Cryptosystem is one of the methods used to maintain security in data transmission. Along with the increase in importance, many methods are found and extended use. Among these methods are methods that only requires a simple mathematical operation, but there is also a method that involves the theory of complex and difficult implementation. Cryptographic methods are used to secure confidential data so that the data is not known to others who are not interested.
Acryptosystemgenerallyperformstwofunctions:encryption anddecryption. Encryption’s fundamental purpose is to ensure privacy and data integrity. Encryption involves converting datafromplaintext(ornormaltext)intociphertext, which makes data unintelligible to any unauthorizedparties.Decryptionreversestheencryptionprocess,restoringthedatatoitsoriginalform. Asystem’susermusthaveauniquekeyinordertosendorreceiveanencryptedmessage.Thestrength ofanencryptionsystemdependsbothuponthestrengthofitsalgorithmand,often,onthelength of the keys used for encryption and decryption. A key is a mathematical value used in conjunction with a cryptographic algorithm. Longer key lengths (that is, more digits) usually mean greater security because therearemorepossiblecombinationsforan unauthorized observer to examine.Ina symmetric (secret- key)cryptosystem,asinglekeyisusedtoperformbothencryptionanddecryption.Asymmetric (public-key) cryptosystems use different keys for encryption and decryption.
Cryptography is one of the methods used to maintain security in data transmission. Along with the increase in importance, many methods are found and extended use. Among these methods are methods that only requires a simple mathematical operation, but there is also a method that involves the theory of complex and difficult implementation.
However, in 2000, precisely in October Rijndael algorithm was selected as a standard algorithm for encryption. Rijndael algorithm is then known as the Advanced Encryption Standard (AES) Benaloh, (2009). The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible others can tap into and alter transmitted data as the number of users that many in a computer network. Therefore, the system of data security and confidentiality of data is one important aspect in the development of the world of telecommunications, especially communications and using computers connected to the network.
Data losses, regulatory compliance and peer pressure are pushing organizations to take action on encryption at a corporate level; many organizations are discovering that it is already being used in small user groups throughout the organization. It can seem that it might be easier to just add encryption to one workgroup, one data type at a time to cope data breaches happening around the organization. Studies suggest that the overwhelming majority of data breaches originate from inside the organization. New research indicates that as breaches occur more often, they also are getting increasingly costly: According to the study, data breach incidents cost great lost to the organization, including losses associated with customer churn and acquisition, represented the most significant component of the cost increase.
One of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. When you consider the millions of electronic messages that traverse the Internet each day, it is easy to see how a well-placed network sniffer might capture a wealth of information that users would not like to have disclosed to unintended readers. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of cryptography, to prevent intruders from being able to use the information that they capture.
This project is aimed at designing a cryptosystem to secure files, folders and other computer resources, and the objectives are to:
The study shall be limited to text encryption in a selected department namely Exams and record Department of The Federal Polytechnic Bauchi whom basically deal with sensitive information that will not be allowed into the hand of a third party and in which altering will post great danger.
However, this project covers encryption of text records handled in the exams and record department of Federal Polytechnic Bauchi.Information this department deals with are very classified information that hold a lot about the participation of students that has gone through one discipline or other in the school that will be referenced in time to come.
On completion of this project, through better understanding of information security and development of a cryptosystem, computer software that shall help to maintain security in data transmission shall be designed and hence improve effectively, confidential and authentic communicate within the department.
The methods used for gathering information for this project work were by research, interview, consulting relevant text books, surfing the internet e.t.c which lead to better understanding of the project and its implementation. The program will be developed using visualstudio.net programming language.