DESIGN AND IMPLEMENTATION OF COMPUTERISED ENCRYPTED DATA BASE SYSTEM. A CASE STUDY OF FUGRO NIGERIA LIMITED


Content

 

TABLE OF CONTENT

CHAPTER ONE

1.0       INTRODUCTION

1.1                  BACKGROUND OF THE STUDY

1.2                  STATEMENT OF PROBLEM

1.3                  OBJECTIVES OF THE STUDY

1.4                  SIGNIFICANCE OF THE STUDY

1.5                  SCOPE OF THE STUDY

1.6                  LIMITATION OF THE STUDY

1.7                  DEFINITION OF TERMS

 

 

CHAPTER TWO

2.0      LITERATURE REVIEW

2.1      ENCRYPTION

2.1.1 SOME FORMS OF ENCRYPTION PROTOCOL

2.1.2 TYPES OF ENCRYPTION ALGORITHM

2.1.3  METHODS OF ENCRYPTION ALGORITHM

2.2     THE ADVANCED ENCRYPTION STANDARD (AES)

2.2.1 DESCRIPTION OF THE CIPHER

2.3            DATA ENCRYPTION STANDARD (DES)

2.3.1    DES HISTORY AND CONTROVERSY

2.4      INTERNET ENCRYPTION

2.4.1 ENCRYPTION METHODS

2.5     SYMMETRIC ALGORITHM VS ASYMMETRIC ALGORITHM

2.6     CIPHERS

2.7     CRYPTOGRAPHIC SYSTEM TECHNIQUES

2.8            APPLICATION OF CRYPTOGRAPHY

 

CHAPTER THREE

3.0     RESEARCH METHODOLOGY, ANALYSIS AND DESIGN

3.1     SYSTEM INVESTIGATIONS AND ANALYSIS

3.1.1  FACT FINDING

3.1.2  RESEARCH METHODOLOGY

3.1.3  METHODS OF DATA COLLECTION

3.1.4  ANALYSIS OF DATA

3.2     DESCRIPTION OF THE PRESENT SYSTEM

3.2.1  ANALYSIS OF THE PRESENT SYSTEM

3.3     WEAKNESS / PROBLEMS OF THE PRESENT SYSTEM

3.4     DESIGN OF THE PROPOSED SYSTEM

3.4.1  JUSTIFICATION OF THE PROPOSED SYSTEM

3.4.2  ENCRYPTION ALGORITHM TO BE USED IN DESIGNING THE PROPOSED SYSTEM,

3.6     INPUT SPECIFICATION

3.7     OUTPUT SPECIFICATIONS

3.8     ACTIVITY PROCEDURE

3.8.1  OVERALL DATA FLOW DIAGRAM OF THE PROPOSED SYSTEM

 

CHAPTER FOUR

 

4.0     IMPLEMENTATION AND DOCUMENTATION

4.1     PROGRAM IMPLEMENTATION

4.2     SYSTEM IMPLEMENTATION

4.3     HARDWARE REQUIREMENTS

4.4            SOFTWARE REQUIREMENTS

4.5     PROCEDURE FOR CONVERSION

4.6        PROGRAM DOCUMENTATION

4.6.1  INSIGHT ON THE .NET FRAMEWORK

4.6.2                CHOICE OF PROGRAMMING LANGUAGE (VISUAL BASIC.NET)

4.6.3              HOW TO INSTALL THE SOFTWARE

4.6.4              SOFTWARE TESTING

 

CHAPTER FIVE

5.0     SUMMARY, CONCLUSION AND RECOMMENDATION

5.1     SUMMARY

5.2     CONCLUSION

5.3     RECOMMENDATION

 

APPENDIX

 PROGRAM SOURCE CODES

 


 

CHAPTER ONE

1.0     INTRODUCTION

Information security is the means of securing data or information from loss, theft, destruction, corruption and unauthorized access. In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. That information can also be stored in computer database, hard drives, floppy disks and other means of data storage. Therefore information security helps to ensure privacy and also protection of personal information.

One of the techniques of one of achieving this purpose is “Cryptography”. Cryptographic techniques have been used to protect information since ancient times, but only individuals and organizations with extraordinary need for confidentiality like the military government had bothered to exert the effort required to implement it. But as time passed and information security grew larger due to everyday businesses, cryptography became one of the most important tools for privacy and also a means of access control or restriction.

One basic topic in cryptography is that of Encryption and Decryption. Encryption is defined as the conversion of information*written, readable text) to an unreadable form called cipher text, which is impossible to read except of those that posses the secret key or appropriate knowledge to decipher the message. Decryption on the other hand is the opposite of Encryption that is the transformation of the cipher text back to its original form. The process of Encryption and Decryption require the use of secret information called the key. Cryptography is one practical means of sending information over an insecure channel. These channels may be computer networks, telephone lines, wireless intercom system, internet, bank ATM etc. the increasing need of using electronic means to store data has extended the need to protect the same data from corruption destruction and unauthorized access. Such information could be banking information, academic information, sensitive database, hospital records, etc.

 

 

 

1.8                                    BACKGROUND OF THE STUDY

Security is a primary issue which means that staffs of Fugro Nigeria Limited need to ensure that any confidential information is kept safe from corruption, destruction, theft and unauthorized access. Transmitting sensitive information such as security of financial data requires a system that can ensure privacy. The reason for using cryptography for storing important information is to protect the confidentiality of information and also to improve productivity, integrity and to prevent unnecessary abuse.

The topic “design and implementation of a secured computer system, using data Encryption and Decryption” is an introduction of a security strategy to safeguard information stored and used by Fugro Nigeria Limited. It is achieved by Encrypting any confidential information put into it, using Encryption mechanism and then applying Decryption mechanism in order to extract the original information.

 

1.9                                    STATEMENT OF PROBLEM

The problem is security; the password method used in almost all commercial operating systems even those deployed in Fugro Nigeria Limited, is probably not very strong against a sophisticated attacker. The choice of data Encryption comes next for the reduction of unauthorized access of confidential files or company data.

 

1.10                               OBJECTIVES OF THE STUDY

1.     The major objective of this study is to produce an Encryption software that will enhance data security in Fugro Nigeria Limited

2.     To highlight the features of information security

3.     To ensure that maximum protection and authentication of information is achieved

4.     To ensure that information access is to only authorized personnel of Fugro Nigeria Limited

5.     To highlight the dangers that may affect information

6.     To help enhance information integrity

7.     Implementation of a new Encryption Algorithm / Technique

8.     To help safeguard against information when transmitting data across channels.

 

1.11                               SIGNIFICANCE OF THE STUDY

Due to the importance of encryption, most organizations have devoted so much effort to device access control measures that will prevent unauthorized persons from getting access to information that does not concern them. The significance of this study is to ensure the confidentiality, accountability, integrity and availability of information security and privacy in Fugro Nigeria Limited

 

1.12                               SCOPE OF THE STUDY

The study is focused on designing an application using encryption and decryption techniques to safeguard the information stored in systems used by Fugro Nigeria Limited in order to improve security and secrecy of company data.

 

1.13                               LIMITATION OF THE STUDY

Limitations encountered during this project study include

-         Poor power supply when developing software

-         Lack of good text and journals on cryptography

-         Inadequate finance

-         Time constraint

 

1.14                               DEFINITION OF TERMS

 

ENCRYPTION:  This is the process of converting ordinary information into unreadable text/ cipher text

 

DECRYPTION:  This is the reverse of encryption, from cipher text to plain text

 

CIPHER:             Algorithm that handles the encryption and decryption process

 

CIPHER TEXT: The unreadable text created after encryption

 

KEY:                   Secret parameter that determines the functional output of the crypto algorithm or cipher

 

ALGORITHM:   A series of well defined steps that can be followed to achieve a task or goal.


Order Complete Project