Home / Mass communication / File encryption and hash system using advanced encryption system

File encryption and hash system using advanced encryption system

 

Table Of Contents


Chapter ONE

1.1 Introduction
1.2 Background of Study
1.3 Problem Statement
1.4 Objective of Study
1.5 Limitation of Study
1.6 Scope of Study
1.7 Significance of Study
1.8 Structure of the Research
1.9 Definition of Terms

Chapter TWO

2.1 Overview of Encryption Systems
2.2 History of Encryption
2.3 Types of Encryption Algorithms
2.4 Applications of Encryption in Modern Technology
2.5 Advantages and Disadvantages of Encryption
2.6 Encryption Standards
2.7 Comparison of Different Encryption Techniques
2.8 Encryption in Data Security
2.9 Challenges in Implementing Encryption
2.10 Future Trends in Encryption Technology

Chapter THREE

3.1 Research Design
3.2 Data Collection Methods
3.3 Sampling Techniques
3.4 Research Instruments
3.5 Data Analysis Methods
3.6 Ethical Considerations
3.7 Validity and Reliability
3.8 Limitations of Research Methodology

Chapter FOUR

4.1 Data Analysis and Interpretation
4.2 Findings of the Study
4.3 Comparison with Existing Literature
4.4 Implications of the Findings
4.5 Recommendations for Practice
4.6 Recommendations for Further Research
4.7 Practical Applications of the Findings
4.8 Future Directions for Research

Chapter FIVE

5.1 Summary of Findings
5.2 Conclusion
5.3 Contributions to Knowledge
5.4 Practical Implications
5.5 Recommendations
5.6 Areas for Future Research
5.7 Reflections on the Research Process
5.8 Conclusion and Final Thoughts

Thesis Abstract

Abstract
This research project focuses on developing a file encryption and hash system utilizing advanced encryption techniques to enhance data security. The primary objective is to create a robust system that can encrypt files effectively while also generating secure hash values for data integrity verification. The project will explore various advanced encryption algorithms such as AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman) to ensure data confidentiality and integrity. The proposed system will offer users the ability to encrypt files of any format, ensuring that sensitive information remains protected from unauthorized access. Additionally, the system will incorporate a hash function to generate unique hash values for each file, allowing users to verify the integrity of their data. By combining encryption and hashing techniques, the system aims to provide a comprehensive approach to securing files against cyber threats. Furthermore, the project will implement key management strategies to securely store and manage encryption keys, ensuring that only authorized users can decrypt the files. This will involve developing a key generation and distribution mechanism that follows best practices in encryption key management. To evaluate the performance and security of the system, extensive testing will be conducted to measure encryption speed, file size overhead, and resistance to attacks. Various test scenarios will be designed to assess the system's ability to withstand common cryptographic attacks such as brute force and known plaintext attacks. Overall, the research project aims to contribute to the field of data security by developing an advanced file encryption and hash system that leverages state-of-the-art encryption techniques. By providing users with a secure and efficient means of protecting their files, the system has the potential to enhance data privacy and integrity in both personal and professional settings. This project's findings will be valuable for individuals and organizations seeking to implement robust data security measures, especially when dealing with sensitive or confidential information. The proposed system has the potential to address the growing concerns surrounding data breaches and cyber threats by offering a comprehensive solution for file encryption and data integrity verification.

Thesis Overview

1.0. Introduction
Due to increasing use of computers, security of digital information is most important issue. An Intruder is an unwanted person who reads and changes the information while transmission occurs. This activity of intruder is called intrusion attack. To avoid such attack data may be encrypted to some formats that is unreadable by an unauthorized person. Advanced Encrption System is mainly an advance version of Data Encryption Standard. Efforts towards developing Advanced Encrption System was started by National Institute from January 1997.
Using Cryptography is essential so that the medium of file communication can secured, as its main objective is implementing the public and private key(s) with hash functions or authentication codes or digital signatures. However it provides confidentiality by itself because mostly, the concerning person knows that the message is hidden in what kind of medium (Ali et al., 2011).

1.1 Background of the Study
The most powerful and common approach to countering the threats to network / information security is using Encryption (Ayoub, 1994). Encryption is based on number of substitutions, transpositions we perform on the plaintext, converted plain text is treated as cipher text and a process of converting is called Cryptography (William, 2005). Even though encryption is very powerful among these two, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms with more number of rounds, Keys with more number of bits (Longer keys), secure transmission of keys (Ravindra, 2010).
Information transmission through internet may include sensitive personal data which may be intercepted. Also, there are many applications on the internet and many web sites require the users to fill forms that include sensitive personal information such as telephone numbers, addresses, and credit card information. So, the users may need private and secure communications for many reasons such as protect their confidential information from hackers during it passed over an open channel, so the confidentiality and data integrity are required to protect against unauthorized access and use. Cryptography is a common methods used in today’s world to secure communications of files of different types (Petitcolas, 1999).
Cryptography is meant to enable the confidentiality of communication through an insecure channel that is protected against unauthorized parties, by preventing unauthorized alteration of use (Vaudenay, 2005).
Cryptography is the science of using mathematics to encrypt and decrypt data to keep messages secured by transforming intelligible data form (plaintext) into unintelligible form (ciphertext). The term cryptography has come from the Greek word “kryptós” standing for “hidden” and “gràphin” standing for “writing”. Thus, the proper meaning of cryptography is “hidden writing”. Any cryptosystem consists of plaintext, encryption algorithm, decryption algorithm, Cipher text, and Key. Plaintext is message or data which are in their normal, readable (not encrypted) form. Encryption is the process of converting plaintext to cipher text by using key. Cipher text results from encryption by applying the encryption key on the plaintext. Decryption is the process of retrieving the plaintext back from the cipher text. The Key is used info to control the cryptosystem (cipher system), and it is known by the sender and receiver only (Schneier, 1996). While cryptography is very powerful for securing data; the cryptanalysts could success to break the ciphers by analyzing the contents of cipher text to get back the plaintext (Babu, 2010).

Advanced Encrption System is a symmetric key encryption algorithm, and NIST made a worldwide public call for the algorithm to succeed Data Encryption System. Initially 15 algorithms were selected. After detail analysis they were reduced down to 5 algorithms namely MARS, RC6, Rijndael, Serpent and Twofish. All these algorithms were iterated block ciphers. The all five finalists were determined to be qualified as the algorithm for Advanced Encryption System. After complete analysis Rijndael is selected as the algorithm for Advanced Encryption System (William, 2006).

Rijndael Algorithm can be seen to possess the following features: High security, mathematical soundness, resistance to all known attacks, high encryption speed, worldwide royalty free use, suitability across wide range of hardware and software.
The Rijndael algorithm is a symmetric block cipher that can process data blocks
of 128 bits through the use of cipher keys with lengths of 128, 192, and 256 bits. The Rijndael algorithm was also designed to handle additional block sizes and key lengths.
1.2 Statement of the Problem
Without adequately being able to protect files of varying types and sizes, a lot of harm can be done to individuals and cooperate bodies, who constantly send informations that can be described as being sensitive. With this study, a refined approach will be adopted, which will go a long way in curbing information hijacking and theft.

1.3 Aim and Objectives of the Study
The aim of this study is basically to develop a File Encryption application using Hash System alongside Advanced Encryption System, to better protect sensitive files.
The specific objectives are:
To elaborate on the process of cryptography.
To elaborate on types of Hash systems.
To elaborate on the types of encryptions available.
To elaborate on the importance of Advanced Encryption system

1.4 Scope and Limitation
This research work titled File Encryption And Hash System Using Advanced Encryption System focuses on the use of hash system in conjunction with advanced encryption system, for file encryption in other to protect information’s. This study is limited to digital files protection.
1.5 Significance of the Study
To help digital device users to better protect their sensitive files.
To help protect top government and companies files from.
To elaborate on the ways files can be protected using advanced encryption

1.6 Definition of Terms
Encryption: The process of encoding informations in a form that only the authorized parties can understand.
Cryptography: This is the practice and study of techniques for secure communication.
Hash system: This enables the conversion of a digital document, before it can be encrypted to enhance its security.
Digital File: A collection of data stored in a particular format, on computer devices.


Blazingprojects Mobile App

📚 Over 50,000 Research Thesis
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Thesis-to-Journal Publication
🎓 Undergraduate/Postgraduate Thesis
📥 Instant Whatsapp/Email Delivery

Blazingprojects App

Related Research

Mass communication. 3 min read

The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry...

The project titled "The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry" aims to explore and analyze the influence of s...

BP
Blazingprojects
Read more →
Mass communication. 4 min read

Analysis of the Impact of Social Media Influencers on Brand Engagement in the Beauty...

The research project, titled "Analysis of the Impact of Social Media Influencers on Brand Engagement in the Beauty Industry," aims to investigate and ...

BP
Blazingprojects
Read more →
Mass communication. 3 min read

The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry: ...

Research Overview: The project titled "The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry: A Case Study" aims to inve...

BP
Blazingprojects
Read more →
Mass communication. 3 min read

The Impact of Social Media Influencers on Consumer Purchasing Behavior in the Beauty...

The research project titled "The Impact of Social Media Influencers on Consumer Purchasing Behavior in the Beauty Industry" aims to investigate the si...

BP
Blazingprojects
Read more →
Mass communication. 3 min read

The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry...

"The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry" is a research project aimed at exploring the profound influence t...

BP
Blazingprojects
Read more →
Mass communication. 3 min read

The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry...

The project titled "The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry" aims to explore the significant influence that...

BP
Blazingprojects
Read more →
Mass communication. 3 min read

Exploring the Impact of Social Media Influencers on Consumer Behavior in the Fashion...

Research Overview: Title: Exploring the Impact of Social Media Influencers on Consumer Behavior in the Fashion Industry Introduction: The fashion industry has...

BP
Blazingprojects
Read more →
Mass communication. 3 min read

The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry...

The project titled "The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry" aims to explore and analyze the significant in...

BP
Blazingprojects
Read more →
Mass communication. 2 min read

The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry....

The Impact of Social Media Influencers on Consumer Behavior in the Beauty Industry is a comprehensive research study that aims to explore and analyze the influe...

BP
Blazingprojects
Read more →
WhatsApp Click here to chat with us