ABSTRACT
This study was created in order to
analyze and develop computerized data Encryption software that will help to
protect and secure the data of Fugro Nigeria and its workers. It begins with an
explanation of Encryption, its application, techniques and uses. It also
examines the development of an Encryption system to enhance security, user
identification and Company data transfer protection, and also to replace the
older system of security which comprises non computerized methods like
cabinets, use of padlocks and safes, with a stronger system which enables
access protection, authorization, centralized storage and backup. There are
various strategies and techniques used to design security systems. However,
there are few that are as effective as encryption and decryption. One technique
enforces the principle of least privilege to great extent, where an entity has
only the privileges that are needed for its function.
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1
BACKGROUND
OF THE STUDY
1.2
STATEMENT
OF PROBLEM
1.3
OBJECTIVES
OF THE STUDY
1.4
SIGNIFICANCE
OF THE STUDY
1.5
SCOPE
OF THE STUDY
1.6
LIMITATION
OF THE STUDY
1.7
DEFINITION
OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 ENCRYPTION
2.1.1 SOME FORMS OF ENCRYPTION PROTOCOL
2.1.2 TYPES OF ENCRYPTION ALGORITHM
2.1.3 METHODS OF
ENCRYPTION ALGORITHM
2.2 THE
ADVANCED ENCRYPTION STANDARD (AES)
2.2.1 DESCRIPTION OF THE CIPHER
2.3
DATA
ENCRYPTION STANDARD (DES)
2.3.1
DES
HISTORY AND CONTROVERSY
2.4 INTERNET
ENCRYPTION
2.4.1 ENCRYPTION METHODS
2.5 SYMMETRIC
ALGORITHM VS ASYMMETRIC ALGORITHM
2.6 CIPHERS
2.7 CRYPTOGRAPHIC
SYSTEM TECHNIQUES
2.8
APPLICATION OF CRYPTOGRAPHY
CHAPTER
THREE
3.0 RESEARCH METHODOLOGY, ANALYSIS AND DESIGN
3.1 SYSTEM INVESTIGATIONS AND ANALYSIS
3.1.1 FACT
FINDING
3.1.2 RESEARCH
METHODOLOGY
3.1.3 METHODS
OF DATA COLLECTION
3.1.4 ANALYSIS
OF DATA
3.2 DESCRIPTION
OF THE PRESENT SYSTEM
3.2.1 ANALYSIS
OF THE PRESENT SYSTEM
3.3 WEAKNESS
/ PROBLEMS OF THE PRESENT SYSTEM
3.4 DESIGN OF THE PROPOSED SYSTEM
3.4.1 JUSTIFICATION OF THE PROPOSED SYSTEM
3.4.2 ENCRYPTION ALGORITHM TO BE USED IN DESIGNING
THE PROPOSED SYSTEM,
3.6 INPUT SPECIFICATION
3.7 OUTPUT SPECIFICATIONS
3.8 ACTIVITY PROCEDURE
3.8.1 OVERALL
DATA FLOW DIAGRAM OF THE PROPOSED SYSTEM
CHAPTER FOUR
4.0 IMPLEMENTATION AND DOCUMENTATION
4.1 PROGRAM IMPLEMENTATION
4.2 SYSTEM IMPLEMENTATION
4.3 HARDWARE REQUIREMENTS
4.4
SOFTWARE
REQUIREMENTS
4.5 PROCEDURE
FOR CONVERSION
4.6
PROGRAM DOCUMENTATION
4.6.1 INSIGHT ON THE .NET FRAMEWORK
4.6.2
CHOICE
OF PROGRAMMING LANGUAGE (VISUAL BASIC.NET)
4.6.3
HOW
TO INSTALL THE SOFTWARE
4.6.4
SOFTWARE
TESTING
CHAPTER
FIVE
5.0 SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 SUMMARY
5.2 CONCLUSION
5.3 RECOMMENDATION
APPENDIX: PROGRAM SOURCE CODES
CHAPTER ONE
1.0 INTRODUCTION
Information
security is the means of securing data or information from loss, theft,
destruction, corruption and unauthorized access. In the past, security was
simply a matter of locking the door or storing files in a locked filing cabinet
or safe. Today, paper is no longer the only medium of choice for housing
information. That information can also be stored in computer database, hard
drives, floppy disks and other means of data storage. Therefore information
security helps to ensure privacy and also protection of personal information.
One
of the techniques of one of achieving this purpose is “Cryptography”.
Cryptographic techniques have been used to protect information since ancient
times, but only individuals and organizations with extraordinary need for
confidentiality like the military government had bothered to exert the effort
required to implement it. But as time passed and information security grew
larger due to everyday businesses, cryptography became one of the most important
tools for privacy and also a means of access control or restriction.
One
basic topic in cryptography is that of Encryption and Decryption. Encryption is
defined as the conversion of information*written, readable text) to an
unreadable form called cipher text, which is impossible to read except of those
that posses the secret key or appropriate knowledge to decipher the message.
Decryption on the other hand is the opposite of Encryption that is the
transformation of the cipher text back to its original form. The process of
Encryption and Decryption require the use of secret information called the key.
Cryptography is one practical means of sending information over an insecure
channel. These channels may be computer networks, telephone lines, wireless intercom
system, internet, bank ATM etc. the increasing need of using electronic means
to store data has extended the need to protect the same data from corruption
destruction and unauthorized access. Such information could be banking
information, academic information, sensitive database, hospital records, etc.
1.1 BACKGROUND
OF THE STUDY
Security is a primary issue which
means that staffs of Fugro Nigeria Limited need to ensure that any confidential
information is kept safe from corruption, destruction, theft and unauthorized
access. Transmitting sensitive information such as security of financial data
requires a system that can ensure privacy. The reason for using cryptography
for storing important information is to protect the confidentiality of
information and also to improve productivity, integrity and to prevent
unnecessary abuse.
The topic “design and implementation
of a secured computer system, using data Encryption and Decryption” is an
introduction of a security strategy to safeguard information stored and used by
Fugro Nigeria Limited. It is achieved by Encrypting any confidential
information put into it, using Encryption mechanism and then applying
Decryption mechanism in order to extract the original information.
1.2 STATEMENT
OF PROBLEM
The problem is security; the password
method used in almost all commercial operating systems even those deployed in
Fugro Nigeria Limited, is probably not very strong against a sophisticated
attacker. The choice of data Encryption comes next for the reduction of unauthorized
access of confidential files or company data.
1.3
OBJECTIVES OF THE STUDY
1. The
major objective of this study is to produce an Encryption software that will
enhance data security in Fugro Nigeria Limited
2. To
highlight the features of information security
3. To
ensure that maximum protection and authentication of information is achieved
4. To
ensure that information access is to only authorized personnel of Fugro Nigeria
Limited
5. To
highlight the dangers that may affect information
6. To
help enhance information integrity
7. Implementation
of a new Encryption Algorithm / Technique
8. To
help safeguard against information when transmitting data across channels.
1.4
SIGNIFICANCE OF THE STUDY
Due to the importance of encryption,
most organizations have devoted so much effort to device access control
measures that will prevent unauthorized persons from getting access to
information that does not concern them. The significance of this study is to
ensure the confidentiality, accountability, integrity and availability of
information security and privacy in Fugro Nigeria Limited
1.5
SCOPE OF THE STUDY
The study is focused on designing an
application using encryption and decryption techniques to safeguard the
information stored in systems used by Fugro Nigeria Limited in order to improve
security and secrecy of company data.
1.6 LIMITATION
OF THE STUDY
Limitations encountered during this
project study include
-
Poor power supply when developing software
-
Lack of good text and journals on
cryptography
-
Inadequate finance
-
Time constraint
1.7 DEFINITION
OF TERMS
ENCRYPTION: This is the process of converting ordinary
information into unreadable text/ cipher text
DECRYPTION: This is the reverse of encryption, from cipher
text to plain text
CIPHER: Algorithm that handles the
encryption and decryption process
CIPHER TEXT: The
unreadable text created after encryption
KEY: Secret parameter that
determines the functional output of the crypto algorithm or cipher
ALGORITHM: A series of well defined steps that can be
followed to achieve a task or goal.
Buyers has the right to create
dispute within seven (7) days of purchase for 100% refund request when
you experience issue with the file received.
Dispute can only be created when
you receive a corrupt file, a wrong file or irregularities in the table of
contents and content of the file you received.
ProjectShelve.com shall either
provide the appropriate file within 48hrs or
send refund excluding your bank transaction charges. Term and
Conditions are applied.
Buyers are expected to confirm
that the material you are paying for is available on our website
ProjectShelve.com and you have selected the right material, you have also gone
through the preliminary pages and it interests you before payment. DO NOT MAKE
BANK PAYMENT IF YOUR TOPIC IS NOT ON THE WEBSITE.
In case of payment for a
material not available on ProjectShelve.com, the management of
ProjectShelve.com has the right to keep your money until you send a topic that
is available on our website within 48 hours.
You cannot change topic after
receiving material of the topic you ordered and paid for.
Login To Comment