This document describes a file security system that uses encryption to secure files. It discusses the objectives of securing files from unauthorized users and maintaining confidentiality. The system uses encryption and decryption techniques, including symmetric-key and asymmetric-key encryption. It implements these techniques across three modules: input, process, and output. The system encrypts files using the AES encryption algorithm before outputting the encrypted file.