Contact at or 8097636691
Responsive Ads Here

Thursday, 1 February 2018

Digital Encryption System

Digital Encryption System

Encryption is the process of transforming information from an unsecured form ("clear" or "plaintext") into coded information ("cipher text"), which cannot be easily read by outside parties. An algorithm and a key control the transformation process. The process must be reversible so that the intended recipient can return the information to its original, readable form, but reversing the process without the appropriate encryption information should be impossible. This means that details of the key must also be kept secret.
Encryption is generally regarded as the safest method of guarding against accidental or purposeful security breaches. The strength of the encryption method is often measured in terms of work factor - the amount of force that is required to 'break' the encryption. A strong system will take longer to break, although this can be reduced by applying greater force (the more effort that is put into the attack, the less time required to break the code).
Key Management
There are three basic elements in any encryption system:
-- a means of changing information into code (the algorithm);
-- a secret starting point for the algorithm (the key); and
-- a system to control the key (key management).
The key determines how the algorithm - the encryption process - will be applied to a particular message, and matching keys must be used to encrypt and decrypt messages.
The algorithm used in an encryption system normally remains the same for the life of the equipment, so it is necessary to change keys frequently in order that identical encryption is not applied to messages for a long period. It is generally desirable to change the keys on an irregular but managed basis. Key management deals with the generation, storage, distribution, selection, destruction and archiving of the key variables. Two basic types of encryption in use today are known as private key (also called single or symmetrical key) encryption and public (or asymmetrical) key encryption.
In private key encryption, the same key is used for both encryption and decryption. The key must be kept secret so that unauthorized parties cannot, even with knowledge of the algorithm, complete the decryption process. A person trying to share encrypted information with another person has to solve the problem of communicating the encryption key without compromising it. This is normally achieved by programming keys into all encrypts prior to deployment, and the keys should be stored securely within the devices. In a relatively small network of encrypts, the task of key management (including key changes) is easily handled for a private key system. Private key encryption is a commonly used method of key management, and is used for standard algorithms such as DES and Triple DES.
Public Key Encryption 
Public key encryption solves the problem of maintaining key security by having separate keys for encryption and decryption, which uniquely match each other but are not predictable from each other. The user retains a private decryption key and makes the public key available for use by anyone interested in sending the user sensitive information. The relationship between the keys is such that given the public key a person cannot easily derive the private key.
Senders use the recipient's public key to send encrypted messages. Recipients use their corresponding private key to decrypt messages. The private key can also be used to encrypt messages, which can be decrypted by anyone with knowledge of the public key (the purpose of this is to provide verification of the origin rather than to achieve secrecy). Public key encryption is relatively inefficient and is not suitable for either encrypting large volumes or operating at high speeds. The RSA algorithm is a well-known form of public key encryption.
Existing System 
After a detailed system study by observing the existing systems the following things have been noticed.
1. In existing system, the user sends data from one system to the desired system in Local Area Network.
2. Authorized persons can view the data at the receiving end.
3. Due to the lack of security not only authorized persons but also unauthorized persons can view the data.
4. Based on the above drawbacks the current project has been developed.
Proposed system
In this modern world, unauthorized persons are trying to view the data illegally.
This project will  allow authorized person to view the data who knows the secrete key So unauthorized persons will be restricted to some extent
Purpose: The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system.
Scope: This Document plays a vital role in the development life cycle (SDLC)
It describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process.
Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered. The digital Encryption System is software, which tries to alter the originality of the text into some encrypted form.
The major task of the Digital Encryption System is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user.
DES Encrypts and decrypts data in 64-bit block of cipher text. Since it always operates on blocks of equal size and it uses both permutations and substitutions in the algorithm, DES is both a block cipher and a product cipher.
DES has 16 rounds, meaning the main algorithm is repeated 16 times to produce the cipher text. It has been found that the number of rounds is exponentially proportional to the amount of time required to find a key using a brute-force attack. So as the number of rounds increases, the security of the algorithm increases exponentially
This project “DES (Digital Encryption System)” is developed on client server technology. The client encrypts the file and sends to the server. Other client will receive the file and decrypts the file by using the same private key. It is developed by java to provide platform neutral nature. It is developed in Java Swing to provide a better GUI. Java Swing provides a better look and feel.

Web Server
 Database Server
Pentium P4 or equivalent processor, 1 GB RAM, 500 MB space (at least 30% of hard disk space should be empty for optimal performance)

Database server should have similar specifications with minimum 10MB space allocated at database creation.
Software / Operating System
Windows 2003 Server
Application Frame work
Web Server
Oracle 10i
I.E 6.0 Or Above

No comments:

Post a Comment