Select Currency
Translate this page

FILE ENCRYPTION AND HASH SYSTEM USING ADVANCED ENCRYPTION SYSTEM.

Format: MS WORD  |  Chapter: 1-5  |  Pages: 56  |  767 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

FILE ENCRYPTION AND HASH SYSTEM USING ADVANCED ENCRYPTION SYSTEM.

 

CHAPTER ONE

1.0. Introduction

Due to increasing use of computers, security of digital information is most important issue. An Intruder is an unwanted person who reads and changes the information while transmission occurs. This activity of intruder is called intrusion attack. To avoid such attack data may be encrypted to some formats that is unreadable by an unauthorized person. Advanced Encrption System is mainly an advance version of Data Encryption Standard. Efforts towards developing Advanced Encrption System was started by National Institute from January 1997.

Using Cryptography is essential so that the medium of file communication can secured, as its main objective is implementing the public and private key(s) with hash functions or authentication codes or digital signatures. However it provides confidentiality by itself because mostly, the concerning person knows that the message is hidden in what kind of medium (Ali et al., 2011).

1.1 Background of the Study

The most powerful and common approach to countering the threats to network / information security is using Encryption (Ayoub, 1994). Encryption is based on number of substitutions, transpositions we perform on the plaintext, converted plain text is treated as cipher text and a process of converting is called Cryptography (William, 2005). Even though encryption is very powerful among these two, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms with more number of rounds, Keys with more number of bits (Longer keys), secure transmission of keys (Ravindra, 2010).
Information transmission through internet may include sensitive personal data which may be intercepted. Also, there are many applications on the internet and many web sites require the users to fill forms that include sensitive personal information such as telephone numbers, addresses, and credit card information. So, the users may need private and secure communications for many reasons such as protect their confidential information from hackers during it passed over an open channel, so the confidentiality and data integrity are required to protect against unauthorized access and use. Cryptography is a common methods used in today’s world to secure communications of files of different types (Petitcolas, 1999).
Cryptography is meant to enable the confidentiality of communication through an insecure channel that is protected against unauthorized parties, by preventing unauthorized alteration of use (Vaudenay, 2005).
Cryptography is the science of using mathematics to encrypt and decrypt data to keep messages secured by transforming intelligible data form (plaintext) into unintelligible form (ciphertext). The term cryptography has come from the Greek word “kryptós” standing for “hidden” and “gràphin” standing for “writing”. Thus, the proper meaning of cryptography is “hidden writing”. Any cryptosystem consists of plaintext, encryption algorithm, decryption algorithm, Cipher text, and Key. Plaintext is message or data which are in their normal, readable (not encrypted) form. Encryption is the process of converting plaintext to cipher text by using key. Cipher text results from encryption by applying the encryption key on the plaintext. Decryption is the process of retrieving the plaintext back from the cipher text. The Key is used info to control the cryptosystem (cipher system), and it is known by the sender and receiver only (Schneier, 1996). While cryptography is very powerful for securing data; the cryptanalysts could success to break the ciphers by analyzing the contents of cipher text to get back the plaintext (Babu, 2010).

Advanced Encrption System is a symmetric key encryption algorithm, and NIST made a worldwide public call for the algorithm to succeed Data Encryption System. Initially 15 algorithms were selected. After detail analysis they were reduced down to 5 algorithms namely MARS, RC6, Rijndael, Serpent and Twofish. All these algorithms were iterated block ciphers. The all five finalists were determined to be qualified as the algorithm for Advanced Encryption System. After complete analysis Rijndael is selected as the algorithm for Advanced Encryption System (William, 2006).

Rijndael Algorithm can be seen to possess the following features: High security, mathematical soundness, resistance to all known attacks, high encryption speed, worldwide royalty free use, suitability across wide range of hardware and software.
The Rijndael algorithm is a symmetric block cipher that can process data blocks
of 128 bits through the use of cipher keys with lengths of 128, 192, and 256 bits. The Rijndael algorithm was also designed to handle additional block sizes and key lengths.
1.2 Statement of the Problem
Without adequately being able to protect files of varying types and sizes, a lot of harm can be done to individuals and cooperate bodies, who constantly send informations that can be described as being sensitive. With this study, a refined approach will be adopted, which will go a long way in curbing information hijacking and theft.

1.3 Aim and Objectives of the Study
The aim of this study is basically to develop a File Encryption application using Hash System alongside Advanced Encryption System, to better protect sensitive files.
The specific objectives are:
To elaborate on the process of cryptography.
To elaborate on types of Hash systems.
To elaborate on the types of encryptions available.
To elaborate on the importance of Advanced Encryption system

1.4 Scope and Limitation
This research work titled File Encryption And Hash System Using Advanced Encryption System focuses on the use of hash system in conjunction with advanced encryption system, for file encryption in other to protect information’s. This study is limited to digital files protection.
1.5 Significance of the Study
To help digital device users to better protect their sensitive files.
To help protect top government and companies files from.
To elaborate on the ways files can be protected using advanced encryption

1.6 Definition of Terms
Encryption: The process of encoding informations in a form that only the authorized parties can understand.
Cryptography: This is the practice and study of techniques for secure communication.
Hash system: This enables the conversion of a digital document, before it can be encrypted to enhance its security.
Digital File: A collection of data stored in a particular format, on computer devices.

  DOWNLOAD THE COMPLETE PROJECT

FILE ENCRYPTION AND HASH SYSTEM USING ADVANCED ENCRYPTION SYSTEM.

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON FILE ENCRYPTION AND HASH SYSTEM USING ADVANCED ENCRYPTION SYSTEM. INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Azeez Abiodun
Moshood Abiola polytechnic
I actually googled and saw about iproject master, copied the number and contacted them through WhatsApp to ask for the availability of the material and to my luck they have it. So there was a delay with the project due to the covid19 pandemic. I was really scared before making the payment cause I’ve been scammed twice, they attended so well to me and that made me trust the process and made the payment and provided them with proof, I got my material in less than 10minutes
Very Good
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Ibrahim Muhammad Muhammad
Usmanu danfodiyo university, sokoto
It's a site that give researcher student's to gain access work,easier,affordable and understandable. I appreciate the iproject master teams for making my project work fast and available .I will surely,recommend this site to my friends.thanks a lot..!
Excellent
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent
Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
Uduak From Uniuyo
IProjectMaster is the best project site for students. Their works are unique and free of plagiarism!
Excellent
Samuel From Ajayi Crowther University
You guys just made life easier for students. Thanks alot iprojectmaster.com
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on FILE ENCRYPTION AND HASH SYSTEM USING ADVANCED ENCRYPTION SYSTEM.?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on FILE ENCRYPTION AND HASH SYSTEM USING ADVANCED ENCRYPTION SYSTEM.?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for FILE ENCRYPTION AND HASH SYSTEM USING ADVANCED ENCRYPTION SYSTEM., What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!