You are on page 1of 5

File Encryption Technique

Aim:
This project provides privacy and confidentiality, access control, proof of
document transmission, and document archiving and retrieval support.

Scope:
File Encryption Technique is a Network and Security Application which is used
for Encrypting and Decrypting a file. File Encryption Technique uses Rijndael
Algorithm for Encryption and Decryption methodology. A file is been encrypted
and is been passed over the network and the other end of system it is been
decrypted. Rijndael Algorithm is one of most popular Algorithms used for
Encryption as well as Decryption methodologies.

Description:

People are reluctant to admit it, but the world revolves around secrets. Without
secrets, there would be no privacy—everybody's personal and business information
would be open to public inspection. It would be impossible to safeguard a personal
or business identity, keep a lid on future plans, conduct financial transactions, or
even maintain a bank account. Especially now, during the e-commerce explosion,
secure and reliable exchange systems are vital for the world’s economy.

This application should provide security at file content level. It uses


Cryptosystems, highly technical systems that provide privacy through secret
encoding, have been an important part of the electronic information world for
many years.
This cryptosystem protect data by using hardware and software in a process that
protects data by performing mathematical operations/algorithms on it. The result is
data rendered unintelligible, which is called cipher text. This cipher text is then
transmitted over insecure lines or networks such as the Internet. If someone
intercepts this cipher text, it is indecipherable and meaningless to him or her. When
the cipher text reaches its final destination, it can be decrypted into the original
state of the data.
Existing System:

• Developed for any one Operating System.


• Supports any one either command mode or graphical mode only.
• Usually available as a built in utility in the system.
• Should be applicable for any kind of file Size.

Proposed System:
• File Encryption Technique is supposed to run with Java runtime
environments version 1.4 and higher. This has the advantage of working
under most operating systems in use today.
• Write the code to execute as Command mode and Graphical Interface
• Provide interactive interface through which user can interact with different
types of File Size.
Modules:
In this we have 2 modules

• Encryption
• Decryption
Modules Description:
Encryption:

Encryption is the process of transforming information from an unsecured form


("clear" or "plaintext") into coded information ("cipher text"), which cannot be
easily read by outside parties. An algorithm and a key control the transformation
process. The process must be reversible so that the intended recipient can return
the information to its original, readable form, but reversing the process without the
appropriate encryption information should be impossible. This means that details
of the key must also be kept secret.

Encryption is generally regarded as the safest method of guarding against


accidental or purposeful security breaches. The strength of the encryption method
is often measured in terms of work factor - the amount of force that is required to
'break' the encryption. A strong system will take longer to break, although this can
be reduced by applying greater force (the more effort that is put into the attack, the
less time required to break the code).

Decryption:

The algorithm used in an encryption system normally remains the same for the life
of the equipment, so it is necessary to change keys frequently in order that identical
encryption is not applied to messages for a long period. It is generally desirable to
change the keys on an irregular but managed basis. Key management deals with
the generation, storage, distribution, selection, destruction and archiving of the key
variables. Two basic types of encryption in use today are known as private key
(also called single or symmetrical key) encryption and public (or asymmetrical)
key encryption.
In private key encryption, the same key is used for both encryption and decryption.
The key must be kept secret so that unauthorized parties cannot, even with
knowledge of the algorithm, complete the decryption process. A person trying to
share encrypted information with another person has to solve the problem of
communicating the encryption key without compromising it. This is normally
achieved by programming keys into all encrypt prior to deployment, and the keys
should be stored securely within the devices. Public key encryption solves the
problem of maintaining key security by having separate keys for encryption and
decryption, which uniquely match each other but are not predictable from each
other. The user retains a private decryption key and makes the public key available
for use by anyone interested in sending the user sensitive information. The
relationship between the keys is such that given the public key a person cannot
easily derive the private key.

Senders use the recipient's public key to send encrypted messages. Recipients use
their corresponding private key to decrypt messages. The private key can also be
used to encrypt messages, which can be decrypted by anyone with knowledge of
the public key (the purpose of this is to provide verification of the origin rather
than to achieve secrecy). Public key encryption is relatively inefficient and is not
suitable for either encrypting large volumes or operating at high speeds. The RSA
algorithm is a well-known form of public key encryption.

Hard Ware Requirements

• Processor:: Pentium-III (or) Higher


• Ram:: 64MB (or) Higher
• Cache:: 512MB
• Hard disk:: 10GB
Soft Ware Requirements

• Tools:: Micro Soft Front


• Operating System:: WindowsNT/2000
• Client Side:: GUI

You might also like