DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS


For more Computer Science Project click here
 

TABLE OF CONTENTS
Title Page..........................................................................
Certification…………………………………………………………………………………………….
Dedication…………………………………………………………………………………………………
Acknowledgement…………………………………………………………………………………….
Abstract………………………………………………………………………………………………………

CHAPTER ONE
1.0  Introduction………………………………………………………………………………………
1.1  Background of the study……………………………………………….…………………
1.2  Statement of the problem……………………………………………………………….
1.3  Objectives of the study……………………………………………………………………
1.4  Significance of the study…………………………………………………………………
1.5  Limitation of the study……………………………………………………………………
1.6  Scope of study………………………………………………………………………………….
1.7  Definition of terms……………………………………………………………………………

CHAPTER TWO
2.0  Literature review…………………………………………………………………………….
2.1  The concept of crypto security…………………………………………………….…
2.2  DES – Data Encryption Standard………………………………………………………
2.3  PGP – Pretty Good Privacy…………………………………………………….………..
2.4  DIFFE – Hellman-Merkel Key Exchange……………………………………………
2.5  RSA – Rivest, Shamir and Aldeman………………………………….……………..
2.6  Application of cryptology in private and commercial life…………….

CHAPTER THREE
3.0  Research methodology and system analysis…………………………………..
3.1  System investigation and analysis……………………………………………………
3.2  Fact finding…………………………………………………………….…………………………
3.3  Research methodology……………………………………..………………………………
3.4  Sources of data………………………………………………………………………………...
3.5  Method of data collection……………………………………………………….……….
3.6  Analysis of data………………………………………………………………………………….
3.7  System analysis………………………………………………………………………………….
3.8  Cryptography keys…………………………………………….………………………………
3.9  Symmetric-key cryptography……………………………………………………………
3.10 Ciphers…………………………………………….…………………………………………………
3.11 Public key cryptography……………………………………………………………………
3.12 Public –key certification…….…………………………………………………………….
3.13 Certification authority (CA)..…………………………………………………………..
3.14 Message security………………………………………………………………………………..
3.15 Message privacy…………………………………………………………………………………….
3.16 Privacy with symmetric key cryptography…………………….……………………
3.17 Privacy with public cryptography………………………………………..………………
3.18 Message authentication……………………………………………………………….…………
3.19 Integrity………………………………………………………………………………………………..…
3.20 Non-repudiation or data origin……………………………………………………………..
3.21 Digital Signature……………………………………………………………………………………..
3.22 Signing the digest…………………………………………………………………………………….
3.23 Key management…………………………………………………………………………………….
3.24 Symmetric key distribution…………………………………………………………………….
3.25 Certification authority…………………………………………………………………………….
3.26 Session keys……………………………………………………………………………………………..
3.27 DIFFE-Hellman method…………………………………………………………………………….
3.28 Prerequisites…………………………………………………………………………………………….
3.29 Procedure………………………………………………………………………………………………….
3.30 Design of the new system………………………………………………………………………..
3.31 Proposal of the new system………………………………………………………………….…
3.32 Objectives of the new system…………………………………………………………………
3.33 Design of the new system……………………………………………………………………….
3.34 The algorithm…………………………………………………………………………………………..

CHAPTER FOUR
4.0 System development and implementation…………………………………………….
4.1  Software and plugin installation……………………………………………………………..
4.2  Examining the code………………………………………………………………………………….


CHAPTER FIVE
5.0  Summary……………………………………………………………………………………………….…..
5.1  References………………………………………………………………………………………………….
5.2  Recommendation…………………………………………………………………….………………..
5.3  Source code (appendix)…………………………………………………….………………………
5.4  Conclusion…………………………………………………………………….…………………………...
Bibliography…………………………………………………………….……………………………………


CHAPTER ONE
1.0   INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets. Hard drives and floppy disks hold many of our secret information. In the physical world, security is a fairly simple concept. If the locks on your house’s doors and windows are so strong that a thief cannot break in to steal your belongings, the house is secure. For further protection against intruders breaking through the locks, you might have security alarms. Similarly, if someone tries to fraudulently withdraw money from your bank account but the teller asks for identification and does not trust the thief’s story, your money is secure. When you sign a contract with another person, the signatures are the legal driving force that impels both parties to honor their word.
In the digital world, security works in a similar way. One concept is privacy, meaning that no one can break into files to read your sensitive data (such as medical records) or steal money (by, for example, obtaining credit card numbers or online brokerage accounts information). Privacy is the lock on the door. Another concept, data integrity, refers to a mechanism that tells us when something has been altered. That’s the alarm. By applying the practice of authentication, we can verify identities. That’s comparable to the ID required to withdraw money from a bank account (or conduct a transaction with an online broker). And finally, non repudiation is a legal driving force that impels people to honor their word.
As the Internet becomes a more pervasive part of daily life, the need for e-security becomes even more critical. Any organization engaged in online activity must assess and manage the e-security risks associated with this activity. Effective use of cryptographic techniques is at the core of many of these risk-management strategies. The most important security tool is cryptography.

1.1     BACKGROUND OF THE STUDY
Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) — conversion of messages from a comprehensible form into an incomprehensible one, and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely, the key needed for decryption of that message). In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, and secure computation, amongst others.
Encryption attempts to ensure secrecy in communications, such as those of spies, military leaders, and diplomats, but it have also had religious applications. Steganography (i.e., hiding even the existence of a message so as to keep it confidential) was also first developed in ancient times. An early example, from Herodotus, concealed a message – a tattoo on a slave's shaved head - under the regrown hair. More modern examples of steganography include the use of invisible ink, microdots, and digital watermarks to conceal information.
1.2     STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in the minds of those that want reduction of unauthorized access on confidential files or data. Security provided by the computer operating systems come with a preset super user account and password. The super user may have a password to control network functionality, another to conduct or access nightly backups, create accounts, and so on. For a cracker, logging on to a system as the super user is possibly the best way to collect data or do damage. If the super user has not changed an operating system’s preprogrammed passwords, the network is vulnerable to attack. Most crackers know these passwords, and their first attempt to break into a network is simply to try them. If an attacker cannot log on as the super user, the next best thing might be to figure out the user name and password of a regular user. It is used to be standard practice in most Universities and colleges, and in some commercial companies, to assign every student or employee an account with user name and initial password – the password being the user name. Everyone was instructed to log on and change the password, but often, hackers and crackers logged on before legitimate users had a chance.


For more Computer Science Project click here


___________________________________________________________________________
This is an Undergraduate Thesis and the complete research material plus questionnaire and references can be obtained at an affordable price of N3,000 within Nigeria or its equivalent in other currencies.


INSTRUCTION ON HOW TO GET THE COMPLETE PROJECT MATERIAL

PAYMENT  OPTION 1:
Kindly pay a total sum of N3,000 into any of our Bank Accounts listed below:
·         Skye Bank Account:
A/C Name:      Haastrup Damilola
A/C No.:         1013708342

·         GTBank Account:
A/C Name:      Haastrup Francis
A/C No.:         0029938679
After payment, send your desired Project Topic, Depositor’s Name, Teller No., and your Active E-Mail Address to which the material would be sent for downloading (you can request for a downloading link if you don’t have an active email address) to +2348074521866 or +2348066484965. You can as well give us a direct phone call if you wish to. Projects materials are sent in Microsoft format to your mail within 30 Minutes once payment is confirmed.


PAYMENT  OPTION 2:
You can make an online payment here for this material:

After a successful Online Web Payment, kindly Click Here to fill the “Payment Details Form”

--------------------------------------------------------
N/B:    By ordering for our material means you have read and accepted our Terms and Conditions


Terms of Use: This is an academic paper. Students should NOT copy our materials word to word, as we DO NOT encourage Plagiarism. Only use as guide in developing your original research work.

Delivery Assurance
We are trustworthy and can never SCAM you. Our success story is based on the love and fear for God plus constant referrals from our clients who have benefited from our site. We deliver project materials to your Email address within 15-30 Minutes depending on how fast your payment is acknowledged by us.

Quality Assurance
All research projects, Research Term Papers and Essays on this site are well researched, supervised and approved by lecturers who are intellectuals in their various fields of study.