proper request by the user.
  4. 4. OBJECTIVE OF FILE SECURITY SYSTEM  Secure the file from unauthorized user.  If hacker get the encrypted file they can not read to the file.  It give confidentiality to user that information is secure.
  5. 5. TECHNIQUE USED IN FILE SECURITY SYSTEM  Encryption  Decryption
  6. 6. ENCRYPTION  Encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but only authorized parties can access.  In an Encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable cipher text. This is usually done with the use of an encryption key.
  7. 7.  This is usually done with the use of an encryption key which specifies how the message is to be encoded. There are two basic types of encryption schemes:  Symmetric-key encryption  Asymmetric-key(public-key encryption)
  8. 8. DECRYPTION  Decryption should be a reverse process of encryption process.  Decryption is the process of encoding messages (or information) in such a way that it become readable for users.  It convert the cipher text into the plain text after encryption.
  9. 9. SYMMETRIC-KEY ENCRYPTION  In symmetric-key schemes, the encryption and decryption keys are the same.  It involves a single secret key which both the message- sender and the message-recipient must have.  It is used by the sender to encrypt the message and by the recipient to decrypt it.
  10. 10. Fig 1.0- SYMMETRIC-KEY ENCRYPTION
  11. 11. ASYMMETRIC KEY(PUBLIC KEY ENCRYPTION)  The term "asymmetric" stems from the use of different keys to perform these opposite functions.  It requires two separate keys one of which is secret (or private) and one of which is public.  The public key is used to encrypt plaintext and the private key is used to decrypt cipher text.
  12. 12. Fig 2.0- ASYMMETRIC KEY(PUBLIC KEY ENCRYPTION)
  13. 13. MODULES  We used three module in the project. (1) Input module. (2) Process module. (3) Output module.
  14. 14. INPUT MODULE  In this module we implement attachment of file in the file security system.  In this module we select the file type. PROCESS MODULE  In this module we implement the process for the file security system like as encryption and decryption. OUTPUT MODULE  In this module we save the encrypted file in memory.
  15. 15. ALGORITHM USE IN ENCRYPTION PROCESS  AES (Advanced Encryption Standard ) AES:-AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
  16. 16. FLOW CHART OF AES ALGORITHM
  17. 17. REQUIREMENT OF SOFTWARE Software:-The Software used in file security system are as follows:-  Operating System  Windows NT/2000 (Client/Server)  Front-end: Java JDK 1.4, J2Sdk 1.1.4, Swings.
  18. 18. REQUIREMENT OF HARDWARE Hardware:-The hardware used in iris recognition are as follows:-  Pentium IV Processor with 1.9 GHz Clock Speed  512 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card
  19. 19. SNAPSHOTS
  20. 20. SELECT THE FILE LOCATION
  21. 21. AFTER SELECT THE FILE
  22. 22. SELECTED FILE BEFORE ENCRYPTION
  23. 23. MESSAGE OF SUCCESSFUL ENCRYPTION
  24. 24. AFTER ENCRYPTION PROCESS FILE IS
  25. 25. SELECT FILE FOR DECRYPTION
  26. 26. AFTER DECRYPTION
  27. 27. AFTER DECRYPTION PROCESS THE FILE IS
  28. 28. CONCLUSION A new simple tool has been created, which is targeted for use inside of a small institution such as a small university for lecturers’ daily use of sending exam files and sensitive material such that the material can be encrypted and the file is sent in one e-mail while the encryption key is sent in another e- mail or via any secure communication channel.
  29. 29. REFERENCES  NVIDIA. High Performance Computing GPU [EB/OL].(2010-01-09). http://www.nvidia.cn/object/tesla_computing_solutio ns_cn.html.  Sara Tedmori, Nijad Al-Najdawi ” Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform” IAJIT First Online Publication vol.3,2011.  Dariusz Stanislawek , “Free Software copyright 1997 - 2006 ” http://members.ozemail.com.au/~nulifetv/freezip/fre eware
  30. 30.  Vivek Thakur , “NeekProtect”, http://neekprotect.sourceforge.net , 2006.  S.Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. of the Conference on File and Storage Technologies (FAST), January 2002.  HweeHwa Pang, Kian-Lee Tan and Xuan Zhou. “StegFS: Steganographic F System”, IEEE International Conference on Data Engineering, Mar 2003.

×