DESIGN AND IMPLEMENTATION OF AN ENCRYPTED DATA BASE SYSTEM


DESIGN AND IMPLEMENTATION OF AN ENCRYPTED DATABASE SYSTEM

TABLE OF CONTENT

Title page                                                                                               

Approval page                                                                                         

Dedication                                                                                               

Acknowledgement                                                                                 

Abstract                                                                                                  

Table of content                                                                                     

CHAPTER ONE                                                                                     

INTRODUCTION

1.1 Introduction                                                                                         

1.2 Background of the study

1.3 Statement of the study

1.4 Objectives of the study

1.5 Scope of the study

1.6 Limitations

1.7 Significance of the study

1.8 Definition of terms

CHAPTER TWO

LITERATURE REVIEW

2.1 INTRODUCTION

2.2 THE CONCEPT OF CRYPTOSECURITY

2.3 CRYPTOGRAPHY

CHAPTER THREE

Description and analysis of the existing system

3.1 General analysis of the existing system

3.2 Method of data collection

3.4 Organisational structure

3.5 Input analysis

3.6 Process Analysis

3.7 Output analysis

3.8 Information flow diagram

3.9 Problems of the existing system

3.10 Justification of the new system

CHAPTER FOUR

SYSTEMS DESIGN

4.1 Design standards

4.2 Output specification

4.3 Input specification and design

4.4 File design

4.5 Procedure  chart

4.6 System flowcharts

4.7 System specification

4.8 Program flowcharts

CHAPTER FIVE

SUMMARY, RECOMMENDATION AND CONCLUSION

5.1 Summary

5.2 Conclusion

5.3 Recommendation

REFERENCES

APPENDICES

Appendix A Welcome page

Appendix B Home page

Appendix C Input forms

Appendix D Output forms

Appendix E Codes

CHAPTER ONE

1.0        INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets. Hard drives and floppy disks hold many of our secret information..

In the physical world, security is a fairly simple concept. If the locks on your house’s doors and windows are so strong that a thief cannot break in to steal your belongings, the house is secure. For further protection against intruders breaking through the locks, you might have security alarms. Similarly, if someone tries to fraudulently withdraw money from your bank account but the teller asks for identification and does not trust the thief’s story, your money is secure. When you sign a contract with another person, the signatures are the legal driving force that impels both parties to honor their word.

In the digital world, security works in a similar way. One concept is privacy, meaning that no one can break into files to read your sensitive data (such as medical records) or steal money (by, for example, obtaining credit card numbers or online brokerage accounts information). Privacy is the lock on the door. Another concept, data integrity, refers to a mechanism that tells us when something has been altered. That’s the alarm. By applying the practice of authentication, we can verify identities. That’s comparable to the ID required to withdraw money from a bank account (or conduct a transaction with an online broker). And finally, non repudiation is a legal driving force that impels people to honor their word.

As the Internet becomes a more pervasive part of daily life, the need for e-security becomes even more critical. Any organization engaged in online activity must assess and manage the e-security risks associated with this activity. Effective use of cryptographic techniques is at the core of many of these risk-management strategies. The most important security tool is cryptography.

1.1    BACKGROUND OF THE STUDY

Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) — conversion of messages from a comprehensible form into an incomprehensible one, and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely, the key needed for decryption of that message). In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, and secure computation, amongst others.

Encryption attempts to ensure secrecy in communications, such as those of spies, military leaders, and diplomats, but it have also had religious applications.

Steganography (i.e., hiding even the existence of a message so as to keep it confidential) was also first developed in ancient times. An early example, from Herodotus, concealed a message - a tattoo on a slave's shaved head - under the regrown hair. More modern examples of steganographyk include the use of invisible ink, microdots, and digital watermarks to conceal information.

1.2    STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker. The choice of data encryption comes next in the minds of those that want reduction of unauthorized access on confidential files or data.

Security provided by the computer operating systems come with a preset super user account and password. The super user may have a password to control network functionality, another to conduct or access nightly backups, create accounts, and so on. For a cracker, logging on to a system as the super user is possibly the best way to collect data or do damage. If the super user has not changed an operating system’s preprogrammed passwords, the network is vulnerable to attack. Most crackers know these passwords, and their first attempt to break into a network is simply to try them. If an attacker cannot log on as the super user, the next best thing might be to figure out the user name and password of a regular user. It is used to be standard practice in most Universities and colleges, and in some commercial companies, to assign every student or employee an account with user name and initial password – the password being the user name. Everyone was instructed to log on and change the password, but often, hackers and crackers logged on before legitimate users had a chance.

1.3    OBJECTIVES OF THE STUDY

a.    To understand and improve the computer data security through encryption of data.

b.    To provide  a means of safeguarding data in a system

c.    To enhance the integrity of data

d.    To facilitate the use of more sopheasted tool against hacking, cracking, bugging of a system.

e.    To develop a platform to complement physical security.

1.4      SIGNIFICANCE OF THE STUDY    

Data security in these contemporary times is a  must. For your secrets to be secure, it may be necessary to add protections not provided by your computer operating systems. The built-in protections may be adequate in some cases. If no one ever tries to break into or steal data from a particular computer, its data will be safe. Or if the intruder has not learned how to get around the simple default mechanisms, they’re sufficient. But many attackers do have the skills and resources to break various security systems. If you decide to do nothing and hope that no skilled cracker targets your information, you may get lucky, and nothing bad will happen.

One of the most important tools for protecting your data from an authorized access is Data Encryption, any of various methods that are used to turn readable files into gibberish. Even if an attacker obtains the contents of the file, it is gibberish. It does not matter whether or not the operating system protections worked.

1.5    LIMITATIONS OF THE STUDY

Technology constraint: The problem encountered here is searching information about computer security through Data Encryption and Key Hash Algorithm and  another problem is since the secret key has to be send to the receiver of the encrypted data, it is hard to securely pass the key over the network to the receiver.

Time constraint: the time giving for the submission of this project work was not  really enough for the researcher to extensively carry out more research on this work.

Financial constraint: there was not enough money to extensively  carry out this work.

1.6    SCOPE OF THE STUDY

Computer Security has been defined as the art of protecting computer system and information from harm and unauthorized use .the most important security tool beyond human integrity used is cryptography. which is used to hide data from public view and to ensure that the integrity and privacy of any data sent across a network is not compromised. cryptography involves encryption and decryption process .the scope of this study covers the message security ,message integrity, user authentication and key management of messages.

1.6    DEFINITION OF TERMS

SECURITY: The set of accesses controls and permission that are used to determine if a server can grant a request for a service or resource from a client.

PASSWORD: An identity that defines an authorized users of a computer in order to access to the system.

SOFTWARE: A collection of computer programs that runs as a group to accomplish a set of objectives which could be referred to as job.

SYSTEM: An organized unit which composed of two or more inter related parts that functions together to achieve a particular goal.

ENCRYPTION: The process of converting ordinary information (plaintext) into unintelligible gibberish (that is, cipher text).

DECRYPTION: The reverse, moving from unintelligible cipher text to plain text.

ALOGRITM: This is a sequential way of solving a problem.

CRYPTOGRAPHY: This is used to hide data from public view and to ensure that the integrity and privacy of any data sent across a network has not been compromised.    

.

DESIGN AND IMPLEMENTATION OF AN ENCRYPTED DATA BASE SYSTEM



TYPE IN YOUR TOPIC AND CLICK SEARCH.






RESEARCHWAP.NET

Researchwap.net is an online repository for free project topics and research materials, articles and custom writing of research works. We’re an online resource centre that provides a vast database for students to access numerous research project topics and materials. Researchwap.net guides and assist Postgraduate, Undergraduate and Final Year Students with well researched and quality project topics, topic ideas, research guides and project materials. We’re reliable and trustworthy, and we really understand what is called “time factor”, that is why we’ve simplified the process so that students can get their research projects ready on time. Our platform provides more educational services, such as hiring a writer, research analysis, and software for computer science research and we also seriously adhere to a timely delivery.

TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

    Hilary Yusuf, United States International University Africa, Nairobi, Kenya.
  • "Researchwap.net is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "researchwap.net" and God bless you and your business! ."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

    Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.
  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing researchwap.com.