This document describes an RSA encryption software project. The software allows users to encrypt images and text for secure transmission. It uses the RSA encryption algorithm with public and private keys. The software has options to encrypt and decrypt files with a password. Screenshots show the user interface for selecting files to encrypt, entering passwords, and viewing encrypted and decrypted files. The document discusses the software's features, how RSA encryption works, and possibilities for future improvements.
3. Introduction
You are a consultant working on a highly secure program for the government. As
you work on your project you also need to attach files that contain privileged
information and communicate by email with specialists from different parts of the
world. What would you need to do to make sure that your email communications
are secure?
One way you can keep your data secure is by using software known as encryption
software. The encryption software will allow you to encrypt data that contain
important information that you do not want to be seen by prying eyes. When you
encrypt the data, the software will prompt you for a key or a password. You would
then send the encrypted files to the other person. Those who need to open and
read the files should have access to the same software and the key that was used,
so that the files can be decrypted and made readable.
3
4. Need of Project
Encryption software has become important when it comes to protecting your Data. Hack attempts
and privacy intrusions mean that it's become easier than ever for complete strangers to access your
most personal details stored on your computer.
Encryption enhances the security of a message or file by scrambling the content. To encrypt a
message, you need the right key, and you need the right key to decrypt it as well . It is the most
effective way to hide communication via encoded information where the sender and the recipient
hold the key to decipher data.
4
RSA Encryption Software
5. System
Existing System
There may exist many applications of
encryption and decryption of varies type
of file formats .this software are paid
software and mainly available as web
applications so they required high speed
internet connection.
There Use Same Key to decrypt Data
New System
The proposed system suggest a new concept that is
free desktop application. It means user can use this
application free of cost .whale in existed system user
has to pay some amount to use the services.
The new system will work in offline mode. Manse
user can use it any time without any problem. The
proposed system uses RSA (Rivest–Shamir–Adleman)
algorithm. RSA is known to be the strongest publicly
available encryption method. This algorithm works
with both private key and public key. The only way
of decrypting the files which are encrypted with the
public key is to use the private key. Users’ file will be
encrypted and saved to desktop .Then, user has to
enter the private key to decrypt the file.
RSA Encryption Software 5
7. RSA Algorithm
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir,
and Leonard Adleman.
The RSA algorithm is the most commonly
used public key encryption algorithm.
RSA Encryption Software 7
8. Flow Chart for
Encryption and
Decryption
The above flow chart shows
how the project in this article
works. The flow chart explains
in a step by step manner the
processing of the encryption
and decryption, using JAVA.
Images are encrypted, and
create the *.txt file, the same file
is used for decryption.
RSA Encryption Software 8
9. Screen Layout
After Starting application we
can see the home page.
After Click on Get Started
Button Next window is open
where there are two options.
RSA Encryption Software 9
10. Here User will select text or
Images
RSA Encryption Software 10
11. After User will Select text
or Image for Safety
Application Ask Password
RSA Encryption Software 11
12. On text Selection user Will
navigate to for text
Encryption.
RSA Encryption Software 12
13. On Image Selection user Will
Navigate to for Image Encryption.
Here are two options one for
Image Encryption and other for
Image Decryption.
RSA Encryption Software 13
14. After Encryption
In this image we can see
there is a button to select
image. After encryption
image will be automatically
saved to Desktop.
RSA Encryption Software 14
15. After Decryption
In this image user will select
the encrypted image and will
get decrypted image as
output. Decrypted image will
automatically save to
Desktop.
RSA Encryption Software 15
16. RSA Encryption Software 16
Strength
When user receives the message, it decrypts the message using its private
key No one else can decrypt the message because only user knows its private
key.
To this day the RSA together with the AES algorithm is the mostly used
algorithm in commercial systems. It is used to protect web traffic.
Very fast, very simple encryption and verification.
Easier to implement than Elliptical curve cryptography(ECC).
Easier to understand.
Widely deployed, better industry support
17. Future Scope
At present encryption software only encrypts plan text. In the future it will encrypt various
PDF, word files.
In future software, JPG type file will be encrypted along with other photos like PNG, JPEG
will also be encrypted.
In the future, different types of security panels will be used to keep the user's data safe
The software will be given a database connection. And complete user information will be
saved in database
In future this will be changed to web application
RSA Encryption Software 17
18. Conclusion
RSA is the most popular public-key cryptosystem available today. It can be
used for both encryption and authentication.
Today’s world data or file security is most important thing and encryption is
the best way to secure our important data .With the help of encryption
Software we can protect the information from disclosure to unauthorized
parties.
RSA Maintain the Confidentiality about information.
RSA Provide authentication or proof of origin like digital signatures etc.
RSA Encryption Software 18