Sie sind auf Seite 1von 5

1.

INTRODUCTION


Introduction to Cryptography:

In the era of information technology, the possibility that the information stored in a persons
computer or the information that are being transferred through network of computers or internet
being read by other people is very high. This causes a major concern for privacy, identity theft,
electronic payments, corporate security, military communications and many others. We need an
efficient and simple way of securing the electronic documents from being read or used by people
other than who are authorized to do it. Cryptography is a standard way of securing the electronic
documents.
SYSTEM ANALYSIS

EXISTING SYSTEM:

Generally, the utilization of the encryption techniques has raises different security issues,
which consisted mostly on how to effectively manage the encryption keys to ensure that
they are safeguarded throughout their life cycle and are protected from unauthorized
disclosure and modification.
Several reasons in the encryption of information over block cipher are observed in terms
of key management, which known as an important issue to the public safety community,
most of these issues addressed the following:
o Difficulties in addressing the security issues regarding encryption key
management;
o Lacks in providing a suitable details about the different threats in terms of
decision makers on the importance of key management;
o Difficulties in generating the suitable recommendations for establishing proper
key management.

PROPOSED SYSTEM:

Sequentially, providing a secure and flexible cryptography mechanism raises the needs
for analyzing and comparing different encryption algorithms for the aim of enhancing the
security during the encryption process.
Hence, this paper suggested a cryptography mechanism in the block cipher by managing
the keys sequentially.
These keys will works dependently for extracting and generating the content relation to
be managed later by the key management that helps to communicate and share sensitive
information.
In particular, the importance of thorough, consistent key management processes among
public safety agencies with interoperable functions cannot be overstated.
This model aims to secure dissemination, loading, saving, and eliminating faults of keys
to make encryption implementations effective.
There are inherent possibilities if suitable key management processes are not
accompanied because of the intricacy of dispensing keys to all block in a certain fashion.
This risk can be meaningfully appeased through sufficient key controls and proper
education on encryption key management.
SYSTEM DESIGN

Data Flow Diagram / Use Case Diagram / Flow Diagram

The DFD is also called as bubble chart. It is a simple graphical
formalism that can be used to represent a system in terms of the input data to
the system, various processing carried out on these data, and the output data
is generated by the system.





Secret data secret data












sender
receiver
Encrypt the data
Decrypt the data
Embed the data

Extract the data

IMPLEMENTATION


Implementation is the stage of the project when the theoretical
design is turned out into a working system. Thus it can be considered to
be the most critical stage in achieving a successful new system and in
giving the user, confidence that the new system will work and be
effective.

The implementation stage involves careful planning, investigation
of the existing system and its constraints on implementation, designing
of methods to achieve changeover and evaluation of changeover
methods.


Main Modules:-

MODULES:

Homophonic Cryptographic IDE
Encryption Module with Key Generation
Decryption Module
System Requirements:

Hardware Requirements:

System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 256 Mb.

Software Requirements:


Operating system :- Windows XP Professional
Front End :- JAVA, Swing(JFC)
Tool :Eclipse 3.3

Das könnte Ihnen auch gefallen