• Design And Construction Of File Encryption System

  • CHAPTER ONE -- [Total Page(s) 4]

    Page 4 of 4

    Previous   1 2 3 4
    • ix.    Cryptography: it is the act of writing in code or cipher.
      x.    Symmetric-key: The method of using a single key for encryption and decryption. It can also be referred to as private-key
      xi.    Asymmetric-key: The method of using a key for encryption and another key for decryption. It can also be referred to as a public-key.
      xii.    Algorithm: It is a step by step instruction of solving problem.
      xiii.    LAN: Local Area Network.
      xiv.    Kernel: A kernel is the piece or pieces of pieces of software that is responsible for servicing resource request from the application and the management of resources. A kernel grant access to resources such as allocating space for a new file or creating a network collection.
      xv.    Cryptography API: Contains functions that allows applications to encrypt or digitally signed sign data in a flexible manner, while providing protection for the user’s sensitive private key data.
      xvi.    Stream Cipher: Stream ciphers, which encrypt continuous streams of data.
      xvii.    Block Cipher: Block ciphers, which encrypt block of data of fixed size.

  • CHAPTER ONE -- [Total Page(s) 4]

    Page 4 of 4

    Previous   1 2 3 4
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTIt is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a message ... Continue reading---