Design And Implementation Computerized Data Encryption System

 

Abstract

 

Having discovered the significance of computers in all species and aspects of life, computer system is applicable to nearly all mortal conditioning and has been employed to automats most conditioning especially in areas were operation data is of furthermost significance. Due to unauthorized access to data in database, repose exposure or revision will foray individual process, computers have been produced with an encipher and decipher package in colorful computer language like C, paschal, Fortran, visual introductory etc. advancing modified from or RSA cipher encryption, the package is two keys are needed. The two keys are public key and secret crucial independently. The design is aimed at developing a computer data security system using data, encryption know as cryptography to LEECOM FINANCE AND INVESTMENT LTD. it also takes a look at the present data security of LEECOM FINANCE AND INVESTMENT LTD, relating the problems encountered in carrying out these process.

 

 

Chapter One

 

Preface

 

The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for guarding information technology against disasters, system failure, and an unauthorized access that can affect in damage, loss or exposure. There are several reports of spammers, dawdlers and hackers who break into people’s sequestration to gain illegal access to their data. This has posed lesser challenges on people who use database, distribute online, and internet druggies. Information is a precious and expensive asset that must be presented, controlled and planned just like other precious means within an association. This work is designed to give a security medium using a motorized data encryption system, readable data is altered into undecipherable form to help unauthorized access. Encryption is suitable to use important fine conception to produce enciphered communication that’s nearly insolvable to break. It’s easy to cipher a communication on a simple particular computer so that the biggest computer in the world couldn’t decrypt without spending for further time on the problem that exists in the life span of the entire macrocosm.

 

There are two introductory forms of encryption; private crucial encryption and public key encryption, the same secret key is used by the sender and receiver to encrypt and decipher communication. Public crucial encryption also known as asymmetric crucial encryption uses two different keys at formerly, a combination of a private key and public key, the private key is known only to your particular computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To crack an translated communication, a computer must use the public key, handed by the forming computer, and its own private key.

 

Background Of The Study

 

The arrival of computer has brought about tremendous advancement in means ways of working problems. The computer has significantly bettered or changed the calculation of data, information. or data processing conditioning. It used for variety of purposes and it has set up an operation in nearly all areas of life The capability of computer qualifies it as an outstanding tool that has been used to perform task that would nearly be done manually insolvable.

 

Multimedia is use of combination of data, textbook, picture, sound, vitality, stir videotape, and plates on a computer system. ” Gives the below description, and actually there are numerous delineations of multimedia and the focus of this exploration work is intended to address the development of operations using multimedia.

 

Use of calculating technologies in education has, until veritably lately, primarily included data and textbook capabilities, which have proven useful in tutoring introductory chops and in furnishing drill and practice to ameliorate chops. Conventional multimedia technologies have been used as supplementary support to druggies, frequently with the help of the druggies to operate the multimedia bias flash back the person in your grade academy who knew how to load the film and operate the projector, or the third grader who operated the television and VCR when the schoolteacher wanted to show special programs? utmost druggies would admit they wanted to include the educational content material in the “ multimedia ” as part of their general instruction. still, the fact that the bias are delicate and clumsy to operate tends to limit their use.

 

Computer masterminds have presented the public with computer amazing speed, delicacy, portability, inflexibility, Cost effective and its capability to accommodate all fields of operations, which make it not only desirable but ineluctable for individualities, group and associations to trains it.

 

Information constitutes a vital part of mortal conditioning. The processing and manipulation of information or data( textbook and image) into to desirable form for decision- timber can hardly be achieved with further effectiveness and trustability, without the use of computer. For case the continue increase in customer population in an association has made it virtually insolvable for trade association to have a face- to – face contact with their guests. The guests can only be reached through the association’s data attained from database, the information may be from information house or association on process is largely motorized.

 

numerous effects in life that are known to man aren’t without problems, and computer isn’t an exception as an old age goes “ there is always two sides to a coin ”, the arrival of a computer has brought with it problems that poses a trouble to associations and establishment that uses computer as a tool.

 

One of the pitfalls that posed by the computer is the common computer security breach or rather the unauthorized access to lines. This is the major problem in the world now, which is the problem of unauthorized access to data or information due to limited or no proper data security system to the available data of information on rotation. Some people now have espoused the habit of stealing data or information from one association and dealing it to other association and they indeed make it as their business, this has caused important association annihilation, especially where there are close competition between the association and other challengers.

 

The second is that of computer contagion which is defined as “ program that attached itself to the useful programs, data, lines, and beget their revision, corruption, and omission ”, or in other words contagion are defined as “ scraps of programs designed to negotiate certain negative task ”. On dark side of hackers are those who produce programs called contagions or damage computers.

 

Love Bug( a contagion) for case infected twenty five million computers in twenty countries within twenty- four hours in the time 2000 by Adesina( 2002). But the major problem worldwide now is the problem of unauthorized access to data or information. The tackle isn’t left out because thefts of computer factors are rampant these days, which also contributes negatively to the progress of utmost association.

 

Statement Of Problem

 

The subject matter of this exploration work “ Multimedia Data Encryption on a network terrain ” that has been of high interest and concern to utmost associations that are presently using computer and computer relate bias. Data crime has been a content of concern and has wrecked associations and business establishment in the history and present and if not duly addressed, it may continue indeed in future. Hacking into associations top secret lines and introducing contagion into them or indeed dealing similar information to other associations has really affected some establishments by counter balancing Electronic effectiveness.

 

Some computer crimes are computer input manipulation, program revision, unauthorized access, program pirating, hacking, computer theft, Trojan steed, sense lemon, worms, and contagion.

 

Points Of The Study

 

Multimedia Data security system or operation has come necessary at the arrival of time- participating computers, with numerous outstations dispersed over a large geographical area.

 

This exploration work is aimed at developing a software package that will cipher 32 bit multimedia data lines on a network terrain.

 

Ideal Of The Study

 

The ideal of this exploration work is

 

To give defensive measures that would be use to secure multimedia data system.

 

ii. To achieve the design and construction of a stoner defined package or software that can be used in converting multimedia and other symbols to a form that can only be understood by those concerned.

 

iii. give a corrective measure that could guarantee dependable security of data and information on hard fragment, CD, DVD and other storehouse bias from unauthorized access or use of data or information indeed if it’s addressed or stolen by illegal druggies.

 

Compass Of The Study

 

This design covers a range of measures that could be employed in securing multimedia data system and procedure that nearly bandied numerous types of computer crime and their associated sequestration and security measures. Though, there are numerous measures that are technically used to cover the data from or unauthorized exposure.

 

Data collection is a process in which data are gathers to grease a particular study. system of data collection can also be viewed as sources of data collection.

 

Primary source of data collection is the main data collection sources, which have to do with direct contact with data. This includes

 

Interview

 

ii. Questionnaire

 

iii. Record examination

 

iv. Observation

 

But in the course of this design two ways are used. These are;

 

Interview

 

II. Observation

 

Interview; it allow the replier to express his/ her opinion in full, and it also enable the critic to explain effects the replier do n’t indeed know.

 

II. Observation; it give first hand information about how conditioning are carried out, and also help to know weakness involve and ways of finding result to it.

 

The critic is suitable to know the following information

 

Standard operating procedure

 

II. Control and check for delicacy and absoluteness

 

III. effectiveness, timely and provision of redundant security to data

 

Limitation Of The Study

 

In any exploration there must be limitation that would hamper the full fruition of its operations still this exploration work is limited by following factors

 

originally, this work can not be used for other purpose other than the related to multimedia data or information and is only confined to a single word program, rendering and decoding of multimedia that will allow access to the system only to authorized staff/ druggies.

 

Secondly, it only focuses on software lines or information rather than tackle security although it explains certain measure that can be espoused for both.

 

Thirdly, the time frame gives for the completion of the design is also a constraints because of the complexity of the design since is just within a semester is generally four months of session.

 

Incipiently, fiscal constraint is also a problem that hinders the full experimenter by the experimenter.

 

Significant Of The Study

 

This study serves as a donation towards perfecting information, data and information security on motorized information systems especially for associations where data is transferred from one point to another. It’ll contribute in working the problems of instability on both network for individual computers on a network. It also enhances the capability to support guests by furnishing secured and accurate access to all information. In the same manner, it’ll profit those who distribute online.

 

Other significant of this work is to give

 

I. An effective and dependable position of security measures and icing a security system that varies from one association to another.

 

ii. Another important significant is for the computer system and operations to carryout good and dependable security measures it’s meant for.

 

Defination Of Terms

 

Grounded on this exploration work, the following terms are used, and compactly defined bellow;

 

ENCRYPTION; a process of converting data information into another form.

 

DECRYPTION; a process of converting data information( multimedia) back to its Original form.

 

CLEAR- TEXTBOOK/ PLAINTEXT; original data information before it’s coded climbed.

 

CALCULATED TEXTBOOK/ CRYPTOGRAM; information( multimedia) that has been converted into other symbols or form.

 

CIPHERS; the secret law used to convert plain textbook communication.

 

HACKERS; people who steal information without authorization.

 

CRYPTOGRAPHY; this is process of hiding writing information.

 

CRYPTOGRAPHERS; those that hide writing information.

 

CRYPTOLOGIST; scientist who study different ways to cover information or data.

 

CRYPTANALYSIS; is the art of breaking of ciphers, some from program canons.

ASCII; American Standard Codes for Information Interchange.

 

BASIC; Beginners All-Purpose Symbols Instruction Codes.

 

DES; Data Encryption Standard.

Leave a Comment