network_security
network_security
TABLE OF CONTENTS
Sr. No. Title Page No.
1. Abstract 2
2. Objective and Scope 3
2.1 Objective 3
2.2 Scope 4
3. Theoretical Background 5
3.1 Existing System 5
3.2 Proposed System 5
3.3 Features 6
3.4 RSA Algorithm 7
4. Feasibility Study 9
4.1 Economic Feasibility 9
4.2 Technical Feasibility 10
4.3 Operational Feasibility 10
5. Problem Definition 11
5.1 Project Mission 11
5.2 Target 11
5.3 Target Users 11
5.4 Scope and Key Elements 12
6. System Design 13
6.1 System Design 13
6.2 Data Flow Diagram 13
6.3 Use Case Diagram 14
Page | 1
ENCRYPTION AND DECRYPTION
1.ABSTRACT
encrypts and decrypts the textual files by using RSA algorithm. Our aim is to develop
decrypts the textual files by using RSA algorithm. Encryption and Decryption is a
strong text and file encryption software for personal and professional security. It
protects privacy of our email messages, documents and sensitive files by encrypting
them using RSA algorithm to provide high protection against unauthorized data
access.
through emails, e-commerce, etc. through internet. Sending sensitive messages over
the Internet is very dangerous. If you need to send sensitive messages over the
Internet, you should send it in the encrypted form. Encryption and Decryption allows
you easily encrypt and decrypt your messages. If you need to send sensitive
information via email, simply paste the encrypted text into your email and all the
Page | 2
ENCRYPTION AND DECRYPTION
2.1 Objective
The main objective of our project is to encrypt/decrypt the textual files for
our email messages, documents and sensitive files by encrypting them using RSA
world. People use emails to correspond with one another .The www is used for
other activities.
Sending sensitive messages over the Internet is very dangerous as all emails are
transmitted in an unsecured form and anybody - ISP, your boss, etc. can read your
emails.
Page | 3
ENCRYPTION AND DECRYPTION
If you want to send sensitive information via email, simply paste the encrypted
text into your email or attach the encrypted file,all the recipient has to do is to
decrypt your text or file. Encryption and Decryption works with text information
and files. Just select what you want to encrypt, and Encryption and Decryption
software helps you keep documents, private information and files in a confidential
way.
2.2 Scope
The scope of our project is presently specific.Both the sender and the receiver
confidential.
Each step is clearly stated and user will not face any ambiguity in using the
software.
No complexity is involved.
Page | 4
ENCRYPTION AND DECRYPTION
3.THEORETICAL BACKGROUND
The proposed system is quiet simple to use. It is not complex in its functionalities. It
If you want to send sensitive information via email, simply paste the encrypted text
into your email or attach the encrypted file, all the recipient has to do is to decrypt
your text or file.Encryption and Decryption works with text information and files.
Page | 5
ENCRYPTION AND DECRYPTION
Just select what you want to encrypt, and Encryption and Decryption software helps
It uses two different keys (a key pair) for encryption and decryption.These
algorithms are called "public-key" because the encryption key can be made
public. Anyone can use the public key to encrypt a message, butonly the owner
A message can be encrypted with a private key and decrypted with the
corresponding public key.If Alice (or anyone else) can decrypt a message with
Bob's public key she knows that the message must have come from Bob because
The system provides security and convenience as private keys never need to be
Page | 6
ENCRYPTION AND DECRYPTION
3.4THE ALGORITHM
The RSA algorithm involves three steps, key generation, encryption and decryption.
Key Generation
RSA involves a public key and a private key. The public key can be known to
everyone and is used for encrypting messages. Messages encrypted with the public
key can only be decrypted using the private key. The keys for the RSA algorithm
2. Compute n=pq
n is used as the modulus for both the public and private keys
4. Choose an integer e such that 1<e< φ(n) and e and φ(n) share no factors other
Page | 7
ENCRYPTION AND DECRYPTION
The public key consists of the modulus n and the public (or encryption) exponent
e. The private key consists of the modulus n and the private (or decryption) exponent
Encryption
Decryption
Page | 8
ENCRYPTION AND DECRYPTION
4.FEASIBILITY STUDY
accomplish its task on the working grounds. Its impact was also found to be not
adverse. It was found that the user’s requirements would be met and the resources
related to the project were considered like the problem definition and the process for
To do a feasibility study, the economic, technical and behavioral factors in the system
Page | 9
ENCRYPTION AND DECRYPTION
The project developed, Encryption and Decryption was within budget and
producing the desired results.The labor or the human ware consisted of the
three group members of our project. The output consisted of getting the
Page | 10
ENCRYPTION AND DECRYPTION
desired results. Thus with the consideration of the inputs, the outputs were
achieved successfully. The project was within limit. The inputs didn’t overdo
the outputs.
Technical feasibility revolves around the technical support of the project. The
main infrastructure of the project included the project labs in the college
campus. The systems there were easily able to absorb the new s/w being
installed.The project thus was technically feasible. The equipment and the s/w
project could be made to work correctly, fulfilling its task, with the existing
users. The system developing has an influence on its users. Our system
“Encryption and Decryption” was new for them but it was simple enough for
any naïve person to understand. The evolution of this new system required no
special training for the users. Encryption and Decryption was found to be
feasible in this regard. The system developed would be user friendly and no
5.PROBLEM DEFINITION
DECRYPTION.The project encrypts and decrypts the textual files using RSA
algorithm to maintain the security and integrity of data and information and
5.2 Target
Our target is the common man who wants to interact electronically, whether it is
the Internet is very dangerous.So,our project helps him to interact in a safe and secure
The main target users of our project are the people who transmit confidential
Page | 12
ENCRYPTION AND DECRYPTION
The scope of our project is presently specific.Both the sender and the receiver must
It will provide a more clear and non ambiguous description of the functions.
It uses two different keys (a key pair) for encryption and decryption.These
algorithms are called "public-key" because the encryption key can be made
public. Anyone can use the public key to encrypt a message, butonly the owner
Page | 13
ENCRYPTION AND DECRYPTION
6. SYSTEM DESIGN
Software design sits at the technical kernel of software engineering process and is applied
regardless of the development paradigm and the area of application. Once the system
requirements have been analyzed and specified, system design is the first of the three
technical activities- design, code and test that are required to build and verify s/w. emphasis
is on translating the s/w requirements into design specification. It involves preparing I/P-
O/P specifications, making security and control specification, and preparing a logical and
X Y X
ENCRYPTION DECRYPTION
SENDER(A) RECEIVER(B)
ALGORITHM ALGORITHM
COMPRESSION DECOMPRESSION
Page | 14
ENCRYPTION AND DECRYPTION
Select a
file
Encrypt
Decrypt
Exit
Page | 15