DESIGN AND IMPLEMENTATION COMPUTERIZED DATA ENCRYPTION SYSTEM

 

ABSTRACT

 

With the discovery of the relevance of computers in all ranks and elements of life, computer systems are applicable to practically all human activities and have been used to automate most operations, particularly in areas where management data is critical. Because unauthorized access to database data, repose disclosure or alteration will infiltrate individual processes, computers have been built with an encipher and decipher package in many computer languages such as C++, paschal, Fortran, visual basic, and so on. Voting adapted from or RSA cipher encryption, the package requires two keys. The two keys are known as the public key and the secret key, respectively. The project’s goal is to create a computer data security system that uses data encryption, often known as cryptography, for LEECOM FINANCE AND INVESTMENT LTD. It also examines LEECOM FINANCE AND INVESTMENT LTD’s current data security, noting the issues faced in carrying out these processes.

 

 

CHAPITRE ONE

 

1.0 General Introduction

 

The continuous challenge of the digital age is combining convenience and security. Security is a set of system safeguards designed to protect information technology against disasters, system failure, and illegal access, all of which can result in damage, loss, or exposure. There have been multiple cases of spammers, crawlers, and hackers invading people’s privacy in order to get unauthorized access to their data. This has increased the difficulties for database users, online merchants, and internet consumers. Information is a valuable and costly asset that, like other valuable assets inside an organization, must be presented, regulated, and planned. This work is intended to create a security mechanism that uses a computerized data encryption system to convert readable data into unreadable data in order to prevent unauthorized access. Encryption can use complex mathematical concepts to generate coded messages that are nearly impossible to decipher. It is simple to encrypt a message on a simple home computer so that the largest computer in the world cannot decipher it without spending more time on the problem that exists in the entire universe’s life span.

 

There are two types of encryption: private key encryption and public key encryption, in which the sender and receiver share the same secret key to encrypt and decrypt messages. Public key encryption, also known as asymmetric key encryption, employs two distinct keys at the same time: a private key and a public key. The private key is known only to your computer, while the public key is given to any computer that wishes to communicate securely with it. To decode an encrypted message, a computer must utilize the originating computer’s public key as well as its own private key.

 

1.1 THE STUDY’S BACKGROUND

 

The invention of the computer resulted in enormous advancements in problem-solving methods. The computer has greatly improved or transformed data, information, or data processing calculation. It is utilized for a number of reasons and has applications in practically every aspect of life. The computer’s capabilities classifies it as an amazing instrument that has been used to execute tasks that would be nearly difficult to complete manually.

 

“Multimedia is the use of a computer system to combine data, text, picture, sound, animation, motion video, and graphics.” Gives the following description, and, admittedly, there are various definitions of multimedia, and the aim of this study work is meant to address the development of multimedia applications.

 

Until recently, the use of computing technology in education mostly involved data and text capabilities, which have proven beneficial in teaching basic skills and giving drill and practice to develop skills. Traditional multimedia technologies have been used to provide auxiliary support to users, often with the users’ assistance in operating the multimedia devices—remember the person in your grade school who knew how to load the film and operate the projector, or the third grader who operated the TV and VCR when the teacher wanted to show special programs? Most users would confess that they wished to include educational information from “multimedia” into their general lesson. However, the fact that the devices are complex and time-consuming to use limits their utilization.

 

Computer engineers have provided the public with computers that have incredible speed, accuracy, portability, flexibility, cost effectiveness, and the ability to accommodate all kinds of operations, making it not only desirable but also necessary for people, groups, and companies to own one.

 

Information is an essential component of human activity. Without the aid of a computer, it is difficult to process and manipulate information or data (text and image) into a preferred form for decision-making with more efficiency and dependability. For example, the continuous expansion in client population in a company has made face-to-face contact with clients virtually difficult for trade organizations. Customers can only be reached through the organization’s data gathered from a database; the information may come from an information house or a highly automated organization.

 

Many things in life are not without problems, and computers are no exception. As the saying goes, “there are always two sides to a coin,” and the introduction of a computer has brought with it challenges that constitute a threat to companies and establishments that use computers as a tool.

 

The usual computer security breach, or unauthorized access to files, is one of the hazards posed by computers. This is the world’s greatest concern right now: unlawful access to data or information due to a lack of a robust data security system to the available data of information in circulation. Some people have developed the habit of stealing data or information from one organization and selling it to another, even turning it into a business. This has caused much organizational havoc, particularly where the organization and other competitors are in close competition.

 

The second type of virus is a computer virus, which is defined as a “program that attaches itself to useful programs, data, and files and causes their modification, corruption, and deletion,” or in other words, viruses are “scraps of programs designed to accomplish certain negative tasks.” Those that generate viruses or harm computers are the dark side of hackers.

 

Love Bug (a virus) infected twenty-five million computers in twenty nations in twenty-four hours in the year 2000, according to Adesina (2002). However, the most serious issue facing the globe today is unlawful access to data or information. Hardware is not left out because thefts of computer components are common these days, affecting the progress of most organizations.

 

1.2 PROBLEM STATEMENT

 

The topic of this study effort “Multimedia Data Encryption on a Network Environment” has piqued the interest and concern of most companies that use computers and computer-related devices. Data crime has been a source of concern in the past and present, destroying organizations and corporate establishments, and if not adequately addressed, it may continue in the future. Hacking into top secret files of corporations and inserting viruses into them, or even selling such information to other organizations, has had a significant impact on some institutions by counterbalancing Electronic efficiency.

 

Computer input manipulation, program alteration, unauthorized access, program piracy, hacking, computer theft, Trojan horse, logic bomb, worms, and viruses are examples of computer crimes.

 

1.3 STUDY OBJECTIVES

 

Multimedia With the introduction of time-sharing computers, with multiple terminals scattered across a vast geographical area, data security systems or management have become important.

 

The goal of this project is to create a software package that will encrypt 32 bit multimedia data files on a network.

 

1.4 THE STUDY’S OBJECTIVE

 

The following is the goal of this research project:

 

i. To establish safeguards that would be used to secure a multimedia data system.

 

ii. To create and build a user-defined package or software that can be used to convert multimedia and other symbols into a form that only those involved can understand.

 

iii. Provide a corrective measure that could guarantee reliable security of data and information on hard disk, CD,DVD, and other storage devices against unauthorized access or use, even if it is hacked or taken by unlawful users.

 

1.6 STUDY OBJECTIVES

 

This project discusses a variety of measures that could be used in safeguarding multimedia data systems and procedures. Despite this, there are numerous technical safeguards in place to protect data from unauthorized disclosure.

 

Data collection is the process of gathering information for a certain study. Data collecting methods can also be seen as data gathering sources.

 

The primary data collection sources are the primary data collecting sources that have to do with direct interaction with data. This includes the following:

 

i. Personal interview

 

Questionnaire ii

 

iv. Record examination

 

Observation iv.

 

However, two strategies are applied in this project. These are they:

 

I. The Interview

 

Observation No. 2

 

I. Interview; it allows the responder to fully express his or her perspective while also allowing the analyst to explain aspects the respondent is unaware of.

 

II. Observation; it provides firsthand knowledge on how tasks are carried out, as well as assisting in identifying weaknesses and potential solutions.

 

The analyst has access to the following data:

 

I. Typical Operating Procedure

 

II. Control and double-check accuracy and completeness

 

III. Data efficiency, timeliness, and extra security

 

1.7 THE STUDY’S LIMITATIONS

 

There must be limitations in any research that would prevent the complete realization of its operations; nonetheless, the following issues limit this research work:

 

To begin, this work cannot be utilized for any other reason other than those relating to multimedia data or information, and it is only limited to a single password program, multimedia enciphering and decoding, and access to the system confined to authorized staff/users.

 

Second, it concentrates solely on software files or information rather than hardware security, but it does discuss some measures that can be used for both.

 

Third, the time frame given for project completion is also a constraint due to the project’s intricacy, as it is only within a semester, which is normally four months of session.

 

Finally, financial constraints are a hindrance to the full researcher by the researcher.

 

1.8 THE STUDY’S SIGNIFICANCE

 

This research contributes to the improvement of information, data, and information security on computerized information systems, particularly in businesses where data is transported from one location to another. It will help to solve the problem of network insecurity for individual computers on a network. It also improves customer support by providing secure and accurate access to all information. It will also assist those who conduct business online.

 

Another important aspect of our endeavor is to provide:

 

I. Providing an effective and dependable degree of security measures, as well as providing a security system that differs from one business to the next.

 

ii. Another key consideration is for the computer system and operations to implement good and dependable security measures.

 

1.9 TERM DEFINITION

 

The following concepts are used in this research and are briefly described below;

 

ENCRYPTION is the process of transforming data/information into a different format.

 

DECRYPTION is the process of restoring data/information (multimedia) to its original state.

 

Plaintext/cleartext; the original data/information before it has been enciphered/scrambled.

 

Text that has been ciphered/cryptogrammed; information (multimedia) that has been translated into other symbols or form.

 

Ciphers are the secret codes that are used to convert plain text messages.

 

Hackers are individuals who take information without permission.

 

Cryptography is the process of concealing written information.

 

Cryptographers are people who conceal writing information.

 

Cryptologist; a scientist who studies various methods of protecting information or data.

 

Cryptanalysis is the art of breaking ciphers, some of which are derived from program codes.

 

American Standard Codes for Information Interchange (ASCII).

 

BASIC stands for Beginners All-Purpose Symbols and Instruction Codes.

 

DES stands for Data Encryption Standard.

Leave a Comment