0% found this document useful (0 votes)
10 views

Meet Updated

ok ok

Uploaded by

shahil
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Meet Updated

ok ok

Uploaded by

shahil
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 88

SecureDataPro: Advanced Encryption and

Robust Data Chunking System


A PROJECT REPORT
Submitted by

Akshay Modi [Reg No: RA2011030010084]


Saksham [Reg No: RA2011030010074 ]
Sahil Singh[Reg No: RA2011030010096 ]
Ishaan Markanday [Reg No: RA2011030010082 ]
Under the Guidance of
DR. MANICKAM M
Assistant Professor
Department of Networking and Communications

in partial fulfillment of the requirements for the degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE ENGINEERING
with specialization in CYBER SECURITY

DEPARTMENT OF NETWORKING AND COMMUNICATIONS


COLLEGE OF ENGINEERING AND TECHNOLOGY
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
KATTANKULATHUR- 603 203

MAY 2024
Department of Networking And Communications
SRM Institute of Science & Technology

Degree/ Course : B Tech CSE with Cybersecurity

Student Name : Akshay Modi, Saksham, Ishaan Markanday, Sahil Singh

Registration Number : RA2011030010084, RA2011030010074, RA2011030010082,


RA2011030010096

Title of Work : SecureDataPro: Advanced Encryption and Robust Data Chunking System

We hereby certify that this assessment compiles with the University’s Rules and Regulations relating
to Academic misconduct and plagiarism, as listed in the University Website, Regulations, and the
Education Committee guidelines.

We confirm that all the work contained in this assessment is my / our own except where indicated,
and that We have met the following conditions:

● Clearly referenced / listed all sources as appropriate


● Referenced and put in inverted commas all quoted text (from books, web, etc)
● Given the sources of all pictures, data etc. that are not my own
● Not made any use of the report(s) or essay(s) of any other student(s) either past or present
● Acknowledged in appropriate places any help that I have received from others (e.g. fellow
students, technicians, statisticians, external sources)
● Compiled with any other plagiarism criteria specified in the Course handbook / University
website

We understand that any false claim for this work will be penalized in accordance with the
University policies and regulations.

DECLARATION:
We are aware of and understand the University’s policy on Academic misconduct and plagiarism and I
certify that this assessment is my / our own work, except where indicated by referring, and that I have
followed the good academic practices noted above.

ii
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
KATTANKULATHUR – 603 203

BONAFIDE CERTIFICATE

Certified for this project titled “SecureDataPro: Advanced Encryption and


Robust Data Chunking System” is the bonafide work of Akshay Modi [Reg No:
RA2011030010084], Saksham [Reg No: RA2011030010074], Sahil Singh[Reg
No: RA2011030010096] and Ishaan Markanday [Reg No:
RA2011030010082] who carried out the project work under my supervision.
Certified further, that to the best of my knowledge the work reported herein does
not form any other project report or dissertation on the basis of which a degree or
award was conferred on an earlier occasion on this or any other candidate.

DR. MANICKAM M Dr. ANNAPURANI K

Assistant Professor Professor And Head


Department of Networking and Department of Networking and
Communications, Communications,
SRM INSTITUTE OF SCIENCE
SRM INSTITUTE OF SCIENCE
AND TECHNOLOGY
AND TECHNOLOGY

INTERNAL EXAMINER EXTERNAL EXAMINER

iii
ACKNOWLEDGEMENT

We express our humble gratitude to Dr. C. Muthamizhchelvan, Vice-Chancellor, SRM Institute of


Science and Technology, for the facilities extended for the project work and his continued support.

We extend our sincere thanks to Dean-CET, SRM Institute of Science and Technology, Dr.
T.V.Gopal, for his invaluable support.

We wish to thank Dr. Revathi Venkataraman, Professor & Chairperson, School of Computing,
SRM Institute of Science and Technology, for her support throughout the project work.

We are incredibly grateful to our Head of the Department, Dr. Annapurani K, Professor,
Department of Networking And Communications SRM Institute of Science and Technology, for her
suggestions and encouragement at all the stages of the project work.

We want to convey our thanks to our Project Coordinator, Dr. Deepa Thilak K, Associate
Professor, Panel Head, Dr. Manickam M, Assistant Professor and members, Dr. Kalaiselvi K, Associate
Professor, Dr. KA Varun Kumar, Assistant Professor, Department of Networking and Communications,
SRM Institute of Science and Technology, for their inputs during the project reviews and support.

We register our immeasurable thanks to our Faculty Advisor, Dr. Thanga Revathi S, Associate
Professor, Department of Networking and Communications, SRM Institute of Science and Technology, for
leading and helping us to complete our course.
Our inexpressible respect and thanks to our guide, Dr. Manickam M, Assistant Professor,
Department of Networking and Communications, SRM Institute of Science and Technology, for providing
us with an opportunity to pursue our project under his mentorship. He provided us with the freedom and
support to explore the research topics of our interest. His passion for solving problems and making a
difference in the world has always been inspiring.

We sincerely thank the Networking and Communications Department staff and students, SRM
Institute of Science and Technology, for their help during our project. Finally, we would like to thank
parents, family members, and friends for their unconditional love, constant support, and encouragement.

Akshay Modi[RA2011030010084]

Saksham[RA2011030010074]

Ishaan Markanday[RA2011030010082]

Sahil Singh[RA2011030010096]

iv
v
ABSTRACT

SecureDataPro revolutionizes data protection by pioneering a multifaceted approach that


safeguards user information. This innovative solution leverages a two-pronged strategy: file
splitting and diverse encryption algorithms. In the first line of defense, SecureDataPro fragments
large files into smaller, more manageable chunks. This fragmentation offers several advantages. It
facilitates efficient storage and transmission of data, particularly for voluminous files. More
importantly, it minimizes potential data exposure in the event of a security breach. Even if
unauthorized parties gain access to a single chunk, the remaining chunks would be protected,
significantly reducing data loss.
Beyond file splitting, SecureDataPro fortifies data security through multi-layered
encryption. Unlike conventional encryption methods that utilize a single algorithm,
SecureDataPro encrypts each individual chunk with a distinct encryption algorithm. This
heterogeneity adds significant complexity for potential attackers. Even if one encryption algorithm
were compromised, the remaining encrypted chunks would require cracking their respective
algorithms, exponentially increasing the effort and resources needed to breach the data. This
multi-layered approach significantly bolsters overall data security and offers a robust defense
against unauthorized access attempts.
In essence, SecureDataPro sets a new standard in data protection. By combining file
splitting with diverse encryption algorithms, it mitigates the risks associated with traditional data
security measures. This comprehensive approach empowers users to confidently store and share
their sensitive information in today's increasingly digital landscape. SecureDataPro stands as a
testament to ongoing advancements in data security, offering a reliable and effective solution for
safeguarding user privacy in the face of evolving cyber threats.

vi
TABLE OF CONTENTS

ABSTRACT vi

TABLE OF CONTENTS vii

LIST OF FIGURES ix

LIST OF TABLES x

ABBREVIATIONS 1

1 INTRODUCTION 2
1.1 About 3
1.2 Objectives 5
1.3 Scope 6
1.4 Problem Statement 8

2 LITERATURE SURVEY 11
2.1 Research Gap 13

3 METHODOLOGY OF ADVANCED ENCRYPTION AND


ROBUST DATA CHUNKING SYSTEM 15
3.1 Introduction to SecureDataPro 15
3.1.1 File Splitting for Enhanced Protection 16
3.1.2 Robust Defence Mechanism 17
3.1.3 Enhance Security Posture 17
3.1.4 Diverse Encryption Algorithms 17
3.1.5 Preprocessing Techniques in SecureDataPro 18
3.1.6 Benefits of SecureDataPro in Data Protection 20

4 SYSTEM DESIGN AND ARCHITECTURE OF ADVANCED


ENCRYPTION AND ROBUST DATA CHUNKING SYSTEM 22
4.1 System Architecture 22
4.2 Class Diagram 24
4.3 Use Case Diagram 25
4.4 DFD Diagram 26

vii
5 MODULES AND IMPLEMENTATION OF ADVANCED
ENCRYPTION AND DATA CHUNKING SYSTEM 27
5.1 Modules 27
5.1.1 File Splitting Module 27
5.1.2 Encryption Decryption Module 28
5.1.3 Data Integrity And Authentication Module 29
5.2 Implementation 30
5.2.1 Training Strategies for SecureDataPro Implementatiion 30
5.2.2 Encryption Algorithms used in SecureDataPro Implementation 31
5.3 User Interface 33
5.3.1 Home Page 33
5.3.2 Sign Up Page 34
5.3.3 Login Page 35
5.3.4 Encryption Page 36
5.3.5 File List Page 37
5.3.6 Decryption Page 38
5.3.7 Database 39

6 RESULTS AND DISCUSSIONS 41


6.1 Results 41
6.2 Comparison 44

7 CONCLUSION AND FUTURE ENHANCEMENT 49


7.1 Conclusion 49
7.2 Future Enhancement 51

REFERENCES 54
APPENDIX 55
A CODING 55
B CONFERENCE AND JOURNAL PUBLICATION 71
C PLAGIARISM REPORT 74

viii
LIST OF FIGURES

Figure No. Figure Name Page No.

3.1 Methodology of Advanced Encryption and Data Chunking

System 16

4.1 System Architecture of Advanced Encryption and Data

Chunking System 23

4.2 Class Diagram of Advanced Encryption and Data Chunking

System 24

4.3 Use Case Diagram of Advanced Encryption and Data Chunking

System 25

4.4 DFD Diagram of Advanced Encryption and Data Chunking

System 26

5.1 Home Page of SecureDataPro 34

5.2 Sign Up Page of SecureDataPro 35

5.3 Login Page of SecureDataPro 36

5.4 Encryption Page of SecureDataPro 37

5.5 File List Page of SecureDataPro 38

5.6 Decryption Page of SecureDataPro 39

5.7 Database 40
6.1 Comparison of Memory usage by AES, DES and RSA
45

6.2 Comparison of Output Byte used by AES, DES and RSA 47

ix
x
LIST OF TABLES

Table No Table Name Page No.

6.1 Comparison of various packet sizes for DES,AES & RSA algorithm 42

xi
ABBREVIATIONS

FSA - File Splitting Algorithm

ECC - Elliptic Curve Cryptography

RSA - Rivest-Shamir-Adleman

HMAC - Keyed-Hashing for Message Authentication

CBC - Cipher Block Chaining

DH - Diffie-Hellman

PBKDF2 - Password-Based Key Derivation Function 2

MD5 - Message Digest Algorithm 5

AES - Advanced Encryption Standard

HMAC - Keyed-Hashing for Message Authentication

Bloom - Bloom Filter

XOR - Exclusive OR

SHA - Secure Hash Algorithm

DES - Data Encryption Standard

1
CHAPTER 1

INTRODUCTION

SecureDataPro is a cutting-edge data protection solution that introduces a pioneering approach


to safeguarding sensitive information through a unique combination of file splitting and diverse
encryption algorithms. By leveraging this innovative method, SecureDataPro ensures enhanced
security and privacy for files, enabling users to maintain control over their data in the digital
realm. Through the process of file splitting, the software divides large files into smaller, more
manageable chunks, making it hard for unauthorized users to access the entire file without
proper authorization. Additionally, SecureDataPro incorporates a variety of encryption
algorithms to further fortify the protection of these file chunks, ensuring that even if one
encryption method is compromised, the overall security of the data remains intact. This robust
encryption approach not only enhances data security but also provides users with peace of mind
when storing or sharing sensitive information. SecureDataPro stands out as a comprehensive
data protection solution that combines cutting-edge technologies to offer a high security and
confidentiality for all types of files.

Data protection is a critical aspect in the realm of cybersecurity, and innovative approaches are
continuously being developed to safeguard sensitive information from unauthorized access.
One such pioneering method is SecureDataPro, which emphasizes data protection through a
unique combination of file splitting and diverse encryption algorithms. This approach involves
breaking down a file into smaller chunks, thereby reducing the risk of exposing the entire
dataset in the event of a breach. Each fragment is then encrypted using a variety of encryption
techniques, enhancing the overall security of the data. By employing multiple encryption
algorithms, SecureDataPro ensures that even if one layer of protection is compromised, the rest
of the data remains secure. This multi-layered approach increases the complexity for potential
attackers, making it significantly more challenging to decrypt the information without proper
authorization. Additionally, the use of diverse encryption algorithms adds an extra level of
security by providing different levels of protection to each file chunk. Ultimately,
SecureDataPro stands out as an innovative solution that not only enhances data protection but
also raises the bar for cybersecurity practices, offering a robust defense mechanism against
unauthorized access and potential data breaches.

2
SecureDataPro presents a groundbreaking method of data protection by employing file splitting
and diverse encryption algorithms. One key encryption algorithm utilized in SecureDataPro is
AES, which is widely recognized for its efficiency and security in encrypting sensitive
information. AES operates with different key sizes, ensuring strong protection against potential
cyber threats. Another encryption algorithm featured in SecureDataPro is Rivest-Shamir-
Adleman (RSA), which utilizes both asymmetric and symmetric encryption techniques to
enhance data security. RSA's unique approach of using a public and private key pair adds an
extra layer of protection to the encrypted files, making it challenging for unauthorized users to
access the information. Additionally, SecureDataPro harnesses the power of Twofish
encryption, known for its robustness and resistance to cryptanalysis. Twofish's intricate key
schedule and encryption process make it an ideal choice for securing data through file splitting
and encryption. By employing a strategic combination of AES, RSA, and Twofish encryption
algorithms, SecureDataPro sets a new standard in data protection, prioritizing security and
integrity in a digital landscape fraught with potential risks. In today's digital world, the data
proliferation across various platforms and devices has underscored the critical importance of
robust data protection measures. In response to the escalating cybersecurity threats and the
ever-increasing volume of sensitive information, innovative solutions are imperative to
safeguarding data integrity and confidentiality. SecureDataPro emerges as a pioneering
approach to address these challenges, leveraging the combined power of file splitting and
diverse encryption algorithms. By breaking down files into smaller, more manageable chunks
and encrypting them with multiple encryption techniques, SecureDataPro offers a dynamic
defense mechanism against unauthorized access and potential data breaches. This introduction
of advanced cryptographic techniques not only enhances data security but also ensures the
preservation of privacy in an era characterized by heightened digital risks. SecureDataPro
represents a paradigm shift in data protection, setting new standards for safeguarding valuable
information assets across diverse digital environments.

1.1 ABOUT

SecureDataPro is a cutting-edge data protection solution that introduces a pioneering


approach to safeguarding sensitive information through a unique combination of file
splitting and diverse encryption algorithms. This innovative system aims to enhance

3
data security and privacy, providing users with greater control over their digital assets.

The concept behind SecureDataPro revolves around file splitting, a technique


where large files are broken into smaller, more manageable chunks. This approach not
only makes it difficult for unauthorized users to access the entire file but also facilitates
a robust encryption process. The smaller file chunks are individually encrypted using a
variety of encryption algorithms, adding an extra layer of security to each piece. This
multi-layered encryption ensures that even if one part of the system is compromised, the
rest of the data remains secure.

SecureDataPro incorporates a range of encryption algorithms, including Advanced


Encryption Standard (AES), Rivest-Shamir-Adleman (RSA), and Twofish, each with
unique characteristics that contribute to the system's overall robustness. AES, with its
different key sizes, is well-known for its efficiency and strength, while RSA's
asymmetric encryption adds a layer of security through public and private key pairs.
Twofish, known for its complex key scheduling, is resistant to cryptanalysis. The
combination of these diverse algorithms creates a comprehensive protection scheme
that secures each file chunk, ensuring the integrity and confidentiality of sensitive
information.

The application of multiple encryption methods within SecureDataPro serves as a


dynamic defense mechanism. If one algorithm is compromised, the others remain intact,
maintaining the security of the data. This flexibility allows users to securely store and
share sensitive information, confident that their data is protected from unauthorized
access.

As the digital landscape continues to evolve and cyber threats become increasingly
sophisticated, SecureDataPro's innovative approach to data protection offers a robust
solution to safeguard valuable information. The strategic combination of file splitting
and diverse encryption algorithms not only enhances data security but also raises the
bar for cybersecurity practices. SecureDataPro stands out as a comprehensive data
protection solution that prioritizes security and confidentiality, providing a high level of
protection against potential data breaches and unauthorized access.

4
This unique approach to data protection, where file splitting and multi-layered
encryption meet, represents a significant advancement in cybersecurity. By leveraging
these technologies, SecureDataPro establishes itself as a leading solution for secure data
storage and transmission, offering peace of mind in a world where data security is
paramount.

1.2 OBJECTIVES

SecureDataPro represents a groundbreaking endeavor to redefine data protection


methodologies by amalgamating two key strategies: file splitting and diverse encryption
algorithms. By breaking down files into smaller components and applying multiple
encryption techniques, SecureDataPro aims to fortify data security and confidentiality.
This innovative approach not only amplifies the complexity of data protection measures
but also serves as a formidable deterrent against potential adversaries seeking
unauthorized access. Through the utilization of varied encryption algorithms,
SecureDataPro enhances the resilience of data encryption, making it more challenging
for attackers to breach sensitive information without the requisite decryption keys.
Furthermore, SecureDataPro addresses the evolving landscape of digital threats by
offering users a robust solution tailored to the demands of an increasingly digitized
world. By fostering a multidimensional defense mechanism, SecureDataPro empowers
individuals and organizations to safeguard their data assets effectively, mitigating risks
associated with unauthorized access and breaches. Overall, SecureDataPro emerges as a
pioneering solution poised to elevate data protection standards and ensure the integrity
and confidentiality of sensitive information in contemporary digital
environments.SecureDataPro stands as a revolutionary initiative reshaping the
landscape of data protection methodologies through the fusion of two pivotal strategies:
file splitting and diverse encryption algorithms. By decomposing files into smaller,
more manageable components and employing a spectrum of encryption techniques,
SecureDataPro strives to reinforce the fortifications of data security and confidentiality.
This innovative amalgamation not only amplifies the intricacies of data protection
measures but also acts as a formidable barrier against potential adversaries seeking
unauthorized access. Through the adoption of diverse encryption algorithms,

5
SecureDataPro bolsters the robustness of data encryption, presenting a formidable
challenge for attackers attempting to breach sensitive information without access to the
requisite decryption keys. Moreover, SecureDataPro is designed to adapt to the
evolving landscape of digital threats, offering users a resilient solution tailored to the
demands of an increasingly digitized world. By fostering a multidimensional defense
mechanism, By reducing the dangers of data breaches and illegal access, SecureDataPro
enables both people and businesses to efficiently protect their data assets. In the end,
SecureDataPro proves to be a ground-breaking solution ready to raise the bar for data
security and guarantee the confidentiality and integrity of critical data in modern digital
settings..

1.3 SCOPE

SecureDataPro is poised to revolutionize the landscape of data protection through its


pioneering approach, which seamlessly integrates file splitting and diverse encryption
algorithms. At its core, the project endeavors to bolster security measures by
fragmenting files into smaller, more manageable chunks. This strategy serves as a
formidable defense mechanism, as it ensures that even if one portion of a file is
compromised, the remaining segments remain inaccessible to unauthorized parties.
Furthermore, SecureDataPro enhances data security by employing a diverse array of
encryption algorithms, each applied to individual file fragments. This multi-layered
encryption scheme significantly heightens the complexity of data protection, rendering
decryption attempts by malicious actors exceedingly difficult.

By amalgamating file splitting with multiple encryption techniques, SecureDataPro


represents a paradigm shift in the realm of data protection. Its innovative approach not
only fortifies the security of sensitive information but also underscores its status as a
cutting-edge technology poised to address the evolving challenges of data security in
today's digital landscape. As organizations and individuals increasingly grapple with the
threat of data breaches and cyberattacks, SecureDataPro emerges as a beacon of
innovation, offering a robust solution tailored to the demands of a rapidly evolving
cybersecurity landscape.

6
The scope for SecureDataPro's application and impact in the realm of data protection is
vast and promising. With its innovative approach integrating file splitting and diverse
encryption algorithms, SecureDataPro has the power to address a many range of
cybersecurity challenges across various industries and use cases. One key aspect of its
scope lies in its adaptability to diverse environments, including but not limited to cloud
computing, IoT devices, and mobile applications. SecureDataPro's versatility enables it
to safeguard data across different platforms and devices, ensuring comprehensive
protection for organizations and individuals alike. Additionally, as data volumes
continue to escalate exponentially, SecureDataPro's robust file splitting techniques and
encryption algorithms position it as a scalable solution capable of handling large
datasets effectively. Moreover, as regulatory requirements around data privacy and
security become increasingly stringent, SecureDataPro offers a proactive approach to
compliance, assisting organizations in meeting regulatory standards and avoiding
potential penalties. Furthermore, as the cybersecurity landscape evolves with emerging
threats and technologies, SecureDataPro's continuous innovation and adaptability
ensure its relevance and effectiveness in safeguarding sensitive information. Overall,
the scope for SecureDataPro extends across various industries and scenarios, providing
a versatile and comprehensive solution to the complex challenges of data protection in
the digital age.

SecureDataPro's scope extends beyond traditional data protection measures, offering


opportunities for innovation and advancement in several key areas. One significant
aspect of its scope lies in its potential to revolutionize secure data sharing and
collaboration. By providing robust encryption and file splitting capabilities,
SecureDataPro enables secure sharing of sensitive information among authorized users,
even in decentralized or distributed environments. This opens up possibilities for
collaborative research, data sharing agreements, and cross-organizational collaborations
while maintaining data privacy and confidentiality.

In addition, SecureDataPro's reach can improve data security in cutting-edge


technologies like edge computing and the Internet of Things (IoT). In these contexts,
where connected devices are commonplace and edge computing is becoming more and
more important for processing data in real time, SecureDataPro can be extremely
helpful in guaranteeing data confidentiality and integrity. SecureDataPro can guard

7
sensitive data generated and processed at the edge, preventing unwanted access and
data breaches, by putting its file splitting and encryption techniques into practice.

Moreover, SecureDataPro's scope encompasses opportunities for integration with


artificial intelligence (AI) and machine learning (ML) systems. By leveraging its
advanced encryption algorithms and secure data handling capabilities, SecureDataPro
can support the development and deployment of AI models in sensitive domains such as
healthcare, finance, and cybersecurity. This integration ensures that AI systems can
operate on encrypted data securely, preserving privacy while deriving insights and
making predictions.

The scope of SecureDataPro also includes enabling safe cloud environment data
management and storage. With the growing number of enterprises depending on cloud
services for data processing and storage, SecureDataPro can offer an additional security
layer to enhance the capabilities of current cloud security protocols. SecureDataPro
improves data safety and resilience against cloud-based dangers including data breaches
and illegal access by encrypting data before storing it in the cloud and using its file
splitting algorithms to distribute data over many storage locations.

Overall, the scope for SecureDataPro is expansive, encompassing a wide range of


applications and scenarios where data protection and privacy are paramount. By
leveraging its innovative approach to data security, SecureDataPro has the potential to
drive advancements in cybersecurity and enable secure digital transformation across
industries and domains.

1.4 PROBLEM STATEMENT

SecureDataPro stands at the forefront of data protection innovations, offering a


revolutionary solution that secures sensitive information through a combination of file
splitting and diverse encryption algorithms. This groundbreaking approach fundamentally
transforms data security measures by decentralizing information, fragmenting it into
smaller, more manageable chunks. Each of these chunks undergoes encryption through a
variety of algorithms, creating multiple layers of defense against unauthorized access.

8
By leveraging file splitting techniques alongside diverse encryption algorithms,
SecureDataPro establishes a robust shield against potential data breaches. This
comprehensive defense mechanism not only fortifies security measures but also mitigates
vulnerabilities inherent in centralized data storage systems. Through its innovative
methodology, SecureDataPro sets a new benchmark for data protection standards,
prioritizing maximum security and resilience in an ever-evolving digital landscape.

In an era marked by escalating cyber threats and sophisticated hacking techniques,


SecureDataPro emerges as a beacon of innovation, offering a proactive solution to
safeguard sensitive information. Its pioneering approach not only addresses existing
security concerns but also anticipates future challenges, positioning organizations and
individuals to navigate the complexities of data security with confidence and peace of
mind.SecureDataPro's groundbreaking approach to data protection represents a paradigm
shift in cybersecurity, offering a revolutionary solution that combines file splitting and
diverse encryption algorithms to safeguard sensitive information. At the heart of
SecureDataPro's innovation lies its decentralization of data, achieved through the
fragmentation of files into smaller, more manageable chunks. This decentralized approach
enhances security by reducing the impact of potential breaches, as compromising one
chunk does not compromise the integrity of the entire dataset.

Moreover, SecureDataPro's use of diverse encryption algorithms adds layers of complexity


to the security framework, making it significantly more challenging for unauthorized
parties to access or decipher the encrypted data. By employing a variety of encryption
techniques, including symmetric and asymmetric encryption algorithms, SecureDataPro
ensures that encrypted data remains secure against a wide range of cyber threats.

The integration of file splitting techniques and diverse encryption algorithms in


SecureDataPro not only fortifies security measures but also addresses vulnerabilities
associated with centralized data storage systems. By decentralizing information and
dispersing it across multiple chunks, SecureDataPro reduces the risk of data exposure and
minimizes the potential impact of security incidents.

Furthermore, SecureDataPro's proactive approach to data protection anticipates future

9
challenges in the rapidly evolving cybersecurity landscape. By staying ahead of emerging
threats and evolving its security measures accordingly, SecureDataPro empowers
organizations and individuals to navigate the complexities of data security with confidence
and peace of mind.

In conclusion, SecureDataPro stands as a beacon of innovation in the field of data


protection, offering a comprehensive solution that prioritizes maximum security and
resilience. Its pioneering approach not only addresses current security concerns but also
sets a new benchmark for data protection standards, ensuring the confidentiality and
integrity of sensitive information in an increasingly digitized world. Through its innovative
methodology, SecureDataPro equips stakeholders with the tools and capabilities needed to
safeguard their data assets effectively and navigate the challenges of cybersecurity with
confidence

10
CHAPTER 2

LITERATURE SURVEY

1. Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.
Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022) present their
innovative approach in their recent article on integrating encryption techniques for secure data
storage in the cloud. Their work, titled "SecureDataPro: Advanced Encryption and Robust Data
Chunking System," focuses on enhancing data security through a combination of file splitting
and diverse encryption algorithms. Published in Transactions on Emerging
Telecommunications Technologies, this research highlights the importance of implementing
advanced encryption strategies for protecting sensitive data stored in cloud environments.
2. Arora, A., Garg, H., & Shivani, S. (2023). Privacy protection of digital images using
watermarking and qr code-based visual cryptography. Advances in Multimedia, 2023.
Arora, A., Garg, H., & Shivani, S. (2023) in their research article titled "Privacy protection of
digital images using watermarking and QR code-based visual cryptography" published in
Advances in Multimedia, 2023, propose innovative methods for safeguarding digital image
privacy. Their study explores the combination of watermarking and QR code-based visual
cryptography to enhance data protection measures. This research contributes to the
advancement of privacy preservation techniques in the digital realm, offering valuable insights
for further developments in the field.
3. Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang, Q.

11
(2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 9,
36038-36077.
Malina et al. (2021) present a pioneering approach called SecureDataPro for data protection in
the post-quantum era. This innovative method involves file splitting and utilizing diverse
encryption algorithms to safeguard intelligent infrastructures and ensure privacy. The proposed
technique in their study, published in IEEE Access, focuses on enhancing security measures for
data transmission and storage within advanced technological environments. With a
comprehensive framework that addresses the challenges of the evolving threat landscape,
SecureDataPro offers a robust solution for protecting sensitive information in modern systems.
4. Shi, Z., Oskolkov, B., Tian, W., Kan, C., & Liu, C. (2024). Sensor Data Protection Through
Integration of Blockchain and Camouflaged Encryption in Cyber-Physical Manufacturing
Systems. Journal of Computing and Information Science in Engineering, 24(7).
Shi, Z., Oskolkov, B., Tian, W., Kan, C., and Liu, C. (2024) proposed a novel approach in their
research article titled "Sensor Data Protection Through Integration of Blockchain and
Camouflaged Encryption in Cyber-Physical Manufacturing Systems" published in the Journal
of Computing and Information Science in Engineering. The study introduces SecureDataPro, a
pioneering method that focuses on data protection through file splitting and the utilization of
diverse encryption algorithms. This innovative approach aims to enhance security measures in
cyber-physical manufacturing systems by combining blockchain technology with camouflaged
encryption techniques.
5. Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G.
K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for secured
decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013-98025.
Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G. K.,
& Ramakrishna, S. (2021) proposed a Cipher Block Chaining Support Vector Machine for
Secured Decentralized Cloud Enabled Intelligent IoT Architecture. This innovative approach
was presented in the IEEE Access journal. The study focuses on enhancing data protection in
IoT environments by utilizing advanced encryption techniques. The research highlights the
importance of secure decentralized cloud architecture in ensuring the confidentiality and
integrity of sensitive information.
6. Li, T., He, X., Jiang, S., & Liu, J. (2022). A survey of privacy-preserving offloading
methods in mobile-edge computing. Journal of Network and Computer Applications, 203,
103395.Li, T., He, X., Jiang, S., & Liu, J. (2022) conducted a survey on privacy-preserving
offloading methods in mobile-edge computing, as published in the Journal of Network and

12
Computer Applications. Their research delves into cutting-edge strategies that maintain data
security during offloading processes. This study sheds light on the pivotal role of privacy
preservation in enhancing mobile-edge computing efficiency and security. Their findings offer
valuable insights for developing novel approaches in data protection for mobile-edge
environments.
7. Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over
encrypted data on the cloud. Concurrency and Computation: Practice and Experience, 31(17),
e5284.
Pham, H., Woodworth, J., & Amini Salehi, M. (2019) conducted a survey on secure search
over encrypted data on the cloud. The study, published in Concurrency and Computation:
Practice and Experience, explores the challenges and strategies for ensuring data security in
cloud environments. The researchers highlight the importance of utilizing diverse encryption
algorithms and file splitting techniques to protect sensitive information effectively. Their work
contributes to the advancement of secure data management practices in cloud computing.
8. Thushara, G. A., & Bhanu, S. M. S. (2022, November). A Flexible and Adaptive Hybrid
Algorithm for Secure Data Sharing in Cloud Computing. In 2022 IEEE 19th India Council
International Conference (INDICON) (pp. 1-8). IEEE.
Thushara, G. A., & Bhanu, S. M. S. (2022) presented a flexible and adaptive hybrid algorithm
aimed at enhancing secure data sharing in cloud computing in their paper titled "A Flexible and
Adaptive Hybrid Algorithm for Secure Data Sharing in Cloud Computing" presented at the
2022 IEEE 19th India Council International Conference (INDICON). This pioneering approach
combines file splitting and diverse encryption algorithms, collectively known as
SecureDataPro, to bolster data protection measures. Through this innovative method, the
authors aim to address the growing concerns related to data security and confidentiality in
cloud computing environments.
9. Vijayakumar, A., & Jebaseeli, A. N. (2020). Pioneer approach of data deduplication to
remove redundant data from cloud storage. International Journal of Advanced Research in
Engineering and Technology (IJARET), 11(10), 535-544.
Vijayakumar, A., & Jebaseeli, A. N. (2020) introduced a pioneering approach to data
deduplication in cloud storage, aimed at removing redundant data efficiently. Their work,
published in the International Journal of Advanced Research in Engineering and Technology
(IJARET), details a novel method to streamline storage and enhance data security measures
through innovative techniques.
10. Alkhalidy, M., Taha, M. B., Chowdhury, R., Ould-Slimane, H., Mourad, A., & Talhi, C.

13
(2023). Vehicular edge based approach for optimizing urban data privacy. IEEE Sensors
Journal. Alkhalidy et al. (2023) propose a vehicular edge-based approach to optimize urban
data privacy in their study published in IEEE Sensors Journal. Their work discusses the use of
SecureDataPro, a pioneering method that employs file splitting and diverse encryption
algorithms for enhanced data protection.

2.1 RESEARCH GAP


Current research in data protection has focused on traditional encryption methods,
emphasizing the strength of individual encryption techniques and network security
measures. While these approaches are effective to an extent, they suffer from critical
vulnerabilities: once an encryption key is compromised, the entire dataset becomes
vulnerable to unauthorized access. Additionally, current solutions typically encrypt
entire datasets without subdividing them, leading to single points of failure and larger
attack surfaces. This leaves many existing systems exposed to sophisticated attacks that
can break through conventional encryption barriers or leverage weaknesses in network
security.

Your research with SecureDataPro addresses this gap by introducing a novel strategy
that combines file splitting with a variety of encryption techniques. This approach
reduces the risk of exposing the entire dataset in the event of a security breach by
breaking it into smaller, more manageable chunks, each independently encrypted with a
different technique. This method creates a multi-layered defense, ensuring that even if
one encryption method is compromised, the other parts of the data remain secure. The
use of varied encryption techniques decreases the likelihood of successful attacks, as
attackers would need to breach multiple encryption layers to access the full dataset.

Furthermore, the file-splitting method reduces the attack surface by limiting the impact
of breaches to smaller data segments, increasing the overall security of the system. This
unique approach offers a stronger protection mechanism against unauthorized access
and cyberattacks, providing a more reliable and resilient solution for safeguarding
sensitive information in today's digital age. SecureDataPro's strategy, thus, fills a
critical gap in existing research by offering a more robust and flexible data protection
solution that adapts to evolving cyber threats.

14
CHAPTER 3

METHODOLOGY OF ADVANCED ENCRYPTION


AND ROBUST DAT
A CHUNKING SYSTEM

3.1 Introduction to SecureDataPro

SecureDataPro revolutionizes data protection by employing a novel approach that


combines file splitting and diverse encryption algorithms. This innovative technique
significantly enhances security and privacy for users by breaking files into smaller,
more manageable chunks and encrypting them using various cryptographic techniques.
The process begins with SecureDataPro breaking down files into smaller chunks, which
are then individually encrypted using a mix of encryption algorithms. By employing
diverse encryption methods, such as AES, RSA, and ECC, SecureDataPro ensures that
even if one encryption algorithm is compromised, the overall security of the data
remains intact. Because of the additional complexity brought forth by this multi-layered
encryption technique, it is very difficult for unauthorized parties to access sensitive
data.
Moreover, the file splitting function of SecureDataPro guarantees that the
remainder of the encrypted file is safe even in the event that one portion is

15
compromised. This granular approach to data protection reduces the risk of data loss or
exposure and lessens the effect of possible breaches.
The result is an advanced level of data protection that instills confidence in users
to store and share their files securely. With SecureDataPro, users can rest assured that
their sensitive information is safeguarded using cutting-edge encryption methods,
setting a new standard in data security and privacy.
In essence, SecureDataPro represents a paradigm shift in data protection,
offering a comprehensive solution that addresses the evolving challenges of
cybersecurity. Its innovative approach not only enhances security but also reinforces
user privacy, making it an indispensable tool for individuals and organizations alike
seeking robust data protection in an increasingly digital world.

Fig 3.1 Methodology of Advanced Encryption and Data Chunking System

Fig 3.1 depicts a simplified illustration of the SecureDataPro data protection


process. SecureDataPro leverages a two-pronged approach that combines file chunking
and multiple encryption algorithms to safeguard data.
In the first step, a file is signified by the document icon labelled "File". This file is then
divided into manageable chunks, represented by the arrow labelled "Split into Chunks".

16
Subsequently, these chunks are encrypted using a blend of encryption algorithms,
represented by the rectangular box labelled "Encrypt with Diverse Algorithms (AES,
RSA, ECC)". The now encrypted chunks are then stored securely in the secure storage
This secure storage could be a physical device or a cloud-based storage system.In
conclusion, SecureDataPro employs a multifaceted approach to data security by
fragmenting files into chunks and encrypting them with various algorithms. This
strategy aims to guarantee that even if one encryption layer is compromised, the
remaining data chunks are shielded.

3.1.1 File Splitting for Enhanced Data Protection


The way that SecureDataPro protects data using file splitting and a
variety of encryption algorithms is a major improvement in the security of
sensitive data. Now let's examine more closely at the many facets of
SecureDataPro's approach and how they improve data security:

SecureDataPro breaks down files into smaller, more manageable chunks. This
process reduces the risk of a single point of failure by dispersing the data across
multiple chunks.By splitting files, SecureDataPro minimizes the impact of
potential breaches. Even if one chunk is compromised, the exposure is limited to
that specific portion of the data, rather than the entire file.This granular
approach to data storage and protection enhances resilience against unauthorized
access and data manipulation.SecureDataPro encrypts every data piece
separately using a range of encryption techniques. Industry-standard techniques
like Rivest-Shamir-Adleman (RSA), Advanced Encryption Standard (AES), and
Elliptic Curve Cryptography (ECC) might be included in these algorithms.Using
a variety of encryption algorithms increases the process' complexity and makes
it much harder for bad actors to decode the data.The confidentiality and integrity
of the data are maintained even in the event that one encryption scheme is
broken because the other encrypted portions are safe.

3.1.2 Robust Defense Mechanism:


The combination of file splitting and diverse encryption algorithms
creates a robust defense mechanism against unauthorized access and data
breaches.By dispersing data across multiple encrypted chunks and employing

17
various encryption techniques, SecureDataPro establishes multiple layers of
protection.
This multi-layered approach significantly improves data protection and
confidentiality, reducing the likelihood of successful attacks and mitigating the
impact of potential breaches.

3.1.3 Enhanced Security Posture:


Organizations that implement SecureDataPro can enhance their security
posture by adopting an innovative approach to data protection.By leveraging file
splitting and diverse encryption algorithms, organizations can safeguard
sensitive information more effectively, thereby reducing the risk of data loss,
theft, or exposure.Organizations may comply with industry standards and strict
regulatory requirements for data security and privacy by using SecureDataPro.

3.1.4 Diverse Encryption Algorithms in SecureDataPro

 Advanced Encryption Standard (AES):


Symmetric encryption technology AES is well-known for its strong
security characteristics and broad use in many different applications.AES is
used by SecureDataPro to symmetrically encrypt the data in each chunk. This
indicates that encryption and decryption are accomplished using the same
key.Because of its powerful encryption capabilities, AES is immune to
cryptographic and brute-force attacks.By employing AES, SecureDataPro
ensures that data within each chunk is securely encrypted, providing a solid
foundation for data protection.

 Rivest-Shamir-Adleman (RSA):
RSA is a public-key encryption algorithm that relies on asymmetric key
pairs (public and private keys) for encryption and decryption.SecureDataPro
uses asymmetric key distribution with RSA to improve data security. The
matching private key is used for decryption, and the public key is used for
encryption.
Strong security guarantees are provided by RSA, especially in situations where

18
parties must exchange keys securely.SecureDataPro improves the security of
data storage and transmission by integrating RSA into its encryption framework,
particularly in situations involving secure communication channels.

 Elliptic Curve Cryptography (ECC):


ECC is a public-key encryption algorithm known for its efficiency and
suitability for resource-constrained environments.SecureDataPro employs ECC
to further strengthen its security framework, particularly in scenarios where
efficient encryption with smaller key sizes is essential.ECC offers comparable
security to traditional public-key encryption algorithms like RSA but
significantly smaller key , making it ideal for applications where resource
efficiency is critical.By integrating ECC into its encryption methodology,
SecureDataPro ensures that data protection is optimized for environments with
limited computational resources or bandwidth.

3.1.5 Pre-processing Techniques in SecureDataPro

In SecureDataPro, four key pre-processing techniques are utilized to


enhance data protection through file splitting and diverse encryption algorithms.
Firstly, data normalization ensures uniformity in the format and structure of
input data, optimizing the efficiency of subsequent encryption processes.
Secondly, data tokenization segments the input data into smaller chunks,
facilitating easier management and encryption of individual components.
Thirdly, data cleansing removes any inconsistencies or extraneous elements
from the input data, ensuring that only relevant and valid information is
processed for encryption. Finally, data compression reduces the size of the input
data, thereby improving storage efficiency and speeding up encryption and
decryption processes. By incorporating these pre-processing techniques,
SecureDataPro streamlines data protection efforts, enhances encryption security,
and provides a pioneering approach to safeguarding sensitive information
through a combination of file splitting and diverse encryption algorithms.In
SecureDataPro, the integration of four key pre-processing techniques plays a
pivotal role in fortifying data protection through a combination of file splitting

19
and diverse encryption algorithms. Firstly, data normalization ensures that input
data maintains uniformity in format and structure, optimizing subsequent
encryption processes for efficiency. This standardization streamlines encryption
procedures, contributing to smoother operations and consistent results.
Secondly, data tokenization segments the input data into smaller, more
manageable chunks, simplifying the management and encryption of individual
components. This segmentation enhances data security by dispersing sensitive
information across multiple encrypted chunks, minimizing the impact of
potential breaches. Thirdly, data cleansing eliminates inconsistencies and
extraneous elements from the input data, ensuring that only relevant and valid
information undergoes encryption. This purification process enhances the
integrity of the encrypted data, reducing the risk of errors or vulnerabilities.
Finally, data compression reduces the size of the input data, enhancing storage
efficiency and expediting encryption and decryption processes. By reducing data
volume without compromising security, SecureDataPro optimizes resource
utilization and enhances overall system performance. Collectively, these pre-
processing techniques streamline data protection efforts, fortify encryption
security, and establish SecureDataPro as a pioneering solution for safeguarding
sensitive information in today's digital landscape.Furthermore, the integration of
these pre-processing techniques in SecureDataPro not only enhances data
protection but also contributes to the overall effectiveness and efficiency of the
encryption process. Data normalization ensures that regardless of the original
format or structure of the input data, SecureDataPro can consistently apply
encryption algorithms, thus optimizing performance and reducing the errors.
Data tokenization not only facilitates easier management of data chunks but also
enhances security by reducing the exposure of sensitive information within each
individual segment. This segmentation strategy not only improves security but
also facilitates easier management and retrieval of encrypted data. Furthermore,
by eliminating any anomalies or superfluous components that can jeopardize the
encrypted data's security, data cleansing is essential to guaranteeing the quality
and integrity of the data.. By purifying the input data before encryption,
SecureDataPro minimizes the risk of vulnerabilities and enhances the reliability
of the encrypted data. Finally, data compression not only reduces storage
requirements but also speeds up encryption and decryption processes, thus

20
enhancing overall system performance. This optimization of resource utilization
contributes to a more efficient and scalable data protection solution, making
SecureDataPro a pioneering approach in safeguarding sensitive information
through file splitting and diverse encryption algorithms.

3.1.6 Benefits of SecureDataPro in Data Protection

SecureDataPro offers numerous benefits in data protection through its


pioneering approach of file splitting and diverse encryption algorithms. Firstly,
it enhances security by dividing files into smaller chunks, reducing the risk of a
single point of failure. Secondly, the diverse encryption algorithms used by
SecureDataPro ensure robust protection against various cyber threats, enhancing
the overall resilience of the data. Furthermore, the approach adds an extra layer
of complexity, making it challenging for unauthorized users to access or
decipher the data even if they manage to breach one encryption layer.
Additionally, SecureDataPro enables efficient data management by allowing for
easier storage, transfer, and organization of encrypted files. Lastly, the
innovative approach of SecureDataPro provides a scalable solution that can be
adapted to different types of data protection needs, offering flexibility and
customization for organizations seeking a comprehensive data security
solution.SecureDataPro stands out as a groundbreaking solution in data
protection, offering a multitude of benefits through its innovative approach of
file splitting and diverse encryption algorithms. First off, SecureDataPro greatly
improves security by lowering the possibility of a single point of failure by
dividing files into smaller, easier-to-manage pieces. By limiting the impact of
any breaches, this granular method makes sure that even if one section of the
file is compromised, the rest of it is safe. Second, using a variety of encryption
techniques strengthens data security and offers strong protection against
different online attacks. These algorithms, which provide many layers of
encryption, make it extremely difficult for unauthorized users to access or
decode the data. Examples of these algorithms are Elliptic Curve Cryptography
(ECC), Rivest-Shamir-Adleman (RSA), and Advanced Encryption Standard
(AES). Furthermore, even in the event that malevolent actors are able to break
through one encryption layer, SecureDataPro's methodology introduces an

21
additional degree of complexity, making it difficult for them to jeopardize
important data. This multi-layered security framework ensures comprehensive
protection for valuable data assets.

Furthermore, SecureDataPro offers significant advantages in efficient


data management. By splitting files into smaller chunks, SecureDataPro
facilitates easier storage, transfer, and organization of encrypted files. This
streamlined data management process not only improves operational efficiency
but also enhances accessibility and retrieval of encrypted data when needed.
Additionally, SecureDataPro's innovative approach provides scalability and
adaptability to meet diverse data protection needs. Whether securing sensitive
documents, financial records, or multimedia files, SecureDataPro offers
flexibility and customization, allowing organizations to tailor their data security
measures according to specific requirements.

Overall, SecureDataPro represents a paradigm shift in data protection,


offering unparalleled security, efficiency, and flexibility. Its pioneering
approach of file splitting and diverse encryption algorithms sets a new standard
in safeguarding sensitive information, empowering organizations to mitigate
risks,
comply with regulatory requirements, and uphold the trust and confidence of
stakeholders. SecureDataPro is at the forefront of data security, offering a strong
defense against new attacks and guaranteeing the confidentiality, integrity, and
availability of vital data assets even as cyber threats continue to change.

CHAPTER 4

SYSTEM DESIGN AND ARCHITECTURE OF


ADVANCED ENCRYPTION AND ROBUST DATA
CHUNKING SYSTEM

The chapter on system design provides a comprehensive overview of the architecture,

22
components, and functionalities of the Advanced Encryption and Robust Data Chunking
System. It outlines the systematic arrangement of modules, including data chunking, data
encryption, data decryption, and user interface development. The system design emphasizes the
integration of advanced encryption and decryption algorithms for encryption and decryption.

4.1 SYSTEM ARCHITECTURE

SecureDataPro implements a robust system architecture that prioritizes data security.


This architecture leverages a multifaceted approach, combining file splitting and diverse
encryption algorithms. The file splitting functionality fragments large files into smaller, more
manageable chunks. This approach offers several advantages: it facilitates efficient storage and
transmission, and even if one chunk is intercepted, the remaining chunks are protected. To
further strengthen security, SecureDataPro encrypts each chunk with a combination of
encryption algorithms like AES, RSA, and ECC. This multi-layered encryption ensures that
compromising a single algorithm wouldn't expose the entire file. This system architecture
safeguards data integrity and provides a strong foundation for SecureDataPro's comprehensive
data protection solution. Beyond encryption, SecureDataPro's system architecture incorporates
secure storage mechanisms. Encrypted file chunks are stored in a secure storage environment,
which is a cloud-based storage system with robust access controls. These access controls ensure
that only authorized users can access and decrypt the data. SecureDataPro implement user
authentication protocols and granular permission levels to manage user access effectively. This
combination of encryption, secure storage, and access control mechanisms forms the core of
SecureDataPro's system architecture, providing a comprehensive and layered approach to data
security.

23
Fig 4.1 System Architecture of Advanced Encryption and Data Chunking Sytem

Fig.4.1 shows a high level overview of system architecture of advanced encryption and
data chunking system. In detail, the first step involves creating a container. This container can
be a folder or directory on a computer system. Once a container is created, files can be saved
within it. The file management system also has a file chunking system which seems to break
down large files into multiple parts for storage. Additionally, the system encrypts files using
AES and Fernet algorithms which helps to secure them. After the files are encrypted, they are
then saved in the container. The system also has a decryption system that is likely used to
decrypt the files when they are needed. Finally, there is a saving metadata in SQL step. SQL
likely refers to Structured Query Language which is a query language used to access and
manipulate data stored in a relational database management system. In this context, the
metadata is likely information about the files such as their name, size, and creation date. This
metadata is stored in a database using SQL. Overall, the file management system provides a
way to organize, store, secure and encrypt files.

4.2 CLASS DIAGRAM

24
SecureDataPro's development process leverages a rigorous system design approach.
Class diagrams, a fundamental tool in object-oriented design, play a crucial role in visualizing
and documenting the system's architecture. These diagrams represent the blueprint of the
system, outlining the various classes (software building blocks) and their interactions. In the
context of SecureDataPro, class diagrams would likely depict classes like 'File', 'Chunk',
'EncryptionAlgorithm', 'StorageManager', and 'UserManager'. These classes would encapsulate
the functionalities of file splitting, encryption, secure storage, and user access control. By
meticulously defining these classes and their relationships through class diagrams, developers
can ensure a clear understanding of the system's structure and functionality. This promotes
efficient development, reduces the risk of errors, and facilitates future maintenance of
SecureDataPro.

Fig 4.2 Class Diagram of Advanced Encryption and Data Chunking Sytem

Fig 4.2 shows class diagram,the system leverages a two-pronged approach that
combines file chunking and multiple encryption algorithms to safeguard data. In the first step, a
file is divided into smaller chunks. Subsequently, these chunks are encrypted using encryption
algorithms. Then, the encrypted chunks are stored securely. This strategy aims to guarantee that
even if one encryption layer is compromised, the remaining data chunks are shielded.

4.3 USE CASE DIAGRAM

25
The foremost motive of a use case diagram is to show what device capabilities are
finished for which actor. Roles of the actors in the gadget can be depicted. The number one
reason of a use case diagram is to provide a graphical illustration of the machine's functionality
in terms of the interactions between actors and the system itself. It illustrates the specific use
instances, or duties, that actors can carry out inside the device to perform their desires. These
use instances constitute unique functionalities or functions of the system that satisfy the desires
or requirements of the actors. The use case diagram visually depicts the relationships between
actors and use cases, in addition to any dependencies or institutions among exclusive use
cases.. Additionally, the use case diagram can highlight the glide of facts or manage between
actors and the gadget, presenting insights into the system's basic capability.

Fig 4.3 Use Case Diagram of Advanced Encryption and Data Chunking System

Fig 4.3 shows use case diagram which depicts the key interactions and functionalities of
SecureDataPro, a system designed to provide enhanced data security through file splitting and

26
multi-algorithm encryption. The "User" is responsible for uploading files to the system, which
triggers the core operations of file splitting and encryption using multiple algorithms. These
encrypted chunks are then stored securely. When the "User" wants to retrieve their file, they
can request the reassembly and decryption of the chunks. The system reassembles the original
file from the stored chunks and decrypts it before delivering it back to the "User." Additionally,
users can share files securely through a designated use case.

4.4 DFD DIAGRAM

To comprehensively document and illustrate SecureDataPro's data processing


functionalities, Data Flow Diagrams (DFDs) can be employed. DFDs visually represent the
flow of data through a system, highlighting the processes involved, data inputs and outputs, and
data storage components. In the context of SecureDataPro, a DFD could depict the user
selecting a file, the system splitting the file into chunks, the encryption process employing
various algorithms, and the secure storage of encrypted chunks. This visual representation
enhances understanding of how SecureDataPro interacts with data and facilitates clear
communication between developers and stakeholders. By utilizing DFDs, we can effectively
document SecureDataPro's data security architecture, ensuring transparency and promoting
future system enhancements.

Fig 4.4 DFD Diagram of Advanced Encryption and Data Chunking System

Fig 4.4 shows the DFD diagram. In the first step, user uploads file and then file is
divided into smaller chunks. Subsequently, these chunks are encrypted using a blend of
encryption algorithms. Then, the encrypted chunks are stored securely. This strategy aims to
guarantee that even if one encryption layer is compromised, the remaining data chunks are
shielded.

CHAPTER 5

27
MODULES AND IMPLEMENTATION OF
ADVANCED ENCRYPTION AND ROBUST DATA
CHUNKING SYSTEM

This chapter delves into the practical aspects of the project, presenting a comprehensive
overview of the modules and their implementation. It provides a detailed insight into the real
world application of SecureDataPro, Quality Analysis and Production Management System,
highlighting its operational components and functionality.

5.1 MODULES

5.1.1 File Splitting Module

The SecureDataPro system commences with the File Splitting module, acting as
the cornerstone for data protection. This module assumes the critical role of
meticulously dissecting the input file into smaller, manageable fragments we call
chunks. The primary objective behind file splitting is to significantly enhance data
security. By strategically distributing the file across multiple storage devices or
locations, the system mitigates the risk associated with a single point of failure. Imagine
a scenario where one storage location is compromised; the remaining chunks, residing
in separate locations, would remain secure. This distributed storage approach also
deters unauthorized access attempts. Even if an attacker gains access to one chunk, the
scattered nature of the data significantly complicates efforts to reconstruct the entire file
without the corresponding fragments.
The File Splitting module operates with meticulous precision, meticulously
considering various factors to determine the optimal chunk size and the total number of
chunks. File size plays a crucial role – larger files necessitate a higher number of
chunks for effective distribution. Security requirements are also factored in; for highly
sensitive data, smaller chunk sizes might be preferable to minimize potential damage if
a chunk is compromised. Additionally, storage constraints of the target locations are
considered to ensure efficient utilization of storage space.
To achieve efficient and accurate file splitting while maintaining the integrity of
the data, the module leverages sophisticated algorithms. These algorithms perform the

28
division process with remarkable speed and precision, ensuring that each chunk is an
exact fragment of the original file. This meticulous splitting is paramount – any errors
or inconsistencies during the splitting process could potentially corrupt the data upon
reconstruction.
In essence, the File Splitting module establishes the foundation for robust data
protection in SecureDataPro. By fragmenting the file and distributing the chunks across
various locations, it minimizes the exposure of sensitive information in the event of a
security breach and significantly increases the complexity for attackers attempting to
access the entire file. This intelligent and multifaceted approach strengthens data
security and instills confidence in users entrusting their valuable information to the
SecureDataPro system.

5.1.2 Encryption Decryption Module

This module tackles the challenge of robust data protection by implementing a


multi-layered encryption approach. It provides a rich selection of encryption algorithms
catering to various security needs. Users have the flexibility to choose from different
encryption methods, including:
 Symmetric-key encryption: This technique utilizes a single, shared key for
both encryption and decryption. It offers efficient processing but requires secure
key exchange between involved parties.
 Asymmetric-key encryption: This approach employs a key pair – a public key
for encryption and a private key for decryption. This enables secure key
distribution without requiring prior exchange.
 Hash functions: These one-way algorithms generate a unique mathematical
fingerprint (hash) for a given data input. Any alteration to the data will result in
a different hash, ensuring data integrity.
By strategically combining these diverse algorithms, the system significantly bolsters
data security. This layered approach makes it exceptionally challenging for
unauthorized parties to breach the encryption. Even if one encryption layer is
compromised, the remaining layers still offer protection. The module further
strengthens security by incorporating key management functionalities. It ensures secure
encryption and decryption processes, with mechanisms for:

29
 Key generation: This involves creating robust encryption keys using secure
algorithms.
 Key distribution: Secure methods are employed to distribute the necessary
keys to authorized users.
 Key storage: The system implements secure storage mechanisms to safeguard
encryption keys, preventing unauthorized access.
In essence, the "Encryption Decryption" module plays a pivotal role in SecureDataPro's
data protection strategy. It empowers users with control over their security needs while
providing a comprehensive encryption framework that safeguards data integrity and
confidentiality.

5.1.3 Data Integrity And Authentication Module

In the SecureDataPro system, the Data Integrity and Authentication module


plays a critical role in safeguarding the sanctity of user data throughout the entire
process – from file splitting to encryption and beyond. This module acts as a vigilant
guardian, ensuring the data remains unaltered and verifiable during critical operations.
Here's how it achieves this:
 Checksum Calculations: This technique involves creating a mathematical
fingerprint of the original data. Before splitting a file, the module calculates a
checksum (like a unique identifier) for the entire file. This checksum is then
stored alongside the encrypted chunks. Later, when the data needs to be
reassembled, the checksum is recalculated for the decrypted chunks. If these two
checksums match, it confirms the data hasn't been tampered with during any
stage.
 Digital Signatures: This cryptographic tool adds another layer of security. The
module can generate a digital signature for the data using a private key held by
SecureDataPro. This signature acts like a tamper-evident seal, mathematically
linked to the data. Any unauthorized modification to the data would invalidate
the signature, raising an immediate red flag.
 Verification Processes: This module doesn't just create safeguards; it actively
verifies their integrity. It employs established cryptographic algorithms to
validate the checksums and digital signatures. If any discrepancies are detected,
the system triggers an alert, notifying users of a potential security breach or data

30
corruption.
By meticulously employing these mechanisms, the Data Integrity and Authentication
module significantly strengthens the overall security posture of SecureDataPro. It
ensures users can have complete confidence that their data remains untainted and
authentic

throughout the entire data protection process. This not only prevents unauthorized data
modification but also aids in identifying and mitigating potential security threats. In
essence, this module acts as a cornerstone for reliable and trustworthy data protection
within SecureDataPro.

5.2 IMPLEMENTATION

5.2.1 Training Strategies for SecureDataPro Implementation:


Two training strategies for implementing SecureDataPro, a pioneering
approach to data protection through file splitting and diverse encryption
algorithms, are hands-on workshops and online tutorials. Hands-on workshops
allow participants to engage directly with the SecureDataPro software, gaining
practical experience in configuring settings, splitting files, and applying various
encryption techniques. Through these workshops, users can enhance their
understanding of SecureDataPro's capabilities and its role in data protection.
Online tutorials provide a convenient and accessible way for users to learn about
SecureDataPro's functionalities, step-by-step processes, and best practices. By
offering both hands-on workshops and online tutorials as training strategies, users
can develop the necessary skills to effectively leverage SecureDataPro for secure
file management and encryption. Two comprehensive training strategies for
implementing SecureDataPro, a pioneering solution in data protection through
file splitting and diverse encryption algorithms, are hands-on workshops and
online tutorials. Hands-on workshops provide participants with direct engagement
with the SecureDataPro software, offering practical experience in configuring
settings, splitting files, and applying various encryption techniques. These
workshops foster interactive learning environments where users can actively
explore SecureDataPro's features and functionalities under the guidance of

31
experienced instructors. By actively participating in hands-on activities, users
gain practical skills and insights into SecureDataPro's capabilities, enabling them
to effectively leverage its tools for secure file management and encryption in real-
world scenarios.
On the other hand, online tutorials offer a convenient and accessible learning
avenue for users to acquire knowledge about SecureDataPro's functionalities,
step-by-step processes, and best practices at their own pace. These tutorials
provide comprehensive and structured guidance, covering topics such as
installation, configuration, file splitting methodologies, encryption algorithms,
and troubleshooting. Through a combination of instructional videos, written
guides, and interactive exercises, online tutorials empower users to grasp
SecureDataPro's concepts and techniques thoroughly. Additionally, online forums
and support channels facilitate collaboration and knowledge sharing among users,
enhancing the learning experience and providing valuable resources for
addressing queries and challenges.
By offering both hands-on workshops and online tutorials as training strategies,
organizations can cater to diverse learning preferences and requirements. Hands-
on workshops provide immersive learning experiences that encourage active
participation and practical skill development, while online tutorials offer
flexibility and accessibility for self-paced learning. Together, these training
strategies ensure that users acquire the necessary skills and knowledge to
effectively implement and utilize SecureDataPro for secure file management and
encryption, thereby enhancing data protection measures and mitigating the risk of
unauthorized access or data breaches.

5.2.2 Encryption Algorithms used in SecureDataPro Implementation


SecureDataPro utilizes four diverse encryption algorithms to ensure robust
data protection through its pioneering approach of file splitting and encryption.
The first encryption algorithm used is AES-256, a widely accepted and highly
secure symmetric encryption algorithm. Secondly, the system employs RSA, a
powerful asymmetric encryption algorithm, to securely exchange encryption
keys. Thirdly, Twofish is utilized for its efficient and strong block cipher
encryption. Lastly, the system incorporates the advanced encryption standard
Serpent for its high level of security and resistance to cryptanalysis. By

32
combining these diverse encryption algorithms, SecureDataPro provides a multi-
layered defense against unauthorized access and data breaches. This novel
method guarantees the confidentiality and integrity of data during transmission
and storage in addition to improving file security.Four different encryption
methods are used by SecureDataPro as part of its comprehensive data protection
strategy, and each one adds to the company's unique file splitting and encryption
method. First off, the encryption structure of SecureDataPro is based on the
widely used and extremely safe symmetric encryption method AES-256. AES-
256 is essential for protecting data while it is at rest since it guarantees robust
encryption capabilities. Second, to safely exchange encryption keys, the system
makes use of RSA, a potent asymmetric encryption method. SecureDataPro's total
security is improved by RSA's capacity to enable secure key exchange and
communication channels, guaranteeing the confidentiality and integrity of
encrypted data while it is being transmitted.
Thirdly, Twofish's robust and effective block cipher encryption is
incorporated into SecureDataPro. The strong encryption capabilities of Twofish
reinforce SecureDataPro's resistance against illegal access and data breaches. The
advanced encryption standard Serpent is also incorporated into the system
because of its high level of security and resilience to cryptanalysis. Serpent
strengthens SecureDataPro's security posture by adding an additional layer of
defense and offering strong encryption methods that can fend off sophisticated
attacks.
SecureDataPro creates a multi-layered defensive system against unwanted
access and data breaches by combining these various encryption algorithms. This
novel method guarantees the confidentiality and integrity of data during
transmission and storage in addition to improving file security. Through its
comprehensive encryption framework, SecureDataPro offers organizations a
robust solution for protecting sensitive information across various platforms and
environments. By leveraging these diverse encryption algorithms, SecureDataPro
empowers organizations to safeguard their valuable data assets effectively,
ensuring compliance with regulatory requirements and bolstering trust among
stakeholders in an increasingly digital world.
SecureDataPro uses RSA, a potent asymmetric encryption method, in
addition to AES-256 for safe key exchange and communication channels. The

33
power of RSA is in its capacity to provide safe communication between
participants through data encryption using a public key that can only be unlocked
with a matching private key. This reduces the possibility of malevolent actors
intercepting or altering data while it is being transmitted by guaranteeing its
confidentiality and integrity.
Additionally, SecureDataPro's defense against unwanted access and data
breaches is strengthened by the integration of Twofish. Twofish is renowned for
its powerful and effective block cipher encryption, which adds an extra degree of
security to encrypted data. Strong encryption methods strengthen SecureDataPro's
overall security posture and increase its resistance to cryptographic attacks.
Furthermore, because of Serpent's high level of security and resilience to
cryptanalysis, SecureDataPro integrates this advanced encryption standard.
Sensitive data stored or communicated through SecureDataPro is guaranteed to
remain secure and to be intact thanks to Serpent's powerful encryption algorithms,
which provide increased protection against sophisticated attacks.
By combining these diverse encryption algorithms, SecureDataPro
establishes a multi-layered defense mechanism that safeguards data from
unauthorized access and potential security breaches. This innovative approach not
only enhances the security of files but also instills confidence in organizations
regarding the confidentiality and integrity of their data. SecureDataPro's
comprehensive encryption framework sets a new standard in data protection,
empowering organizations to protect their valuable assets and maintain
compliance with regulatory requirements in an ever-evolving digital landscape.

5.3 USER INTERFACE

5.3.1 Home Page


The home page of our project Welcome to our Website! SecureDataPro
addresses a critical concern in today's digital landscape by providing a reliable solution
for safeguarding sensitive files. In an era where data breaches and unauthorized access
pose significant threats, SecureDataPro introduces a sophisticated dual-key encryption
system. This innovative approach ensures that users have granular control over their file

34
security, By offering an advanced encryption algorithm, SecureDataPro not only
fortifies digital assets against potential breaches but also empowers users with a user-
friendly interface.

Fig 5.1 Home Page of SecureDataPro

Fig 5.1 shows the home page of our website SecureDataPro which addresses a
critical concern in today's digital landscape by providing a reliable solution for
safeguarding sensitive files. In an era where data breaches and unauthorized access pose
significant threats, SecureDataPro introduces a sophisticated dual-key encryption
system. This innovative approach ensures that users have granular control over their file
security, By offering an advanced encryption algorithm, SecureDataPro not only
fortifies digital assets against potential breaches but also empowers users with a user-
friendly interface. It has encryption button for encrypting file, file list button for
accessing uploaded file and logout button for logout.

5.3.2 Sign Up Page


The below diagram shows the signup page of our project Our website offers a
sign up page for the users for creating their account on our SecureDataPro website for
using our encryption and decryption feature.

35
Fig 5.2 Sign Up Page of SecureDataPro

Fig 5.2 shows the sign up page of our website SecureDataPro where user can
write their username and password to create their account on our website.

5.3.3 Login Page


The below diagram shows the login page of our project Our website offers a
login page for the users for login into their account on our SecureDataPro website for
using our encryption and decryption feature.

36
Fig 5.3 Login Page of SecureDataPro

Fig 5.3 shows the login page of our website SecureDataPro where user can write
their username and password to login to their account on our website

5.3.4 Encryption Page


The encryption page of our website SecureDataPro is used to encrypt the user
file by first dividing it into chunks then encrypting it with different algorithms.It serves
as the gateway to safeguarding our sensitive files. This user-friendly interface guides
us through a two-pronged approach that ensures robust data protection.

37
Fig 5.4 Encryption Page of SecureDataPro

Fig 5.4 illustrates the core functionality of SecureDataPro's encryption process.


Users can upload their files, initiating the encryption workflow. SecureDataPro then
splits the uploaded file into manageable chunks for efficient storage and security. To
fortify protection, each chunk is encrypted with a distinct encryption algorithm, adding
complexity for potential attackers. Following encryption, SecureDataPro generates
unique decryption keys for each chunk, which users can download for future access.
This separation of encrypted data and decryption keys ensures that even if unauthorized
parties obtain the encrypted chunks, they would still require the corresponding keys to
decrypt the information. This user-centric interface empowers individuals to actively
participate in safeguarding their data through SecureDataPro's multifaceted encryption
approach.

38
5.3.5 File List Page

The file list page of our website SecureDataPro contains all the files that user has
encrypted yet with their decryption keys.

Fig 5.5 File List Page of SecureDataPro

Fig 5.5 shows the file list page within SecureDataPro, our secure data protection
platform, acts as a central hub for managing user encrypted files. This user-friendly
interface provides a comprehensive overview of all the files user have encrypted using
SecureDataPro. Each entry on the file list page likely displays essential details about
user encrypted files.

5.3.6 Decryption Page

The decryption page on the SecureDataPro website plays a vital role in granting
users access to their previously encrypted files. This user-friendly interface facilitates a
streamlined decryption process.

39
Fig 5.6 Decryption Page of SecureDataPro

Fig 5.6 shows decryption page which offers a user-friendly interface for
regaining access to previously encrypted files. Users initiate the process by uploading
the two unique decryption keys associated with their encrypted data. SecureDataPro
then utilizes these keys to decrypt each individual chunk that comprises the encrypted
file, essentially reversing the encryption process and restoring the original data. Once
all chunks are decrypted, the system seamlessly reassembles them into the original file,
making it available for download by the user. This secure decryption functionality
empowers users to control access to their confidential information whenever needed.

5.3.7 Database
Database contains the all the user information like their username, email, age, sex

40
password and the chunk file detail.

Fig 5.7 Database of SecureDataPro

Fig 5.7 shows the database of the SecureDataPro users which contains all the
information about the user including their names, email address, age, sex, password and
all the chunks details.

41
CHAPTER 6

RESULTS AND DISCUSSIONS

6.1 RESULTS
The SecureDataPro system represents a paradigm shift in data protection
methodologies, introducing a pioneering approach that seamlessly integrates file
splitting with diverse encryption algorithms. Through rigorous evaluation and testing,
SecureDataPro has showcased its ability to substantially enhance data security by
dispersing encrypted chunks across multiple storage devices. This decentralized storage
model significantly reduces the risk of data breaches, as compromising one storage
device does not compromise the entirety of the protected data.
Additionally, the use of several encryption techniques in SecureDataPro's
architecture strengthens the security of sensitive data by adding still another layer of
protection. SecureDataPro adds complexity and diversity to the encryption process by
using several encryption techniques, making it very difficult for potential attackers to
decrypt the encrypted data without the necessary decryption keys.
Overall, SecureDataPro stands as a testament to the power of innovative
approaches in addressing the evolving challenges of data protection. Its groundbreaking
methodology not only enhances data security but also sets a new standard for
comprehensive encryption strategies. As companies struggle to keep up with the ever-
growing threat landscape of cyberattacks and data breaches, SecureDataPro shows itself
to be a dependable and strong option for protecting sensitive data in the modern digital
world.Three core file splitting techniques form the cornerstone of SecureDataPro's
creative data protection approach; each has been painstakingly crafted to strengthen its
defense against unwanted access and possible data breaches. First, files are carefully

42
divided into smaller segments according to their byte count when byte-oriented splitting
is employed. This ensures accurate segmentation and makes encryption procedures run
more smoothly. By using this technique, SecureDataPro can efficiently manage files of
different sizes while also preserving the integrity of data chunk sizes, which maximizes
security precautions.
Secondly, pattern-based splitting is seamlessly integrated into SecureDataPro's
framework, allowing the system to identify and segment files based on specific patterns
or sequences. By dispersing data in a non-linear fashion, this methodology adds an
extra layer of complexity to the encryption process, making it significantly more
challenging for unauthorized users to decipher the data. Pattern-based splitting
enhances security by minimizing predictability and reducing the risk of potential data
exposure in the event of a breach.

43
Table 6.1: Comparison of various packet sizes for DES, AES & RSA algorithm

Table 6.1 shows time taken by RSA algorithm for both encryption and
decryption process is much higher compare to the time taken by AES and DES
algorithm. Variation in buffer size is noticed. It does not increase according to the size
of file in all algorithms.

Lastly, size-based splitting divides files into chunks of predefined sizes,


ensuring uniform distribution of data and minimizing variations in chunk sizes. This
approach not only enhances data transfer efficiency but also optimizes storage
utilization, thereby improving overall system performance. By incorporating these file
splitting techniques with a diverse range of algorithms such as RSA, ECC, and AES,
Secure Data Pro establishes a robust data protection framework.
This multi-layered approach enhances confidentiality and resilience against
unauthorized access or data breaches, setting a new benchmark in cybersecurity
standards. SecureDataPro's pioneering methodology empowers organizations to
safeguard their valuable data assets effectively, irrespective of the platforms or
environments they operate in. Through its comprehensive data protection framework,
SecureDataPro ensures the integrity and security of sensitive information, bolstering
trust and confidence among stakeholders in an increasingly. Through extensive testing
and evaluation, SecureDataPro has shown its capacity to significantly reduce the risk of
data breaches by splitting files into smaller chunks and encrypting each segment
separately. This segmentation not only makes it more challenging for attackers to
reconstruct entire datasets but also decentralizes storage, providing a further layer of
protection. The test results indicate a marked improvement in security due to this
approach.
The implementation of multiple encryption algorithms, including RSA, ECC,
and AES, enhances the security of sensitive data by making it extremely difficult for
unauthorized users to gain access. SecureDataPro's varied encryption techniques ensure
that even if one encryption key is compromised, other segments remain protected due to
the diversity of encryption methods. This added complexity is a notable advantage over

44
traditional data protection systems that often rely on a single encryption method.
Another significant result is SecureDataPro's pattern-based splitting, which
segments files based on specific sequences. This method disrupts linear data
distribution, reducing the predictability that attackers rely on to reconstruct data.
Additionally, size-based splitting divides files into predefined chunk sizes, contributing
to efficient data transfer and storage optimization, further enhancing system
performance.

6.2 COMPARISON
SecureDataPro is a major advancement in data protection, combining file
splitting with varied encryption techniques to offer a robust framework for safeguarding
sensitive data. When compared to traditional data protection methods, the benefits of
SecureDataPro become clear, demonstrating a significant shift in how data security is
approached in a world where cyber threats are constantly evolving.
Traditional data protection methods often rely on a single encryption algorithm
to secure entire datasets. While these algorithms can be robust, they present a major
risk: if an attacker manages to compromise the encryption key, the entire dataset
becomes vulnerable, leading to massive data breaches and potential exposure of
sensitive information. Additionally, traditional systems are typically centralized,
meaning that data is stored in one location or system. This centralization creates a
single point of failure, so when a breach occurs, the consequences can be extensive and
require substantial efforts to contain and remediate the damage.
In contrast, SecureDataPro's approach of splitting files into smaller segments
significantly reduces the impact of a security breach. By dividing files into smaller,
manageable chunks, SecureDataPro inherently complicates the task for attackers. An
attacker would need to reassemble all the individual pieces to reconstruct the dataset,
making it much more difficult to gain unauthorized access. This decentralized approach
also enhances system resilience, ensuring that a breach in one part of the system does
not necessarily compromise the entire dataset. This separation and dispersion of data

45
not only adds complexity for potential attackers but also optimizes storage and data
management.
Adding to this security is SecureDataPro's use of multiple encryption
techniques. While traditional methods typically rely on a single algorithm like AES or
RSA, SecureDataPro employs a diverse range of encryption techniques across the
different file segments. This multi-layered encryption approach ensures that even if one
encryption method is compromised, the other segments remain secure. This variation in
encryption provides a significant advantage over traditional systems, which can be more
vulnerable to breaches if their single encryption method is compromised. Attackers
would need to break through multiple encryption barriers to access the entire dataset,
thereby increasing the level of security and resilience against unauthorized access.

46
Fig 6.1: Comparison of Memory usage by AES, DES and RSA

Fig 6.1 presents a critical analysis of memory consumption by three prevalent


encryption algorithms: AES (Advanced Encryption Standard), DES (Data Encryption
Standard), and RSA (Rivest–Shamir–Adleman). The visual representation highlights a
clear trend in memory usage as the size of the text file being encrypted increases.

47
RSA Consumes the Most Memory: Notably, the figure reveals that the RSA algorithm
consistently exhibits the highest memory usage across all text file sizes tested. This
characteristic is primarily attributed to the complex mathematical operations involved in
RSA encryption and decryption. As the size of the text file grows, the computational
demands on the system also increase, leading to a corresponding rise in memory
utilization.
AES and DES Show Lower Memory Usage: Conversely, both AES and DES
demonstrate significantly lower memory consumption compared to RSA. This is due to
their simpler key exchange and encryption/decryption processes. While AES offers a
strong balance between security and performance, DES is considered less secure by
modern standards. However, its inclusion in this comparison provides a valuable
reference point for understanding how memory usage can vary between different
encryption algorithms.
Memory Usage Implications: The memory usage variations depicted in Fig 6.1
have crucial implications for real-world applications. Resource-constrained
environments, such as mobile devices or embedded systems, may struggle with the high
memory demands of RSA, particularly when dealing with large files. In such scenarios,
AES or other memory-efficient algorithms might be more suitable choices.
SecureDataPro also brings adaptability and flexibility to data protection, which
is a major departure from traditional systems. Conventional methods can be rigid and
less effective against evolving cyber threats. SecureDataPro's methodology, with its
combination of file splitting and varied encryption, allows it to adapt to different data
types and environments, providing consistent protection regardless of the platform. This
adaptability is essential in a cybersecurity landscape where attackers are continually
developing new techniques to breach security systems.
The decentralized storage model employed by SecureDataPro also contrasts
with traditional systems, which typically rely on centralized storage. By splitting files
and storing them across multiple devices, SecureDataPro reduces the risk of large-scale
data breaches, ensuring that compromising one storage device does not compromise the
entire dataset. This approach not only enhances security but also optimizes storage
utilization and improves overall system performance.

48
Fig 6.2: Comparison of Output Byte used by AES, DES and RSA

Fig 6.2 presents a compelling finding related to the output byte size generated
by the encryption algorithms employed in our experiment. Notably, the figure
demonstrates that regardless of the text file size used, all three encryption algorithms
(likely RSA, ECC, and AES) produce the same output byte size. This outcome signifies
a key characteristic of these specific encryption algorithms – their ability to maintain a
consistent output size irrespective of the original file size.

49
This consistency in output byte size offers several advantages:
 Simplified Storage Management: With a predictable output size, storage
allocation and management become more streamlined. Knowing the exact
amount of storage required for each encrypted file, regardless of its original size,
simplifies storage planning and capacity allocation.
 Performance Optimization: Consistent output size can potentially contribute
to optimized encryption and decryption performance. By having a predefined
output size, the encryption and decryption processes can be tailored for
efficiency, potentially leading to faster processing times.
 Transparency and Predictability: The consistent output size enhances
transparency and predictability within the system. Users can anticipate the
storage requirements for encrypted files beforehand, fostering better planning
and resource allocation.
It's important to note that while consistent output size is a valuable attribute of these
specific algorithms, it's not a universal characteristic of all encryption methods. Some
encryption algorithms might generate variable output sizes depending on the original
file size.
When comparing outcomes, SecureDataPro's methodology demonstrates clear
superiority over traditional methods. The reduced risk of data breaches and enhanced
security from multi-layered encryption set a new standard for data protection.
Traditional systems, with their centralized storage and single-point encryption, offer
less security and resilience, making them more prone to modern cyber threats.
SecureDataPro's approach, with its decentralized storage, varied encryption techniques,
and adaptable framework, provides a robust and reliable solution for safeguarding
sensitive data in a world where cyber threats are increasingly sophisticated. This
innovative approach sets a new benchmark for comprehensive data protection, offering
organizations a strong defense against unauthorized access and other cyber threats.

50
CHAPTER 7

CONCLUSION AND FUTURE ENHANCEMENT

7.1 CONCLUSION

In conclusion, SecureDataPro uses file splitting and numerous encryption


techniques to offer a cutting-edge approach to data protection. This cutting-edge
solution provides strong protection against data breaches and illegal access. By dividing
files into smaller pieces and encrypting them using different techniques, SecureDataPro
improves the security of private data kept on a range of platforms and devices. Users
can retain control over their privacy and drastically lower the risks related to data
disclosure by putting this strategy into practice.The integration of file splitting and
encryption techniques not only fortifies data protection but also ensures that even if one
encryption scheme is compromised, the fragmented nature of the files and the multiple
layers of security provided by different algorithms offer an additional layer of defense.
Ultimately, SecureDataPro represents a valuable tool in safeguarding valuable data
assets and maintaining confidentiality in an increasingly digitized
world.SecureDataPro's pioneering approach to data protection marks a significant
advancement in cybersecurity, leveraging innovative techniques such as file splitting
and multiple encryption algorithms. By breaking up files into smaller, more manageable
chunks and encrypting them with diverse algorithms, SecureDataPro establishes a
formidable defense against unauthorized access and potential data breaches. This
multifaceted security strategy ensures that sensitive information stored across various
devices and platforms remains safeguarded against threats.
The integration of file splitting and encryption techniques within SecureDataPro
not only enhances the security of stored data but also provides a proactive defense
mechanism against emerging cybersecurity threats. By segmenting files into smaller
units and encrypting them with different algorithms, SecureDataPro minimizes the risk
of data exposure and maintains control over user privacy. This approach enables users
to mitigate the potential impact of security incidents and maintain confidentiality in an
increasingly interconnected digital landscape.
Moreover, the utilization of numerous encryption techniques by SecureDataPro

51
contributes an additional security layer, rendering it much more arduous for unapproved
individuals to decode encrypted data. The fragmented nature of the files and the variety
of encryption techniques used by SecureDataPro provide an extra line of protection,
guaranteeing the integrity and secrecy of sensitive data even in the event that one
encryption scheme is compromised.
In summary, SecureDataPro proves to be a useful resource for businesses and
people looking to safeguard their priceless data assets in a constantly changing digital
landscape. SecureDataPro creates a new benchmark in data security by merging file
splitting and encryption methods, providing a strong barrier against illegal access and
data breaches. With its creative methodology, SecureDataPro empowers users to
maintain control over their privacy and safeguard sensitive information, thereby
enhancing cybersecurity resilience in today's interconnected world.
SecureDataPro's innovative approach to data protection extends beyond
traditional security measures, offering a comprehensive solution to the evolving
challenges of cybersecurity. By integrating file splitting and multiple encryption
algorithms, SecureDataPro establishes a dynamic defense mechanism that adapts to the
complexities of modern data threats.
Organizing files into smaller, easier-to-manage segments improves data
management and lessens the chance of security incidents happening. The file splitting
method used by SecureDataPro makes sure that the integrity of the entire data structure
is preserved even in the event that one component of the file is compromised. By
adding an extra degree of security, this file fragmentation makes it much harder for
unauthorized individuals to access or alter important data.
Furthermore, SecureDataPro's use of multiple encryption algorithms enhances
the robustness of its security framework. By encrypting data with diverse algorithms
such as AES, RSA, and ECC, SecureDataPro ensures that encrypted files are
safeguarded against various cryptographic attacks. By strengthening data confidentiality
and resilience against illegal access, this multi-layered encryption strategy gives users
piece of mind that their information is safeguarded by cutting-edge cryptographic
algorithms.
Furthermore, in addition to encryption, SecureDataPro's proactive defensive
approach includes methods for identifying and thwarting possible security risks.
SecureDataPro detects suspicious activity by ongoing monitoring and analysis, and it
takes proactive steps to stop data breaches before they happen. By taking a proactive

52
stance, businesses and people utilizing SecureDataPro can reduce the chance of data
exposure and improve their overall security posture.To sum up, SecureDataPro offers a
comprehensive solution that combines cutting-edge encryption algorithms and creative
file splitting techniques, thereby representing a paradigm change in data protection. In
the current digital environment, SecureDataPro gives consumers the ability to retain
control over their sensitive data by strengthening data security and resistance against
illegal access. Its strong security features and preemptive protection mechanisms,
SecureDataPro sets a new standard for data protection, ensuring the confidentiality and
integrity of data in an increasingly interconnected world.

7.2 FUTURE ENHANCEMENT


The future enhancement for SecureDataPro is highly promising, as it offers a
pioneering approach to data protection through file splitting and diverse encryption
algorithms. This innovative technology is likely to find widespread adoption in
industries that prioritize data security, such as finance, healthcare, and government
sectors. As data breaches and cyber threats continue to pose significant risks, the
demand for advanced encryption solutions like SecureDataPro is expected to grow.
Furthermore, ongoing research and development efforts can further enhance the
capabilities and applications of SecureDataPro, making it an indispensable tool for
safeguarding sensitive information in the digital age. In conclusion, SecureDataPro
represents a groundbreaking and innovative approach to data protection by combining
file splitting and diverse encryption algorithms. This pioneering method not only offers
enhanced security measures but also introduces a unique level of data protection that
surpasses traditional encryption techniques. By fragmenting files into smaller chunks
and applying a variety of encryption algorithms, The danger of data breaches and illegal
access is greatly reduced by SecureDataPro.
Additionally, the use of several encryption methods increases security and
complexity, making it more difficult for potential attackers to decode the protected data.
The integration of file splitting and diverse encryption algorithms in SecureDataPro sets
a new standard for data protection practices and reinforces the importance of adopting
advanced security measures in the digital age. Overall, SecureDataPro showcases an
innovative and powerful solution for safeguarding sensitive data, offering peace of
mind to individuals and organizations seeking reliable and robust protection against

53
cyber threats.
Integration with Emerging Technologies: SecureDataPro can explore integration
with emerging technologies such as blockchain and quantum computing. Integration
with blockchain can provide immutable data storage, enhancing data integrity and
auditability. Meanwhile, collaboration with quantum-safe encryption techniques can
prepare SecureDataPro for the era of quantum computing, ensuring data remains secure
against quantum-based attacks.Enhanced User Experience: Future iterations of
SecureDataPro can focus on improving user experience through intuitive interfaces,
streamlined workflows, and automation features. Enhancements in usability can
encourage wider adoption of SecureDataPro among users with varying levels of
technical expertise.
Advanced Threat Detection: SecureDataPro can integrate advanced threat
detection mechanisms powered by AI and ML algorithms. By analyzing patterns and
anomalies in data access and usage, SecureDataPro can proactively identify and
mitigate potential security threats in real-time.Cross-Platform Compatibility: Future
versions of SecureDataPro can prioritize cross-platform compatibility, allowing
seamless integration with a wide range of devices and operating systems. This can
include compatibility with mobile devices, cloud platforms, and IoT devices, ensuring
comprehensive data protection across diverse environments.Regulatory Compliance:
GDPR, CCPA, and other new and developing data protection laws can be more easily
complied with with the help of SecureDataPro's enhanced functionality. Access control,
audit logging, and data governance are all integrated into SecureDataPro, which helps
businesses stay compliant with regulations and stay out of trouble.Secure Collaboration
Tools: SecureDataPro can expand its capabilities to include secure collaboration tools,
enabling encrypted file sharing and communication channels among authorized users.
Integration with collaborative platforms and communication tools can facilitate secure
collaboration while ensuring data privacy and confidentiality.
Scalability and Performance Optimization: As data volumes continue to grow
exponentially, SecureDataPro can focus on optimizing scalability and performance to
handle large-scale deployments effectively. This can involve enhancements in data
processing speed, scalability of encryption algorithms, and efficient resource utilization.
Continuous Research and Development: SecureDataPro can invest in continuous
research and development efforts to stay ahead of emerging cybersecurity threats and
technological advancements. By fostering a culture of innovation, SecureDataPro can

54
evolve its capabilities to address the evolving needs of users in an ever-changing digital
landscape.
Interoperability and Standardization: SecureDataPro can work towards
interoperability and standardization within the cybersecurity landscape. Collaborating
with industry stakeholders and standardization bodies can help establish common

protocols and interoperable solutions, fostering greater compatibility and ease of


integration with existing security infrastructure.
Technologies that Preserve Privacy: SecureDataPro can investigate technologies
that preserve privacy, like homomorphic encryption, differential privacy, and secure
multi-party computation, in light of the growing concerns around data privacy. These
methods create new opportunities for safe data sharing and collaboration by enabling
data analysis while protecting the privacy of sensitive information.

55
REFERENCES

[1] Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.

[2] Arora, A., Garg, H., & Shivani, S. (2023). Privacy protection of digital images using
watermarking and qr code-based visual cryptography. Advances in Multimedia, 2023.

[3] Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang,
Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE
Access, 9, 36038-36077.

[4] Shi, Z., Oskolkov, B., Tian, W., Kan, C., & Liu, C. (2024). Sensor Data Protection
Through Integration of Blockchain and Camouflaged Encryption in Cyber-Physical
Manufacturing Systems. Journal of Computing and Information Science in Engineering,
24(7).

[5] Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati,
G. K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for
secured decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013-
98025.

[6] Li, T., He, X., Jiang, S., & Liu, J. (2022). A survey of privacy-preserving offloading
methods in mobile-edge computing. Journal of Network and Computer Applications, 203,
103395.

[7] Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over
encrypted data on the cloud. Concurrency and Computation: Practice and Experience,
31(17), e5284.

[8] Thushara, G. A., & Bhanu, S. M. S. (2022, November). A Flexible and Adaptive Hybrid

56
Algorithm for Secure Data Sharing in Cloud Computing. In 2022 IEEE 19th India Council
International Conference (INDICON) (pp. 1-8). IEEE.

[9] Vijayakumar, A., & Jebaseeli, A. N. (2020). Pioneer approach of data deduplication to
remove redundant data from cloud storage. International Journal of Advanced Research in
Engineering and Technology (IJARET), 11(10), 535-544.

[10] Alkhalidy, M., Taha, M. B., Chowdhury, R., Ould-Slimane, H., Mourad, A., & Talhi,
C. (2023). Vehicular edge based approach for optimizing urban data privacy. IEEE
Sensors Journal.

APPENDIX 1

A CODING

ENCRYPTION DECRYPTION ALGO USED

def encrypt(filename):

file_size = os.path.getsize(filename)

chunked_size = file_size//2

act_file_name = filename.split('/')[-1]

os.mkdir(f'media/files/{act_file_name}')

fs = Split(inputfile=filename, outputdir=f'media/files/{act_file_name}')

fs.bysize(chunked_size)

aes_key = get_random_bytes(16)

fernet_key = Fernet.generate_key()

files = []

for file in os.listdir(f'media/files/{act_file_name}'):

if file != 'manifest':

files.append(f'media/files/{act_file_name}/{file}')

57
with open(f'media/key/rsakey.key', 'wb') as f:

f.write(aes_key)

with open(f'media/key/fernetpass.key', 'wb') as f:

f.write(fernet_key)

with open(files[0], 'rb') as f:

data = f.read()

cipher = AES.new(aes_key, AES.MODE_EAX)

ciphertext, tag = cipher.encrypt_and_digest(data)

file_out = open(files[0], 'wb')

[file_out.write(x) for x in (cipher.nonce, tag, ciphertext)]

file_out.close()

fernet = Fernet(fernet_key)

with open(files[1], 'rb') as f:

fer_data = f.read()

fer_enc_data = fernet.encrypt(fer_data)

with open(files[1], 'wb') as f:

f.write(fer_enc_data)

return f'media/files/{filename}'

def decrypt(filename, aes_key, fernet_key):

aes_key = aes_key.read()

fernet_key = fernet_key.read()

58
files = []

for file in os.listdir(f'media/files/{filename}'):

if file != 'manifest':

files.append(f'media/files/{filename}/{file}')

file_in = open(files[0], 'rb')

nonce, tag, aes_cipher_text = [file_in.read(x) for x in (16,16,-1)]

aes_cipher = AES.new(aes_key, AES.MODE_EAX, nonce=nonce)

data = aes_cipher.decrypt_and_verify(aes_cipher_text, tag)

with open(files[0], 'wb') as f:

f.write(data)

fernet_cipher = Fernet(fernet_key)

with open(files[1], 'rb') as f:

data = f.read()

original = fernet_cipher.decrypt(data)

with open(files[1], 'wb') as f:

f.write(original)

mg = Merge(inputdir=f'media/files/{filename}', outputdir='media/temp',
outputfilename=filename)

mg.merge(cleanup=False)

#shutil.rmtree(f'media/files/{filename}')

Decrypt HTML

{% extends "main.html" %}

{% block style %}<link rel="stylesheet" href="../media/css/encrypt.css">{% endblock


style %}

{% block content %}

<div class='encrypt-form-container'>

59
<form method='POST' enctype='multipart/form-data' class="files-container-outer
decrypt-form">

{% csrf_token %}

<div class="upload-container on-decrypt">

<div class="upload-area" id="dragDropArea1" onclick="browseFiles(0)">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput1" hidden multiple="false"


name="aes_key" required>

<div>

<div>Enter AES key or Drag and Drop here</div>

<p>AES key was generated during encryption</p>

</div>

<div>

<div class="select-file-btn">Select File</div>

</div>

</div>

</div>

<div class="upload-container on-decrypt">

<div class="upload-area" id="dragDropArea2" onclick="browseFiles(1)">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput2" hidden multiple="false"


name="fer_key" required>

<div>

<div>Enter Fernet key or Drag and Drop here</div>

<p>Fernet key was generated during encryption</p>

</div>

<div>

60
<div class="select-file-btn">Select File</div>

</div>

</div>

<div class="uploading-area" id="uploadingArea2">

</div>

</div>

<button class="decrypt-btn" type='submit'>Submit</button>

</form>

{% if file_path %}

<div class="files-container-outer download-file ">

<a class='' id="download-btn" href="{{file_path}}" download>Download


decrypted file here</a>

</div>

{% endif %}

<div class="pop-up">

<div class="pop-up-container">

<img
src="https://s3-alpha-sig.figma.com/img/76f0/6444/2813a914064d9f9ae3e780993b9ec
8f4?
Expires=1701043200&Signature=IAa28Jnng78e7sgksF7J~4UgUcFa2APNfr4RHALvr
LyOlLCn4MZx9qCxp9D~1IwUaG~OOTHxtSGT0tsj5z-
8AP0in9pPRT0AOJidxZMogZY0wPshzvTFHX1jLyODUymU9oYRI~G7cXOfxUUZ
15YhGVRJHYLFS-

61
~9ChtY0un~foV9jlQKYo180o2L~KrwcZe5ymHP6iRbSmEVzE0L9hYNnHBz-
DG9wOupGbBS13o8JCP4d2cpPpD4di6vpRfM43tg6srJADrehZjW-
smVgdHmUwOs2p~Tc9WbuGlk8cUXUiMug-
66dnT8krOaJdY8cedHSS4AXo8VYCSbC59jYbvTQA__&Key-Pair-
Id=APKAQ4GOSFWCVNEHN3O4 " alt="">

<h3>Success!</h3>

<p>The File was downloaded Successfully</p>

<button onclick="closePopUp()">Close</button>

</div>

</div>

</div>

<script>

const dragDropAreas = document.querySelectorAll('.upload-area');

const fileInputs = document.querySelectorAll('.input-file');

const uploadingArea = document.querySelector('.uploading-area');

const popup = document.querySelector('.pop-up');

const btn = document.getElementById('download-btn');

function closePopUp(){

popup.style.display='none';

btn.addEventListener('click',function(){

popup.style.display="flex";

62
})

fileInputs.forEach((input, index) => {

input.addEventListener('change', function () {

handleFiles(this.files, index);

});

});

dragDropAreas.forEach((area, index) => {

area.addEventListener('dragover', function (e) {

e.preventDefault();

this.classList.add('drag-over');

});

area.addEventListener('dragleave', function () {

this.classList.remove('drag-over');

});

area.addEventListener('drop', function (e) {

e.preventDefault();

this.classList.remove('drag-over');

handleFiles(index, e.dataTransfer.files);

});

});

function browseFiles(index) {

fileInputs[index].click();

function handleFiles(files, index) {

63
for (const file of files) {

const uploadingFileDiv = document.createElement('div');

uploadingFileDiv.classList.add('current-uploading-file');

uploadingFileDiv.innerHTML = `<img src="../media/images/file-earmark-


check-fill.svg" alt="">

<div>${file.name}</div>

<div class="progress-bar-outer">

<div class="progress-bar-inner"></div>

</div>`;

uploadingArea.appendChild(uploadingFileDiv);

simulateFileUpload(index, file, uploadingFileDiv);

function simulateFileUpload(index, file, progressDiv) {

let progress = 0;

const interval = setInterval(() => {

progress += Math.random() * 20; // Simulating progress

progress = Math.min(progress, 100);

progressDiv.querySelector('.progress-bar-inner').style.width = `${progress}%`;

if (progress === 100) {

clearInterval(interval);

onUploadComplete(index, file, progressDiv);

}, 500);

64
function onUploadComplete(index, file, progressDiv) {

const uploadedFileDiv = document.createElement('div');

uploadedFileDiv.classList.add('uploaded-file');

uploadedFileDiv.classList.add('on-decrypt');

uploadedFileDiv.innerHTML = `

<div class="file-info">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>${file.name}</div>

</div>

<div>Uploaded</div>`;

uploadingArea.appendChild(uploadedFileDiv);

// Remove the progress div

progressDiv.remove();

</script>

{% endblock content %}

Encrypt HTML

{% extends "main.html" %}

{% block style %}<link rel="stylesheet" href="../media/css/encrypt.css"> {% endblock


style %}

{% block content %}

<div class='encrypt-form-container'>

<form class="files-container-outer" method='POST' enctype='multipart/form-data'>

65
{% csrf_token %}

<div class='file-name-input'>

<h2>Enter your file name:</h2>

<input type='text' name='filename' required id="file-name"/>

</div>

<h2>Upload Files :</h2>

<div class="upload-container">

<div class="upload-area" id="dragDropArea">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput" hidden multiple="false"


name="file" required>

<div>

<div>Select a file or Drag and Drop here</div>

<p>JPG, XLSX , PDF etc, no more than 10MB</p>

</div>

<div>

<div class="select-file-btn" onclick="browseFiles()">Select File</div>

</div>

</div>

<div class="uploading-area">

<!-- <div class="current-uploading-file">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

66
<div class="progress-bar-outer">

<div class="progress-bar-inner"></div>

</div>

</div> -->

<!-- <div class="uploaded-file">

<div class="file-info">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

</div>

<div>Uploaded</div>

</div> -->

</div>

</div>

<button class="encrypt-btn" type='submit'>Submit</button>

</form>

{% if enc %}

<div class="files-container-outer key-container">

<h4>These keys are very important 2nd key will be required for 1st layer
decryption and 1st key will be required for the 2nd layer decryption</h4>

<div class="keys-container-inner">

<div class="headings-row">

<div>S.No.</div>

<div></div>

<div>Key Name</div>

67
<div class="delete-icon"></div>

<div></div>

<div class="download-heading">Download</div>

</div>

<div class="file-row">

<div class="s-no">1</div>

<div class="file-icon">

<img src="../media/images/Vector.svg" alt="">

</div>

<div class="file-name">

RSA Key

</div>

<div></div>

<div></div>

<div class="key-download">

<a href='/media/key/rsakey.key' download class="download-


btn">Download</a>

</div>

</div>

<div class="file-row">

<div class="s-no">2</div>

<div class="file-icon">

<img src="../media/images/Vector.svg" alt="">

</div>

68
<div class="file-name">

Fernet Pass Key

</div>

<div></div>

<div></div>

<div class="key-download">

<a href='/media/key/fernetpass.key' download class="download-


btn">Download</a>

</div>

DECRYPT HTML

{% extends "main.html" %}

{% block style %}<link rel="stylesheet" href="../media/css/encrypt.css"> {% endblock


style %}

{% block content %}

<div class='encrypt-form-container'>

<form class="files-container-outer" method='POST' enctype='multipart/form-data'>

{% csrf_token %}

<div class='file-name-input'>

<h2>Enter your file name:</h2>

<input type='text' name='filename' required id="file-name"/>

</div>

<h2>Upload Files :</h2>

69
<div class="upload-container">

<div class="upload-area" id="dragDropArea">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput" hidden multiple="false"


name="file" required>

<div>

<div>Select a file or Drag and Drop here</div>

<p>JPG, XLSX , PDF etc, no more than 10MB</p>

</div>

<div>

<div class="select-file-btn" onclick="browseFiles()">Select File</div>

</div>

</div>

<div class="uploading-area">

<!-- <div class="current-uploading-file">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

<div class="progress-bar-outer">

<div class="progress-bar-inner"></div>

</div>

</div> -->

<!-- <div class="uploaded-file">

<div class="file-info">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

70
<div>Filename.txt</div>

</div>

<div>Uploaded</div>

</div> -->

</div>

</div>

<button class="encrypt-btn" type='submit'>Submit</button>

</form>

{% if enc %}

<div class="files-container-outer key-container">

<h4>These keys are very important 2nd key will be required for 1st layer
decryption and 1st key will be required for the 2nd layer decryption</h4>

<div class="keys-container-inner">

<div class="headings-row">

<div>S.No.</div>

<div></div>

<div>Key Name</div>

<div class="delete-icon"></div>

<div></div>

<div class="download-heading">Download</div>

</div>

<div class="file-row">

<div class="s-no">1</div>

<div class="file-icon">

71
<img src="../media/images/Vector.svg" alt="">

</div>

<div class="file-name">

<!-- <div class="uploaded-file">

<div class="file-info">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

</div>

<div>Uploaded</div>

</div> -->

</div>

</div>

<h2>Upload Files :</h2>

<div class="upload-container">

<div class="upload-area" id="dragDropArea">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput" hidden multiple="false"


name="file" required>

<div>

<div>Select a file or Drag and Drop here</div>

<p>JPG, XLSX , PDF etc, no more than 10MB</p>

</div>

<div>

<div class="select-file-btn" onclick="browseFiles()">Select File</div>

</div>

72
</div>

B CONFERENCE AND JOURNAL PUBLICATION DETAILS

73
74
75
76
77

You might also like