-
Design And Construction Of File Encryption System
-
-
-
ABSTRACT
It is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a message “Access is denied†will be displayed showing that such user is un-authorized. Package like Ms-Word, Ms- Excel, as well as slide are attached to the program for users to use and encrypt such file after saving.
File encryption is the process of translating plain text data into something meaningless (cipher text) while decryption is the reverse. Visual Basic programming language is used in designing this security program to protect file and data in order to achieve its aims and objectives.
-
-
-
CHAPTER ONE - [ Total Page(s): 4 ]The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated cipher text without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of cipher text without possessing the key.It is difficult to determine the quality of an encryption algorithm. Algorithms that look promisin ... Continue reading---
-
CHAPTER ONE - [ Total Page(s): 4 ]The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated cipher text without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of cipher text without possessing the key.It is difficult to determine the quality of an encryption algorithm. Algorithms that look promisin ... Continue reading---
ABSRACT -- [Total Page(s) 1]
Page 1 of 1
ABSRACT -- [Total Page(s) 1]
Page 1 of 1