DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

For more Information Technology Project click here



TABLE OF CONTENTS
TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWLEDGEMENT

TABLE OF CONTENTS

TABLE OF FIGURES      

ABSTRACT

CHAPTER ONE
1.0      INTRODUCTION
1.1      BACKGROUND OF THE STUDY
1.2   STATEMENT OF THE PROBLEM  
1.3   OBJECTIVES OF THE STUDY
1.4   SIGNIFICANCE OF THE STUDY
1.5   LIMITATION OF THE STUDY
1.6      DEFINITION OF TERMS

CHAPTER TWO

2.1      LITERATURE REVIEW

CHAPTER THREE
3.0   RESEARCH METHODOLOGY & SYSTEM
ANALYSIS
3.1   SYSTEM INVESTIGATIONS AND ANALYSIS
3.2   FACT FINDING
3.3   RESEARCH METHODOLOGY
3.4   SOURCE OF DATA
3.5   METHODS OF DATA COLLECTION
3.6   ANALYSIS OF DATA

3.7   SYSTEM ANALYSIS
3.8   CRYPTOGRAPHY KEYS
3.9   SYMMETRIC-KEY CRYPTOGRAPHY
3.10 CIPHERS
3.11 PUBLIC KEY CRYPTOGRAPHY
3.12 MESSAGE SECURITY
3.13 DIGITAL SIGNATURE
3.14 SIGNING THE DIGEST
3.15 KEY MANAGEMENT
3.16 SYMMETRIC KEY DISTRIBUTION
3.17 DESIGN OF THE NEW SYSTEM
3.18 PROPOSAL OF THE NEW SYSTEM
3.19 OBJECTIVES OF THE NEW SYSTEM
3.20 DESIGN OF THE NEW SYSTEM
3.21 THE ALGORITHM
CHAPTER FOUR
4.0   PROGRAMMING,IMPLEMENTATION AND
TEST RUN
4.1   CHOICE OF PROGRAMMING LANGUAGE
4.2   PROGRAM DEVELOPMENT
4.3   CREATING THE SOURCE PROGRAM
4.4   TAKING OUT FOR A TEST RUN
4.5   THE PROGRAM FRAME WORK
4.6   PROGRAM FLOWCHARTS
4.7   PROGRAM IMPLEMENTATION
4.7.1          INTRODUCTION

 CHAPTER FIVE
 5.0      SUMMARY, CONCLUSION, RECOMMENDATION
5.1      SUMMARY
5.2      CONCLUSION
5.3      RECOMMENDATION

BIBLIOGRAPHY
APPENDIX


ABSTRACT
Computer security is a process of protecting computer system and  information from harm and unauthorized use. The most important security tool beyond human integrity used is cryptography. Cryptography is used to hide data from public view and to ensure that the integrity and privacy of any data sent across a network has not been compromised. This project work helps you to understand what cryptography is all about and the procedures used to achieve this aim, it explains the design and implementation of computer security: data encryption and decryption and key hash algorithm. The programming language used in the development of this project is Microsoft C sharp(C#), In this project the researcher achieved all she has in mind in designing this program by making sure that the integrity and the privacy of an individual is not compromise. In conclusion, security in communication and network system have come a long way to ensure that information transmitted between two or more parities involved in a conversation enjoys the benefits of privacy. the researcher suggested that developers and engineers need to research more on computer security in order to provide a stronger security unit on information and data.

 
CHAPTER ONE

1.0        INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets. Hard drives and floppy disks hold many of our secret information..

In the physical world, security is a fairly simple concept. If the locks on your house’s doors and windows are so strong that a thief cannot break in to steal your belongings, the house is secure. For further protection against intruders breaking through the locks, you might have security alarms. Similarly, if someone tries to fraudulently withdraw money from your bank account but the teller asks for identification and ......

For more Information Technology Project click here

___________________________________________________________________________
This is an Undergraduate Thesis and the complete research material plus questionnaire and references can be obtained at an affordable price of N3,000 within Nigeria or its equivalent in other currencies.


INSTRUCTION ON HOW TO GET THE COMPLETE PROJECT MATERIAL

Kindly pay/transfer a total sum of N3,000 into any of our Bank Accounts listed below:
·         Diamond Bank Account:
A/C Name:      Haastrup Francis
A/C No.:         0096144450

·         GTBank Account:
A/C Name:      Haastrup Francis
A/C No.:         0029938679

After payment, send your desired Project Topic, Depositor’s Name, and your Active E-Mail Address to which the material would be sent for downloading (you can request for a downloading link if you don’t have an active email address) to +2348074521866 or +2348066484965. You can as well give us a direct phone call if you wish to. Projects materials are sent in Microsoft format to your mail within 30 Minutes once payment is confirmed.

--------------------------------------------------------
N/B:    By ordering for our material means you have read and accepted our Terms and Conditions


Terms of Use: This is an academic paper. Students should NOT copy our materials word to word, as we DO NOT encourage Plagiarism. Only use as guide in developing your original research work.

Delivery Assurance
We are trustworthy and can never SCAM you. Our success story is based on the love and fear for God plus constant referrals from our clients who have benefited from our site. We deliver project materials to your Email address within 15-30 Minutes depending on how fast your payment is acknowledged by us.

Quality Assurance

All research projects, Research Term Papers and Essays on this site are well researched, supervised and approved by lecturers who are intellectuals in their various fields of study.
Share:

Search for your topic here

See full list of Project Topics under your Department Here!

Featured Post

Article: How to Write a Research Proposal

Most students and beginning researchers do not fully understand what a research proposal means, nor do they understand ...

Popular Posts