SlideShare a Scribd company logo
“Cryptography”
Why Cryptography ?
We all know that now a day this is the world of information technology and
almost everyone have to communicate with each other. Most of the time this
communication occurs on the network. During the communication of data it
may be possible that the data we are sending or receiving can be hacked or
edited by someone. The data we are communicating may be bank a/c number,
passwords or some important files etc. To protect the data from this type of
unwanted things “Cryptography” is very useful.
 This project is all about providing security while communicating any data on
the network between two or many user. We are going to discuss about the main
ciphers used in Cryptography in this project.
 There are various techniques of encryption and decryption which are used in
this project such as
 Shift or Substitution cipher
 Monoalphabetic cipher
 Playfair cipher
 Vegenere cipher
 Within the context of application-to-application communication, there are some
specific security requirements, including:
 Authentication
 Privacy/Confidentiality
 Integrity
 Non-repudiation
 Cryptography, then not only protect data from theft or alteration, but
can also be used for user authentication.
 There are, in general two types of Cryptographic schemes typically
used to accomplish these goal:
(1) Private–key ( or symmetric ) cryptography
(2) Public-Key ( or asymmetric ) cryptography
 In all the cases,
 The initial unencrypted data is referred to as “plaintext”.
 The encrypted data is referred to as “cipher text”.
(which will in turn (usually) be decrypted into usable plaintext)
1. Introduction
1.1 Introduction to Cryptography
1.2 Types of Cryptographic Algorithm
1.2.1 Secret key Cryptography
1.2.2 Public Key Cryptography
1.2.3 Hash Function
2. Purpose
3. Objective
4. System Specification
 Hardware
 Software
5. Future Scope
6. Conclusion
Introduction
 The word cryptography or cryptology comes from an Ancient Greek. The word
cryptology is made of two components ”crypto”, which means hidden or secret
and “logos” which means word. It is a Science of writing in secret code.
Cryptography is the study of techniques for secure communication.
 There are two important concepts of cryptography, first one is Encryption &
the second one is Decryption. Encryption is the process in which the plain text
is changed into cipher Text & decryption is just reverse process of encryption
that means cipher text is changed into plain text. There are various techniques
of Encryption & Decryption which are used in this project such as Shift Cipher,
Playfair Cipher, Monoalphabetic Cipher, Vanier Cipher.
 We use the term cryptography to refer to the science and art for transforming
message to make them secure from attacks.
 The original message before being transformed is called ”Plaintext”. After the message
is transformed is called ”Ciphertext”. An encryption algorithm transform the Plaintext
into Ciphertext & a decryption algorithm transforms the Ciphertext back into Plaintext.
Encryption Decryption
#%GIUYRWKMN,S:{?
Hello World! Hello World!
( ciphertext )
( Plaintext ) ( Plaintext )
( Shared Secret Key )
Objective
1 . To d e v e l o p a s o f t w a r e i n w h i c h w e w i l l i n p u t :
i ) F i l e s
i i ) M e s s a g e s
a n d w e w i l l g e t e n c r y p t e d f i l e s o r m e s s a g e s .
2 . T h e e n c r y p t e d i n f o r m a t i o n c a n b e u s e d i n t h e n e t w o r k
( l o c a l o r i n t e r n e t ) i n a s a f e a n d s e c u r e d w a y
3 . T h e s o f t w a r e c a n a l s o b e u s e d t o d e c r y p t t h e e n c r y p t e d d a t a
i n t h e o r i g i n a l f o r m
4 . U s e r w i l l b e a b l e t o u s e t h e i r o w n k e y s t o e n c r y p t t h e d a t a .
SYSTEM SPECIFICATION
SOFTWARE REQUIREMENTS :
 OPERATING SYSTEM : WINDOWS XP / 7
 FRONT END : C#.net
 BACK END : SQL Server
HARDWARE REQUIREMENTS :
 Processor : Pentium IV & above
 Processor Speed : 1 G Hz
 RAM : 2 GB
 Hard Disc : 10 GB
TABLES
COLUMNS DATA TYPE SIZE
Member_id int
Password char 20
Security Question char 30
Security Answer char 20
L O G I N T A B L E :
(FOREIGN KEY)
MEMBER DETAIL TABLE
COLUMNS Data Type Size
Member_id int
Name char 20
Mobile char 10
Email_id char 30
Address Char 50
(Primary Key)
LOG TABLE
Columns Data Type Size
Member_id int
File name char 20
Data datetime
Type char 10
(FOREIGN KEY)
Encryption & Decryption
MEMBER
LOGS
IN LOGIN
History
Record
LOG
MEMBER
id
Name
Mob
no.
Email
id Password
Security
Question
Security
AnswerAddress
MEMBER
id
Member
id
File
Name
Data
Type
TYPES OF CRYPTOGRAPHIC ALGORITHMS
 There are several ways of classifying cryptographic algorithm.
 Defined by their application and use. The three types of algorithms that will be
discussed are as follows.
1. Secret key Cryptography(SKC)
2. Public Key cryptography(PKC)
3. Hash Function
SECRET KEY (SKC)
Single key used to encrypt and decrypt .
Key must be known by both parties.
Encrypt Decrypt
S a m e K e y i s u s e d t o
E n c r y p t a n d D e c r y p t d a t a
Sender
Recipient
Shared Secret
Key
Plaintext Ciphertext Plaintext
PUBLIC KEY (PKC)
Two different keys are used in this cryptography
One key is used for encryption & other for decryption
Encrypt Decrypt
D i f f e r e n t K e y s a r e u s e d t o
E n c r y p t a n d D e c r y p t d a t a
Sender
Recipient
Recipient Public
Key
Recipient Private
Key
Plaintext Ciphertext Plaintext
HASH FUNCTION
 Hash is a function which is used to compress the string.
 The input in the hash function is known as “Message” and
output is called “Digest”.
 Hash functions have four main properties :
 It is easy to compute the hash value for any given message.
 It is infeasible to generate a message from its hash.
 It is infeasible to modify a message without changing the hash.
 It is infeasible to find two different message with the same hash.
Message
( variable size )
H
A
S
H
Digest
( fixed size )
Our project(system) can do the cryptography by
encrypting and decrypting data. We are dependent
on other mailing systems Like – gmail, yahoo etc for
information transfer.
In future we can add the information transfer
module so that after encryption users can transfer
informationbythesamesoftware.
Future scope
Finally, we can say that in this
project development we have
learnt a lot and during the process
we will get the chance to explore
cryptography and the concepts
involved.
CONCLUSION

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
Suhepi Saputri
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows SystemConferencias FIST
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Data security
Data securityData security
Data security
ForeSolutions
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
Data Security
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
prashant3535
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Encryption
EncryptionEncryption
Encryption
IGZ Software house
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Guide to MFA
Guide to MFAGuide to MFA
Guide to MFA
Jack Forbes
 
Data Security
Data SecurityData Security
Data Security
AkNirojan
 
Firewall
Firewall Firewall
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
DB security
 DB security DB security
DB security
ERSHUBHAM TIWARI
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Data security
Data securityData security
Data security
 
Data security
Data securityData security
Data security
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Guide to MFA
Guide to MFAGuide to MFA
Guide to MFA
 
Data Security
Data SecurityData Security
Data Security
 
Firewall
Firewall Firewall
Firewall
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
DB security
 DB security DB security
DB security
 

Viewers also liked

Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
Abou Bakr Ashraf
 
File system security
File system securityFile system security
File system security
AmmAr mobark
 
File system
File systemFile system
File system
Harleen Johal
 

Viewers also liked (6)

Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
File system security
File system securityFile system security
File system security
 
File system
File systemFile system
File system
 

Similar to File security system

A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
CSCJournals
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
Cryptography
CryptographyCryptography
Cryptography
S.M. Towhidul Islam
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
Aditya Raina
 
security issue
security issuesecurity issue
security issue
JAINIK PATEL
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
BARATH800940
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
so6281019
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
Tata Consultancy Services
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
Jennifer Reither
 
Cryptography ppt
Cryptography pptCryptography ppt

Similar to File security system (20)

A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Data encryption
Data encryptionData encryption
Data encryption
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
security issue
security issuesecurity issue
security issue
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
 
Information Security
Information SecurityInformation Security
Information Security
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 

Recently uploaded

Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 

Recently uploaded (20)

Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 

File security system

  • 2. Why Cryptography ? We all know that now a day this is the world of information technology and almost everyone have to communicate with each other. Most of the time this communication occurs on the network. During the communication of data it may be possible that the data we are sending or receiving can be hacked or edited by someone. The data we are communicating may be bank a/c number, passwords or some important files etc. To protect the data from this type of unwanted things “Cryptography” is very useful.
  • 3.  This project is all about providing security while communicating any data on the network between two or many user. We are going to discuss about the main ciphers used in Cryptography in this project.  There are various techniques of encryption and decryption which are used in this project such as  Shift or Substitution cipher  Monoalphabetic cipher  Playfair cipher  Vegenere cipher  Within the context of application-to-application communication, there are some specific security requirements, including:  Authentication  Privacy/Confidentiality  Integrity  Non-repudiation
  • 4.  Cryptography, then not only protect data from theft or alteration, but can also be used for user authentication.  There are, in general two types of Cryptographic schemes typically used to accomplish these goal: (1) Private–key ( or symmetric ) cryptography (2) Public-Key ( or asymmetric ) cryptography  In all the cases,  The initial unencrypted data is referred to as “plaintext”.  The encrypted data is referred to as “cipher text”. (which will in turn (usually) be decrypted into usable plaintext)
  • 5. 1. Introduction 1.1 Introduction to Cryptography 1.2 Types of Cryptographic Algorithm 1.2.1 Secret key Cryptography 1.2.2 Public Key Cryptography 1.2.3 Hash Function 2. Purpose 3. Objective 4. System Specification  Hardware  Software 5. Future Scope 6. Conclusion
  • 6. Introduction  The word cryptography or cryptology comes from an Ancient Greek. The word cryptology is made of two components ”crypto”, which means hidden or secret and “logos” which means word. It is a Science of writing in secret code. Cryptography is the study of techniques for secure communication.  There are two important concepts of cryptography, first one is Encryption & the second one is Decryption. Encryption is the process in which the plain text is changed into cipher Text & decryption is just reverse process of encryption that means cipher text is changed into plain text. There are various techniques of Encryption & Decryption which are used in this project such as Shift Cipher, Playfair Cipher, Monoalphabetic Cipher, Vanier Cipher.  We use the term cryptography to refer to the science and art for transforming message to make them secure from attacks.
  • 7.  The original message before being transformed is called ”Plaintext”. After the message is transformed is called ”Ciphertext”. An encryption algorithm transform the Plaintext into Ciphertext & a decryption algorithm transforms the Ciphertext back into Plaintext. Encryption Decryption #%GIUYRWKMN,S:{? Hello World! Hello World! ( ciphertext ) ( Plaintext ) ( Plaintext ) ( Shared Secret Key )
  • 8. Objective 1 . To d e v e l o p a s o f t w a r e i n w h i c h w e w i l l i n p u t : i ) F i l e s i i ) M e s s a g e s a n d w e w i l l g e t e n c r y p t e d f i l e s o r m e s s a g e s . 2 . T h e e n c r y p t e d i n f o r m a t i o n c a n b e u s e d i n t h e n e t w o r k ( l o c a l o r i n t e r n e t ) i n a s a f e a n d s e c u r e d w a y 3 . T h e s o f t w a r e c a n a l s o b e u s e d t o d e c r y p t t h e e n c r y p t e d d a t a i n t h e o r i g i n a l f o r m 4 . U s e r w i l l b e a b l e t o u s e t h e i r o w n k e y s t o e n c r y p t t h e d a t a .
  • 9. SYSTEM SPECIFICATION SOFTWARE REQUIREMENTS :  OPERATING SYSTEM : WINDOWS XP / 7  FRONT END : C#.net  BACK END : SQL Server HARDWARE REQUIREMENTS :  Processor : Pentium IV & above  Processor Speed : 1 G Hz  RAM : 2 GB  Hard Disc : 10 GB
  • 11. COLUMNS DATA TYPE SIZE Member_id int Password char 20 Security Question char 30 Security Answer char 20 L O G I N T A B L E : (FOREIGN KEY)
  • 12. MEMBER DETAIL TABLE COLUMNS Data Type Size Member_id int Name char 20 Mobile char 10 Email_id char 30 Address Char 50 (Primary Key)
  • 13. LOG TABLE Columns Data Type Size Member_id int File name char 20 Data datetime Type char 10 (FOREIGN KEY) Encryption & Decryption
  • 15. TYPES OF CRYPTOGRAPHIC ALGORITHMS  There are several ways of classifying cryptographic algorithm.  Defined by their application and use. The three types of algorithms that will be discussed are as follows. 1. Secret key Cryptography(SKC) 2. Public Key cryptography(PKC) 3. Hash Function
  • 16. SECRET KEY (SKC) Single key used to encrypt and decrypt . Key must be known by both parties. Encrypt Decrypt S a m e K e y i s u s e d t o E n c r y p t a n d D e c r y p t d a t a Sender Recipient Shared Secret Key Plaintext Ciphertext Plaintext
  • 17. PUBLIC KEY (PKC) Two different keys are used in this cryptography One key is used for encryption & other for decryption Encrypt Decrypt D i f f e r e n t K e y s a r e u s e d t o E n c r y p t a n d D e c r y p t d a t a Sender Recipient Recipient Public Key Recipient Private Key Plaintext Ciphertext Plaintext
  • 18. HASH FUNCTION  Hash is a function which is used to compress the string.  The input in the hash function is known as “Message” and output is called “Digest”.  Hash functions have four main properties :  It is easy to compute the hash value for any given message.  It is infeasible to generate a message from its hash.  It is infeasible to modify a message without changing the hash.  It is infeasible to find two different message with the same hash. Message ( variable size ) H A S H Digest ( fixed size )
  • 19. Our project(system) can do the cryptography by encrypting and decrypting data. We are dependent on other mailing systems Like – gmail, yahoo etc for information transfer. In future we can add the information transfer module so that after encryption users can transfer informationbythesamesoftware. Future scope
  • 20. Finally, we can say that in this project development we have learnt a lot and during the process we will get the chance to explore cryptography and the concepts involved. CONCLUSION