DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND IMDIVIDUALS

 

CHAPITRE ONE

 

INTRODUCTION

 

1.O THE STUDY’S BACKGROUND

 

The continuous challenge of the digital age is combining convenience and security. Security is a set of system safeguards designed to protect information technology against disasters, system failure, and illegal access, all of which can result in damage, loss, or exposure. There have been multiple cases of spammers, crawlers, and hackers invading people’s privacy in order to get unauthorized access to their data. This has increased the difficulties for database users, online merchants, and internet consumers. Information is a valuable and costly asset that, like other valuable assets inside an organization, must be presented, regulated, and planned. This work is intended to create a security mechanism that uses a computerized data encryption system to convert readable data into unreadable data in order to prevent unauthorized access. Encryption can use complex mathematical concepts to generate coded messages that are nearly impossible to decipher. It is simple to encrypt a message on a simple home computer so that the largest computer in the world cannot decipher it without spending more time on the problem that exists in the entire universe’s life span.

 

There are two types of encryption: private key encryption and public key encryption, in which the sender and receiver share the same secret key to encrypt and decrypt messages. Public key encryption, also known as asymmetric key encryption, employs two distinct keys at the same time: a private key and a public key. The private key is known only to your computer, while the public key is given to any computer that wishes to communicate securely with it. To decode an encrypted message, a computer must utilize the originating computer’s public key as well as its own private key.

 

SUMMARY OF THE PROBLEM

Security is currently a widespread and growing concern that affects all aspects of society; similarly, data and information security has emerged as one of the most pressing challenges confronting all types of modern organizations as a result of their rapid adoption of information technology (IT) in all aspects of their operations. This advancement has increased the vulnerability of data and information to unauthorized users, spammers, crawlers, and hackers who violate people’s and organizations’ privacy. This has undoubtedly increased the difficulties for those who use databases, share files, and other computer network services.

 

OBJECTIVES AND GOALS

The following are the work’s goals and objectives:

 

Reduce the stress, time consumption, and operational costs associated with a manual security system.

Create a software system that prevents unwanted access to system data files.

Suggest security approaches that help provide a pleasant working environment for enterprises whose data is under attack.

Improve the key sharing method so that users can securely share and access files.

IMPORTANCE OF THE STUDY

This research contributes to the improvement of information, data, and information security on computerized information systems, particularly in businesses where data is transported from one location to another. It will help to solve the problem of network insecurity for individual computers on a network. It also improves customer support by providing secure and accurate access to all information. It will also assist those who conduct business online.

 

APPLICATION AND LIMITATIONS

This study is solely concerned with information security (encryption and decryption) for businesses and individuals. It does not take into account the firm’s rules or other difficulties.

 

EVALUATION OF THE NEW SYSTEM

Concerning the existing system, it is critical for the organization to design a new system. This system will be created with security in mind. It will be able to check system access. It will improve system efficiency, prevent unintended data distortion, and identify fraudulent behaviors and defaulters.

 

TERMS DEFINITION

Data is a basic fact or observation, usually concerning a physical item or a business transaction. Technically, data is the raw form of information saved in our databases, network servers, and personal computers as columns and rows.

Data security is the process of protecting data from corruption and unwanted access. The goal of data security is to protect personal or corporate data while maintaining privacy.

Data that has been processed in such a way that it is meaningful to the person receiving it is referred to as information.

Cryptography is the study of encrypting data.

Encryption is the translation of data into a form that an unauthorized person cannot easily understand.

Decryption is the process of turning encrypted data back into its original form so that it may be read.

Cipher text: this is the encrypted data, also known as a cipher.

Decipher text: This is decrypted data, commonly known as plain text.

Leave a Comment