Successfully reported this slideshow.
FILE SECURITY SYSTEM
Under Guidance Presented By
Er. Alok Jadaun Dheeraj Kumar Singh(1000410015)
Surendra Kr Kannoujiya(1000410083)
Objective of file security system
Technique used in file security system
How much module used in the project
Algorithm is used in the encryption process
Flow chart of AES algorithm
Requirement of Software and hardware
The File Security System is a software, which tries
to alter the originality of the text into some
It is use to store the information in a form that is
The Application should have a reversal process as
of which should be in a position to decrypt the data
to its original format upon the proper request by the
OBJECTIVE OF FILE SECURITY SYSTEM
Secure the file from unauthorized user.
If hacker get the encrypted file they can not read to
It give confidentiality to user that information is
TECHNIQUE USED IN FILE SECURITY
Encryption is the process of encoding messages (or
information) in such a way that eavesdroppers or
hackers cannot read it, but only authorized parties
In an Encryption scheme, the message or
information (referred to as plaintext) is encrypted
using an encryption algorithm, turning it into an
unreadable cipher text. This is usually done with the
use of an encryption key.
This is usually done with the use of an encryption key
which specifies how the message is to be encoded.
There are two basic types of encryption schemes:
Decryption should be a reverse process of encryption
Decryption is the process of encoding messages (or
information) in such a way that it become readable for
It convert the cipher text into the plain text after
In symmetric-key schemes, the encryption and
decryption keys are the same.
It involves a single secret key which both the message-
sender and the message-recipient must have.
It is used by the sender to encrypt the message and by
the recipient to decrypt it.
Fig 1.0- SYMMETRIC-KEY ENCRYPTION
ASYMMETRIC KEY(PUBLIC KEY ENCRYPTION)
The term "asymmetric" stems from the use of different
keys to perform these opposite functions.
It requires two separate keys one of which is secret (or
private) and one of which is public.
The public key is used to encrypt plaintext and the private
key is used to decrypt cipher text.
Fig 2.0- ASYMMETRIC KEY(PUBLIC KEY ENCRYPTION)
We used three module in the project.
(1) Input module.
(2) Process module.
(3) Output module.
In this module we implement attachment of file in the file
In this module we select the file type.
In this module we implement the process for the file
security system like as encryption and decryption.
In this module we save the encrypted file in
ALGORITHM USE IN ENCRYPTION
AES (Advanced Encryption Standard )
AES:-AES is a symmetric-key algorithm, meaning the
same key is used for both encrypting and
decrypting the data.
The Advanced Encryption Standard (AES) is a
specification for the encryption of electronic data
established by the U.S. National Institute of
Standards and Technology (NIST) in 2001.
FLOW CHART OF AES ALGORITHM
REQUIREMENT OF SOFTWARE
Software:-The Software used in file security system are as
Windows NT/2000 (Client/Server)
Front-end: Java JDK 1.4, J2Sdk 1.1.4, Swings.
REQUIREMENT OF HARDWARE
Hardware:-The hardware used in iris recognition are as
Pentium IV Processor with 1.9 GHz Clock Speed
512 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card
SELECT THE FILE LOCATION
AFTER SELECT THE FILE
SELECTED FILE BEFORE ENCRYPTION
MESSAGE OF SUCCESSFUL ENCRYPTION
AFTER ENCRYPTION PROCESS FILE IS
SELECT FILE FOR DECRYPTION
AFTER DECRYPTION PROCESS THE FILE IS
A new simple tool has been created, which is
targeted for use inside of a small institution such as
a small university for lecturers’ daily use of sending
exam files and sensitive material such that the
material can be encrypted and the file is sent in one
e-mail while the encryption key is sent in another e-
mail or via any secure communication channel.
NVIDIA. High Performance Computing GPU
Sara Tedmori, Nijad Al-Najdawi ” Lossless Image
Cryptography Algorithm Based on Discrete Cosine
Transform” IAJIT First Online Publication
Dariusz Stanislawek , “Free Software copyright
1997 - 2006 ”
Vivek Thakur , “NeekProtect”,
http://neekprotect.sourceforge.net , 2006.
S.Quinlan and S. Dorward. Venti: a new
approach to archival storage. In Proc. of the
Conference on File and Storage Technologies
(FAST), January 2002.
HweeHwa Pang, Kian-Lee Tan and Xuan Zhou.
“StegFS: Steganographic F System”, IEEE
International Conference on Data Engineering, Mar