[ad_1]
CHAPTER ONE
1.0. Introduction
Due to increasing use of computers, security of digital information is most important issue. An Intruder is an unwanted person who reads and changes the information while transmission occurs. This activity of intruder is called intrusion attack. To avoid such attack data may be encrypted to some formats that is unreadable by an unauthorized person. Advanced Encrption System is mainly an advance version of Data Encryption Standard. Efforts towards developing Advanced Encrption System was started by National Institute from January 1997.
Using Cryptography is essential so that the medium of file communication can secured, as its main objective is implementing the public and private key(s) with hash functions or authentication codes or digital signatures. However it provides confidentiality by itself because mostly, the concerning person knows that the message is hidden in what kind of medium (Ali et al., 2011).
1.1 Background of the Study
The most powerful and common approach to countering the threats to network / information security is using Encryption (Ayoub, 1994). Encryption is based on number of substitutions, transpositions we perform on the plaintext, converted plain text is treated as cipher text and a process of converting is called Cryptography (William, 2005). Even though encryption is very powerful among these two, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms with more number of rounds, Keys with more number of bits (Longer keys), secure transmission of keys (Ravindra, 2010).
Information transmission through internet may include sensitive personal data which may be intercepted. Also, there are many applications on the internet and many web sites require the users to fill forms that include sensitive personal information such as telephone numbers, addresses, and credit card information. So, the users may need private and secure communications for many reasons such as protect their confidential information from hackers during it passed over an open channel, so the confidentiality and data integrity are required to protect against unauthorized access and use. Cryptography is a common methods used in today’s world to secure communications of files of different types (Petitcolas, 1999).
Cryptography is meant to enable the confidentiality of communication through an insecure channel that is protected against unauthorized parties, by preventing unauthorized alteration of use (Vaudenay, 2005).
Cryptography is the science of using mathematics to encrypt and decrypt data to keep messages secured by transforming intelligible data form (plaintext) into unintelligible form (ciphertext). The term cryptography has come from the Greek word “kryptós” standing for “hidden” and “gràphin” standing for “writing”. Thus, the proper meaning of cryptography is “hidden writing”. Any cryptosystem consists of plaintext, encryption algorithm, decryption algorithm, Cipher text, and Key. Plaintext is message or data which are in their normal, readable (not encrypted) form. Encryption is the process of converting plaintext to cipher text by using key. Cipher text results from encryption by applying the encryption key on the plaintext. Decryption is the process of retrieving the plaintext back from the cipher text. The Key is used info to control the cryptosystem (cipher system), and it is known by the sender and receiver only (Schneier, 1996). While cryptography is very powerful for securing data; the cryptanalysts could success to break the ciphers by analyzing the contents of cipher text to get back the plaintext (Babu, 2010).
Advanced Encrption System is a symmetric key encryption algorithm, and NIST made a worldwide public call for the algorithm to succeed Data Encryption System. Initially 15 algorithms were selected. After detail analysis they were reduced down to 5 algorithms namely MARS, RC6, Rijndael, Serpent and Twofish. All these algorithms were iterated block ciphers. The all five finalists were determined to be qualified as the algorithm for Advanced Encryption System. After complete analysis Rijndael is selected as the algorithm for Advanced Encryption System (William, 2006).
Rijndael Algorithm can be seen to possess the following features: High security, mathematical soundness, resistance to all known attacks, high encryption speed, worldwide royalty free use, suitability across wide range of hardware and software.
The Rijndael algorithm is a symmetric block cipher that can process data blocks
of 128 bits through the use of cipher keys with lengths of 128, 192, and 256 bits. The Rijndael algorithm was also designed to handle additional block sizes and key lengths.
1.2 Statement of the Problem
Without adequately being able to protect files of varying types and sizes, a lot of harm can be done to individuals and cooperate bodies, who constantly send informations that can be described as being sensitive. With this study, a refined approach will be adopted, which will go a long way in curbing information hijacking and theft.
1.3 Aim and Objectives of the Study
The aim of this study is basically to develop a File Encryption application using Hash System alongside Advanced Encryption System, to better protect sensitive files.
The specific objectives are:
To elaborate on the process of cryptography.
To elaborate on types of Hash systems.
To elaborate on the types of encryptions available.
To elaborate on the importance of Advanced Encryption system
1.4 Scope and Limitation
This research work titled File Encryption And Hash System Using Advanced Encryption System focuses on the use of hash system in conjunction with advanced encryption system, for file encryption in other to protect information’s. This study is limited to digital files protection.
1.5 Significance of the Study
To help digital device users to better protect their sensitive files.
To help protect top government and companies files from.
To elaborate on the ways files can be protected using advanced encryption
1.6 Definition of Terms
Encryption: The process of encoding informations in a form that only the authorized parties can understand.
Cryptography: This is the practice and study of techniques for secure communication.
Hash system: This enables the conversion of a digital document, before it can be encrypted to enhance its security.
Digital File: A collection of data stored in a particular format, on computer devices.
GET THE COMPLETE PROJECT»
Do you need help? Talk to us right now: (+234) 8111770269, 08111770269 (Call/WhatsApp). Email: [email protected]
IF YOU CAN’T FIND YOUR TOPIC, CLICK HERE TO HIRE A WRITER»
Disclaimer: This PDF Material Content is Developed by the copyright owner to Serve as a RESEARCH GUIDE for Students to Conduct Academic Research. You are allowed to use the original PDF Research Material Guide you will receive in the following ways: 1. As a source for additional understanding of the project topic. 2. As a source for ideas for you own academic research work (if properly referenced). 3. For PROPER paraphrasing ( see your school definition of plagiarism and acceptable paraphrase). 4. Direct citing ( if referenced properly). Thank you so much for your respect for the authors copyright. Do you need help? Talk to us right now: (+234) 8111770269, 08111770269 (Call/WhatsApp). Email: [email protected]
Related Current Research Articles
[ad_2]
Purchase Detail
Hello, we’re glad you stopped by, you can download the complete project materials to this project with Abstract, Chapters 1 – 5, References and Appendix (Questionaire, Charts, etc) for N4000 ($15) only, To pay with Paypal, Bitcoin or Ethereum; please click here to chat us up via Whatsapp.
You can also call 08111770269 or +2348059541956 to place an order or use the whatsapp button below to chat us up.
Bank details are stated below.
Bank: UBA
Account No: 1021412898
Account Name: Starnet Innovations Limited
The Blazingprojects Mobile App
Download and install the Blazingprojects Mobile App from Google Play to enjoy over 50,000 project topics and materials from 73 departments, completely offline (no internet needed) with the project topics updated Monthly, click here to install.
Recent Comments