100% found this document useful (1 vote)
46 views14 pages

Team Members:: Course Code: CSE3001 Course Name: Software Engineering Faculty Name: Dr. Anand Bihari

The document provides a software requirements specification for a secured pocket store application for a personal computer (PC) using cryptographic solutions. It includes sections on introduction, overall description, specific requirements, external interfaces, performance, design constraints, system attributes, and diagrams. The application will provide an interface for users to encrypt and decrypt text files on their PC using cryptographic algorithms and keys.

Uploaded by

xyz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
46 views14 pages

Team Members:: Course Code: CSE3001 Course Name: Software Engineering Faculty Name: Dr. Anand Bihari

The document provides a software requirements specification for a secured pocket store application for a personal computer (PC) using cryptographic solutions. It includes sections on introduction, overall description, specific requirements, external interfaces, performance, design constraints, system attributes, and diagrams. The application will provide an interface for users to encrypt and decrypt text files on their PC using cryptographic algorithms and keys.

Uploaded by

xyz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Course Code : CSE3001

Course Name: SOFTWARE ENGINEERING

Faculty Name: Dr. Anand Bihari

LAB ASSESSMENT-2

TEAM MEMBERS:
VENKATESWARA RAO DUNNE-19BDS0007

AARYASH KANSAL -19BCE0339


SECURED POCKET STORE FOR
POCKET PERSONAL COMPUTER
USING WINDOWS
SE CRYPTOGRAPHIC
SOLUTION

PREFACE:

This document represents the Software Requirements


Specification for the secured pocket store for pc using
cryptographic solution. The document begins with an
Introduction section that describes the purpose of the document
and what is considered to be in the scope of this document as
well as what is outside the scope of this document. The next
section is an Overall Description of the requirements and
functions. This section includes the overall constraints that the
project is working within as well as the assumptions made by the
project as
far as the defining the requirements is concerned. Lastly, the
project dependencies are also listed in this section.
The Specific Requirements section comes next and is the most
important section of this document.
This section goes into detail about each specific requirement of
the secured management project. A description, use case with
sequence of events, and any related requirements is given for
each requirement. This section also gives a detailed description
of the External
Interfaces for the description of the user interface for the
software. The Specific Requirements section also project
including a describes the Performance.Design Constraints and
Standards Compliance are also considered in this section.
Lastly, various System Attributes are discussed including
Maintainability, Security, and Portability.

TABLE OF CONTENTS

1. Introduction
1.1 purpose
1.2 scope
1.3 definitions, acronyms and abbreviations
2. Decomposition
description
2.1 module decomposition
2.2 concurrent process decomposition
2.3 data decomposition
3. Inter process dependencies
3.1 independent modules
3.2 dependent modules
3.3 inter process dependencies
4. diagrams
4.1 use case diagram
4.2 class diagram
4.3 activity diagram
4.4 sequence diagram
4.5 collaboration diagram

List of figures
Figure 1 – use-case
diagram Figure 2 – class
diagram Figure 3 – activity
diagram Figure 4 –
sequence diagrams

1. INTRODUCTION

1.1 PURPOSE:

The purpose of the Software Requirements Specification is to


describe the specific requirements of the secured system for
PC using cryptographic solution that are to be met by the
implementation effort of c language. Included with the
description of the requirements is a description of any
constraints or assumptions that the project is working within.
This document also provides a description of any
project dependencies that need to be explicitly expressed.
Along with the requirements descriptions, it is also the purpose
of this document to describe any performance requirements
that need to be met. If there are any standards that need to be
considered when developing the software are also listed.
Lastly, the purpose of this document is to communicate the
system attributes of the secured system for PC using
cryptographic solution.

1.2 scope:

It is within the scope of the Software Requirements


Specification to describe the specific system requirements of
the secured system for PC using cryptographic solution project.
This would include performance requirements, system
constraints, and project assumptions. Any specific detail that is
needed about the standards or technology used to define these
requirements, constraints, and assumptions are within the
scope of this document.

1.3 definitions, acronyms and abbreviations


sds software design document

2. DECOMPOSITION DESCRIPTION
2.1 Module Decomposition
The function will provide following functionality:-
It provide GUI interface on which end user enter their text and
security key should be entered so that the text can be
encrypted and converted to cipher text and the key will be
checked finally to decrypt the data.
This is a cryptographic application that usable by all class of user
(who need to secure their data).This is usable both for novice or
technical users as well as expert technical users.
Corporate companies, academicians, Government
organisations. In this software, have two main buttons (Encrypt,
decrypt)
1. First tab i.e. encrypt tab will allow a user to select the
algorithm in which they wish to encrypt the file and browse the
file from hard disk and provide the public key to help in
encryption.
2. Second tab i.e. decrypts option, will allow a user to decrypt
the encrypted file in other end providing private key.
Most public key ciphers rely on high computational cost
operations.
Therefore, keeping performance considerations in mind, for data
encryption/decryption computational effort to
encryption/decryption using Asymmetric key is very powerful
compare to symmetric key algorithm. It’s providing more
security compare to symmetric key and also performance of
encrypting file very good. It is general purpose software

2.2 CONCURRENT PROCESS DECOMPOSITION

This system feature involves encrypting the data using one of


many asymmetric cryptographic ciphers for data security
1. Select the file using browse option that he wants to encrypt
and select the file.
2. You must enter the key that help to encrypt your File.
3. it gives the key option and validates the key and then
encryption is done.
4. After encryption file is in destination folder

2.3 DATA DECOMPOSITION


We assume that each agent has enough knowledge to decide
the best way to communicate with the other agents
Cryptography is made in C programming so it is Hardware
Independent software. There is no need of any hardware. It’s run
on any operating system and it’s not a heavy software so no
need to extra ram. It’s required 16 MB ram to executedsoftware
and run on any os
Network components to send file form one computer to other
computer using ip address on Local area Network. We use FTP
protocol to send file in between computer

3. INTER-MODULE DEPENDENCIES

3.1 Independent Modules

A security key should be entered and it should be validated to


encrypt or decrypt data. User is required to remember his
password that he/she used to encrypt data (or lock password
safe) because most of secure cryptographic algorithms
implemented in this suite are secure enough so that no
algorithms better than brute-force can be used to recover lost
password

3.2 DEPENDENT MODULES

The entered 8 digit number has to be matched with the output


User is required to remember his password that he/she used to
encrypt data (or lock password safe) because most of secure
cryptographic algorithms implemented in this suite are secure
enough so that no algorithms better than brute-force can be
used to recover lost password
The users can be used for different kind of text files
The source code should be properly documented, so that new
developers will be able to understand the code as easily as
possible. The text file to be encrypted should be in the same
folder

3.3 INTER PROCESS DEPENDENCIES

Network components to send file form one computer to other


computer using ip address on Local area Network. We use FTP
protocol to send file in between computer.
In this we provide GUI interface on which end user enter their
text and security key should be entered so that the text can be
encrypted and
converted to cipher text and the key will be checked finally to
decrypt the data.

The will provide users with the help they need to effectively and
efficiently use the product.

DIAGRAMS:
Use-case diagram:
Figure 1

Class diagram:
Figure 2
Activity diagrams:
Figure 3

SEQUENCE DIAGRAM:
Software Display vv! ndow
COLLABORATION DIAGRAM

You might also like