Team Members:: Course Code: CSE3001 Course Name: Software Engineering Faculty Name: Dr. Anand Bihari
Team Members:: Course Code: CSE3001 Course Name: Software Engineering Faculty Name: Dr. Anand Bihari
LAB ASSESSMENT-2
TEAM MEMBERS:
VENKATESWARA RAO DUNNE-19BDS0007
PREFACE:
TABLE OF CONTENTS
1. Introduction
1.1 purpose
1.2 scope
1.3 definitions, acronyms and abbreviations
2. Decomposition
description
2.1 module decomposition
2.2 concurrent process decomposition
2.3 data decomposition
3. Inter process dependencies
3.1 independent modules
3.2 dependent modules
3.3 inter process dependencies
4. diagrams
4.1 use case diagram
4.2 class diagram
4.3 activity diagram
4.4 sequence diagram
4.5 collaboration diagram
List of figures
Figure 1 – use-case
diagram Figure 2 – class
diagram Figure 3 – activity
diagram Figure 4 –
sequence diagrams
1. INTRODUCTION
1.1 PURPOSE:
1.2 scope:
2. DECOMPOSITION DESCRIPTION
2.1 Module Decomposition
The function will provide following functionality:-
It provide GUI interface on which end user enter their text and
security key should be entered so that the text can be
encrypted and converted to cipher text and the key will be
checked finally to decrypt the data.
This is a cryptographic application that usable by all class of user
(who need to secure their data).This is usable both for novice or
technical users as well as expert technical users.
Corporate companies, academicians, Government
organisations. In this software, have two main buttons (Encrypt,
decrypt)
1. First tab i.e. encrypt tab will allow a user to select the
algorithm in which they wish to encrypt the file and browse the
file from hard disk and provide the public key to help in
encryption.
2. Second tab i.e. decrypts option, will allow a user to decrypt
the encrypted file in other end providing private key.
Most public key ciphers rely on high computational cost
operations.
Therefore, keeping performance considerations in mind, for data
encryption/decryption computational effort to
encryption/decryption using Asymmetric key is very powerful
compare to symmetric key algorithm. It’s providing more
security compare to symmetric key and also performance of
encrypting file very good. It is general purpose software
3. INTER-MODULE DEPENDENCIES
The will provide users with the help they need to effectively and
efficiently use the product.
DIAGRAMS:
Use-case diagram:
Figure 1
Class diagram:
Figure 2
Activity diagrams:
Figure 3
SEQUENCE DIAGRAM:
Software Display vv! ndow
COLLABORATION DIAGRAM