SlideShare a Scribd company logo
Data Encryption System
Under Guidance
Of
Mr. j p dixit

1

AAMOD KUMAR YADAV
Introduction
Our project Data
Our project Data
Encryption System
Encryption System
basically based on hiding
basically based on hiding
the data from intruders
the data from intruders
with the help of
with the help of
Encryption technique, so
Encryption technique, so
that no one can access the
that no one can access the
data without
data without
authentication.
authentication.
WATERFALL MODEL
Feasibility Study

A
B

Requirement Analysis

C

Design
Coding

Testing

D
E
F

Implementation & Maintenance
Description
y
lit
i
ib y
s
e a tu d
F S

nt
e
m s
ire si
qu aly
Re An
n
ig
s
De

In this phase we first check and crosscheck
the feasibility of our project that it is
financially or technically feasible or not.

In this phase we fulfill our requirement
related to project.

In this phase we have done designing related
to our project by using DFD & ER-Diagram.
g
in
od
C

In this phase we have done coding of our
project in any high level language (HLL).
For e.g.. VB,C,C++,JAVA,C#.

g
in
st
Te

In this phase we test our project, if any error
is there then remove that error and make
project error free.

nt
e
m
e
pl
Im

In this phase we implement the project to the
customer’s site, if project is not working
properly, it requires maintenance which is
also perform at the customer’s/user’s site.
Goal
Less time consuming.

B

The main goal of
our s/w is to
provide the
security of data.

Provide better
facility to the
user.

A

C
Data Encryption
System

E

D

No one can
access the
content of the
data.

If someone
accesses the data
then he/she can’t
read the data.
Minimum S/W Requirement
Operating
System

Front End
Back End

Windows XP

C Sharp
(C#)

Ms Access
Minimum H/W Requirement
Processor

Celeron 2.0

RAM

128 MB

Hard Disk

10 GB
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem
Dataencryptionsystem

More Related Content

Similar to Dataencryptionsystem

Azr infotech services
Azr infotech servicesAzr infotech services
Azr infotech services
Khursheed Farooq
 
Sanjay kumar joshi
Sanjay kumar joshiSanjay kumar joshi
Sanjay kumar joshi
Sanjay Joshi
 
How secure is an android app?
How secure is an android app?How secure is an android app?
How secure is an android app?
Dom Digital
 
Software Architecture in the age of Cloud Computing
Software Architecture in the age of Cloud ComputingSoftware Architecture in the age of Cloud Computing
Software Architecture in the age of Cloud Computing
Jaroslav Gergic
 
What scrum masters and product owners should know about software quality and ...
What scrum masters and product owners should know about software quality and ...What scrum masters and product owners should know about software quality and ...
What scrum masters and product owners should know about software quality and ...
STX Next
 
Di and how it shapes your application
Di and how it shapes your applicationDi and how it shapes your application
Di and how it shapes your application
Marian Zlatev
 
Null bachav
Null bachavNull bachav
J2ME Programmer Certification
J2ME Programmer CertificationJ2ME Programmer Certification
J2ME Programmer Certification
Vskills
 
Bitdefender Partner Program 2023_08_TH.pptx
Bitdefender Partner Program 2023_08_TH.pptxBitdefender Partner Program 2023_08_TH.pptx
Bitdefender Partner Program 2023_08_TH.pptx
PawachMetharattanara
 
HariKrishna-2+year-Dotnet-Profile
HariKrishna-2+year-Dotnet-ProfileHariKrishna-2+year-Dotnet-Profile
HariKrishna-2+year-Dotnet-Profilebatchuhari
 
Ashutosh jaimini resume
Ashutosh jaimini resumeAshutosh jaimini resume
Ashutosh jaimini resume
rit2007062
 
PDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdfPDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdf
HajeJanKamps
 
ITAM Tools Day, November 2015 - Concorde
ITAM Tools Day, November 2015 - ConcordeITAM Tools Day, November 2015 - Concorde
ITAM Tools Day, November 2015 - Concorde
Martin Thompson
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
Chaitanya Bhatt
 
AI for PM.pptx
AI for PM.pptxAI for PM.pptx
AI for PM.pptx
Natan Katz
 
Tech competences portfolio-mobile_app
Tech competences portfolio-mobile_appTech competences portfolio-mobile_app
Tech competences portfolio-mobile_appToumi Fatma
 

Similar to Dataencryptionsystem (20)

Azr infotech services
Azr infotech servicesAzr infotech services
Azr infotech services
 
Profile - Hema Kalbagilmath
Profile - Hema KalbagilmathProfile - Hema Kalbagilmath
Profile - Hema Kalbagilmath
 
Sanjay kumar joshi
Sanjay kumar joshiSanjay kumar joshi
Sanjay kumar joshi
 
How secure is an android app?
How secure is an android app?How secure is an android app?
How secure is an android app?
 
Software Architecture in the age of Cloud Computing
Software Architecture in the age of Cloud ComputingSoftware Architecture in the age of Cloud Computing
Software Architecture in the age of Cloud Computing
 
Ramanjaneyulu_Java
Ramanjaneyulu_JavaRamanjaneyulu_Java
Ramanjaneyulu_Java
 
What scrum masters and product owners should know about software quality and ...
What scrum masters and product owners should know about software quality and ...What scrum masters and product owners should know about software quality and ...
What scrum masters and product owners should know about software quality and ...
 
Di and how it shapes your application
Di and how it shapes your applicationDi and how it shapes your application
Di and how it shapes your application
 
Null bachav
Null bachavNull bachav
Null bachav
 
J2ME Programmer Certification
J2ME Programmer CertificationJ2ME Programmer Certification
J2ME Programmer Certification
 
Bitdefender Partner Program 2023_08_TH.pptx
Bitdefender Partner Program 2023_08_TH.pptxBitdefender Partner Program 2023_08_TH.pptx
Bitdefender Partner Program 2023_08_TH.pptx
 
HariKrishna-2+year-Dotnet-Profile
HariKrishna-2+year-Dotnet-ProfileHariKrishna-2+year-Dotnet-Profile
HariKrishna-2+year-Dotnet-Profile
 
Ashutosh jaimini resume
Ashutosh jaimini resumeAshutosh jaimini resume
Ashutosh jaimini resume
 
PDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdfPDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdf
 
ITAM Tools Day, November 2015 - Concorde
ITAM Tools Day, November 2015 - ConcordeITAM Tools Day, November 2015 - Concorde
ITAM Tools Day, November 2015 - Concorde
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
AI for PM.pptx
AI for PM.pptxAI for PM.pptx
AI for PM.pptx
 
Tech competences portfolio-mobile_app
Tech competences portfolio-mobile_appTech competences portfolio-mobile_app
Tech competences portfolio-mobile_app
 
mani_datastage
mani_datastagemani_datastage
mani_datastage
 
Resume_Mohan Selvamoorthy_Sec
Resume_Mohan Selvamoorthy_SecResume_Mohan Selvamoorthy_Sec
Resume_Mohan Selvamoorthy_Sec
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

Dataencryptionsystem

  • 1. Data Encryption System Under Guidance Of Mr. j p dixit 1 AAMOD KUMAR YADAV
  • 2. Introduction Our project Data Our project Data Encryption System Encryption System basically based on hiding basically based on hiding the data from intruders the data from intruders with the help of with the help of Encryption technique, so Encryption technique, so that no one can access the that no one can access the data without data without authentication. authentication.
  • 3. WATERFALL MODEL Feasibility Study A B Requirement Analysis C Design Coding Testing D E F Implementation & Maintenance
  • 4. Description y lit i ib y s e a tu d F S nt e m s ire si qu aly Re An n ig s De In this phase we first check and crosscheck the feasibility of our project that it is financially or technically feasible or not. In this phase we fulfill our requirement related to project. In this phase we have done designing related to our project by using DFD & ER-Diagram.
  • 5. g in od C In this phase we have done coding of our project in any high level language (HLL). For e.g.. VB,C,C++,JAVA,C#. g in st Te In this phase we test our project, if any error is there then remove that error and make project error free. nt e m e pl Im In this phase we implement the project to the customer’s site, if project is not working properly, it requires maintenance which is also perform at the customer’s/user’s site.
  • 6. Goal Less time consuming. B The main goal of our s/w is to provide the security of data. Provide better facility to the user. A C Data Encryption System E D No one can access the content of the data. If someone accesses the data then he/she can’t read the data.
  • 7. Minimum S/W Requirement Operating System Front End Back End Windows XP C Sharp (C#) Ms Access
  • 8. Minimum H/W Requirement Processor Celeron 2.0 RAM 128 MB Hard Disk 10 GB