SlideShare a Scribd company logo
1 of 10
INTERNATIONAL UNIVERSITY OF EAST AFRFICA
INFORMATION SYSTEM SECURITY
ASSIGNMENT PRESENTATION
BY
SHAMSU MUSA ABDULRASHEED
PRESENTED TO
FACULTY OF SCIENCE AND TECHNOLOGY
INTERNATIONAL UNIVERSITY OF EAST AFRICA(IUEA)
SUPERVISOR
Mr. ELU EMANEUL (Phd, CIL )
ENCRYPTION AND DECRYPTION 2.0
Introduction.
Encryption and Decryption supports Windows 7, Vista, XP, 2008, 2003, 2000, ME, 98 (32-bit
and 64-bit versions).
Encryption and Decryption is strong text and file encryption freeware that allows you to
protect the privacy of your email messages, instant messages, chat messages, documents
and sensitive files by encrypting them with AES 256-bit key encryption.
With Encryption and Decryption you can safely send encrypted messages and emails over
the Internet, share private information with your friends, family, co-workers and safely store
sensitive data on your computer.
Key features:-
• Reliable and easy-to-use encryption freeware
• Protects the privacy of your instant messages when you use Skype, chats, ICQ, etc
• Allows you to safely send secure emails and other confidential information
• Helps you safely store sensitive information on your computer
Encryption and Decryption is text and file encryption freeware that provides high security and
allows you to safely store and share sensitive data.
Cipher text?
1. Double-click the Encryption and Decryption desktop icon.
2. Click the 'Tools' button, and then select 'Encryption'.
3. Select the 'Text' option.
4. Enter the text you want to encrypt in the 'Text you want to encrypt' area.
5. Click the 'Encrypt' button or the 'Encrypt and Copy' button.
6. Enter the password for encryption and confirm it.
7. Enable or disable the 'Encrypt with password check confirmation' option
and then click OK.
Your text in the encrypted form will appear in the 'Encrypted text' area. In
case of using the 'Encrypt and Copy' button, the encrypted text will be also
copied to the clipboard.
Now you can safely store your text message or document on the computer,
send it in emails or transfer it in any other ways.
How the software works
This is the
plaintext that
you need to
encrypt, and
then press
encrypt button
This pop-up
message request a
user to enter the
pwd and confirm
the pwd, and then
press OK
Decipher text?
1. Double-click the Encryption and Decryption desktop icon.
2. Click the 'Tools' button, and then select 'Decryption'.
3. Select the 'Text' option
4. Paste the text you want to decrypt in the 'Encrypted text you want to decrypt'
area.
5. Click the 'Decrypt' button or the 'Decrypt and Copy' button.
6. Enter the password for decryption and confirm it. Note: it is the same
password that was used for encryption.
7. The decrypted text will appear in the 'Decrypted text' area.
When you copy
cipher text and
paste it will rqst
the pwd, you
should then
enter the pswd &
click OK
After
providing the
password you
plain text will
appear
ALGORITHM
SubBytes()transformation.
Example, if S 1,1=53, then the substitution value would be determined by the
intersection of the row with index ‘5’ and the column with index ‘3’. This would
result in s1
¢ ,1
having a value of {ed}.
ALGORITHM
SubBytes()transformation.
Example, if S 1,1=53, then the substitution value would be determined by the
intersection of the row with index ‘5’ and the column with index ‘3’. This would
result in s1
¢ ,1
having a value of {ed}.

More Related Content

Viewers also liked

Só tinha que ser com você
Só tinha que ser com vocêSó tinha que ser com você
Só tinha que ser com vocêrosazul
 
Wellrailed - Be9's Acl9
Wellrailed - Be9's Acl9Wellrailed - Be9's Acl9
Wellrailed - Be9's Acl9breccan
 
Microsoft Word Hw#1
Microsoft Word   Hw#1Microsoft Word   Hw#1
Microsoft Word Hw#1kkkseld
 
Microsoft Word Hw#3
Microsoft Word   Hw#3Microsoft Word   Hw#3
Microsoft Word Hw#3kkkseld
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
Hotnets Slides
Hotnets SlidesHotnets Slides
Hotnets Slidesmahan9
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Adoption of Policies Required for The Development of Sustainable Apparel Product
Adoption of Policies Required for The Development of Sustainable Apparel ProductAdoption of Policies Required for The Development of Sustainable Apparel Product
Adoption of Policies Required for The Development of Sustainable Apparel Productsazzadahmed
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Cryprography Assignment
Cryprography AssignmentCryprography Assignment
Cryprography AssignmentAshik Iqbal
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3koolkampus
 

Viewers also liked (17)

09062015_phdlist
09062015_phdlist09062015_phdlist
09062015_phdlist
 
Só tinha que ser com você
Só tinha que ser com vocêSó tinha que ser com você
Só tinha que ser com você
 
Wellrailed - Be9's Acl9
Wellrailed - Be9's Acl9Wellrailed - Be9's Acl9
Wellrailed - Be9's Acl9
 
Microsoft Word Hw#1
Microsoft Word   Hw#1Microsoft Word   Hw#1
Microsoft Word Hw#1
 
Programacion
ProgramacionProgramacion
Programacion
 
Microsoft Word Hw#3
Microsoft Word   Hw#3Microsoft Word   Hw#3
Microsoft Word Hw#3
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
Report Cryptography
Report CryptographyReport Cryptography
Report Cryptography
 
Hotnets Slides
Hotnets SlidesHotnets Slides
Hotnets Slides
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Adoption of Policies Required for The Development of Sustainable Apparel Product
Adoption of Policies Required for The Development of Sustainable Apparel ProductAdoption of Policies Required for The Development of Sustainable Apparel Product
Adoption of Policies Required for The Development of Sustainable Apparel Product
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Cryprography Assignment
Cryprography AssignmentCryprography Assignment
Cryprography Assignment
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 

Similar to Encryption and Decryption Software Presentation

Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mailcsandit
 
USB BASED SECURE E-MAIL
USB BASED SECURE E-MAIL USB BASED SECURE E-MAIL
USB BASED SECURE E-MAIL cscpconf
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mailcsandit
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint EncryptionOSU - East
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...IRJET Journal
 
How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail MessagesD's Surti
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for PsychologistsBradnor444
 
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET Journal
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
SendSecure-Factsheet-EN
SendSecure-Factsheet-ENSendSecure-Factsheet-EN
SendSecure-Factsheet-ENGary Baker
 

Similar to Encryption and Decryption Software Presentation (20)

week 12
week 12week 12
week 12
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mail
 
USB BASED SECURE E-MAIL
USB BASED SECURE E-MAIL USB BASED SECURE E-MAIL
USB BASED SECURE E-MAIL
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mail
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail Messages
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for Psychologists
 
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
 
Unit 2aa
Unit 2aaUnit 2aa
Unit 2aa
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Secure Objects
Secure ObjectsSecure Objects
Secure Objects
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
SendSecure-Factsheet-EN
SendSecure-Factsheet-ENSendSecure-Factsheet-EN
SendSecure-Factsheet-EN
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data Security
 

Encryption and Decryption Software Presentation

  • 1. INTERNATIONAL UNIVERSITY OF EAST AFRFICA INFORMATION SYSTEM SECURITY ASSIGNMENT PRESENTATION BY SHAMSU MUSA ABDULRASHEED PRESENTED TO FACULTY OF SCIENCE AND TECHNOLOGY INTERNATIONAL UNIVERSITY OF EAST AFRICA(IUEA) SUPERVISOR Mr. ELU EMANEUL (Phd, CIL )
  • 2. ENCRYPTION AND DECRYPTION 2.0 Introduction. Encryption and Decryption supports Windows 7, Vista, XP, 2008, 2003, 2000, ME, 98 (32-bit and 64-bit versions). Encryption and Decryption is strong text and file encryption freeware that allows you to protect the privacy of your email messages, instant messages, chat messages, documents and sensitive files by encrypting them with AES 256-bit key encryption. With Encryption and Decryption you can safely send encrypted messages and emails over the Internet, share private information with your friends, family, co-workers and safely store sensitive data on your computer. Key features:- • Reliable and easy-to-use encryption freeware • Protects the privacy of your instant messages when you use Skype, chats, ICQ, etc • Allows you to safely send secure emails and other confidential information • Helps you safely store sensitive information on your computer Encryption and Decryption is text and file encryption freeware that provides high security and allows you to safely store and share sensitive data.
  • 3. Cipher text? 1. Double-click the Encryption and Decryption desktop icon. 2. Click the 'Tools' button, and then select 'Encryption'. 3. Select the 'Text' option. 4. Enter the text you want to encrypt in the 'Text you want to encrypt' area. 5. Click the 'Encrypt' button or the 'Encrypt and Copy' button. 6. Enter the password for encryption and confirm it. 7. Enable or disable the 'Encrypt with password check confirmation' option and then click OK. Your text in the encrypted form will appear in the 'Encrypted text' area. In case of using the 'Encrypt and Copy' button, the encrypted text will be also copied to the clipboard. Now you can safely store your text message or document on the computer, send it in emails or transfer it in any other ways. How the software works
  • 4. This is the plaintext that you need to encrypt, and then press encrypt button
  • 5. This pop-up message request a user to enter the pwd and confirm the pwd, and then press OK
  • 6. Decipher text? 1. Double-click the Encryption and Decryption desktop icon. 2. Click the 'Tools' button, and then select 'Decryption'. 3. Select the 'Text' option 4. Paste the text you want to decrypt in the 'Encrypted text you want to decrypt' area. 5. Click the 'Decrypt' button or the 'Decrypt and Copy' button. 6. Enter the password for decryption and confirm it. Note: it is the same password that was used for encryption. 7. The decrypted text will appear in the 'Decrypted text' area.
  • 7. When you copy cipher text and paste it will rqst the pwd, you should then enter the pswd & click OK
  • 9. ALGORITHM SubBytes()transformation. Example, if S 1,1=53, then the substitution value would be determined by the intersection of the row with index ‘5’ and the column with index ‘3’. This would result in s1 ¢ ,1 having a value of {ed}.
  • 10. ALGORITHM SubBytes()transformation. Example, if S 1,1=53, then the substitution value would be determined by the intersection of the row with index ‘5’ and the column with index ‘3’. This would result in s1 ¢ ,1 having a value of {ed}.