You are on page 1of 12

File and Text Encryption and Decryption Using

Web Services

INTRODUCTION TO PROJECT
Encryption is the process of transforming information so it is unintelligible to anyone but the intended
recipient. Decryption is the process of transforming encrypted information so that it is intelligible again.
A cryptographic algorithm, also called a cipher, is a mathematical function used for encryption or
decryption. In most cases, two related functions are employed, one for encryption and the other for
decryption.
With most modern cryptography, the ability to keep encrypted information secret is based not
on the cryptographic algorithm, which is widely known, but on a number called a key that must be used
with the algorithm to produce an encrypted result or to decrypt previously encrypted information.
Decryption with the correct key is simple. Decryption without the correct key is very difficult, and in
some cases impossible for all practical purposes.

Symmetric-Key Encryption
With symmetric-key encryption, the encryption key can be calculated from the decryption key and vice
versa. With most symmetric algorithms, the same key is used for both encryption and decryption, as
shown in Figure 1

Figure 1 Symmetric-key encryption

Symmetric-key encryption is effective only if the symmetric key is kept secret by the two parties
involved. If anyone else discovers the key, it affects both confidentiality and authentication. A person
with an unauthorized symmetric key not only can decrypt messages sent with that key, but can encrypt
new messages and send them as if they came from one of the two parties who were originally

using

the key.
Public-Key Encryption
Public-key encryption (also called asymmetric encryption) involves a pair of keys--a public key
and a private key--associated with an entity that needs to authenticate its identity electronically or to
sign or encrypt data.
Figure 2 shows a simplified view of the way public-key encryption works.

Figure 2 Public-key encryption

PURPOSE OF THE PROJECT


The purpose of a key in encryption systems is to ensure privacy by keeping information hidden from
whom it is not intended. There are two types of encryption systems: secret-key and public-key systems.
Encryption is the transformation of data, the plaintext, into a form that is as close to impossible
as possible to read, the ciphetext, without the appropriate knowledge (a key). Its purpose is to ensure
privacy by keeping information hidden from anyone for whom it is not intended, even those who have
access to the encrypted data, the ciphetext.
There are two types of encryption systems: secret-key and public-key systems (see Figure 1). In
secret-key encryption, also referred to as symmetric cryptography, the same key is used for both
encryption and decryption. In a brute-force attack, an N bits long key, which implies 2 N possible keys,
will take 2 N attempts for the hacker to find the correct key. That is, the longer the key is, the longer it
will take for a certain computer to find the correct key among the 2 N possible keys. Besides the key,
there is another factor to determine the interval of a successful brute force attack: the speed of each
test which relies on the speed of the computer and the
On the other hand, in a public-key system, each user has a public key and a private key. The public key
maybe made public while the private key remains secret. Encryption is performed with the one key
while decryption is done with the other. That is, the algorithms are based on the difficulty of factoring
large numbers that are the product of two large prime numbers. One of the most popular public-key
encryption algorithms, the RSA public-key cryptosystem, is a typical factorization based algorithm.

PROBLEM IN EXISTING PROJECT


The existing system has been maintained manually. The system, which has been
maintained manually, had been complex and complicated.
In the existing system file is not transfer encrypt and decrypt
The existing system we can use Encrypted format secure text Data will be loss.
No security Issue.
In the existing system of using public-key cryptography for encryption is speed: there are popular secretkey encryption methods that are significantly faster than any currently available public-key encryption
method. Nevertheless, public-key cryptography can be used with secret-key cryptography to get the
best of both worlds. For encryption, the best solution is to combine public- and secret-key systems in
order to get both the security advantages of public-key systems and the speed advantages of secret-key
systems

PROPOSED SYSTEM
Considering the anomalies in the existing system computerization of the whole activity is
being suggested after initial analysis by the organization.
The proposed system keeps the Username and password of the application server that is in
running and stopped status.
The user who wants to use the system should have login and password. Each activity
carried out by him can be tracked later by using log files. Hence this helps out in error detection
and correction.
In the Proposed system file is transfer encrypt to decrypt format
The Proposed system we can use Encrypted format secure very high.
In this system hackers cant easily access the datas.

ANALYSIS

Service Oriented Architecture

Web services can also be used to implement architecture according to Service-oriented architecture
(SOA) concepts, where the basic unit of communication is a message, rather than an operation. This is
often referred to as "message-oriented" services. SOA Web services are supported by most major
software vendors and industry analysts. Unlike RPC Web services, loose coupling is more likely, because
the focus is on the "contract" that WSDL provides, rather than the underlying implementation details.
In the flexibility of uses the interface has been developed a graphics concepts in mind,
associated through a browser interface. The GUIs at the top level has been categorized as follows
1. Administrative User Interface Design
2. The Operational and Generic User Interface Design
The administrative user interface concentrates on the consistent information that is practically,
part of the organizational activities and which needs proper authentication for the data collection. The
Interface helps the administration with all the transactional states like data insertion, data deletion, and
data updating along with executive data search capabilities.

The operational and generic user interface helps the users upon the system in transactions
through the existing data and required services. The operational user interface also helps the ordinary
users in managing their own information helps the ordinary users in managing their own information in
a customized manner as per the assisted flexibilities
The major inputs and outputs and major functions of the system are follows:

Inputs:

User Can provide his details for registration


Unique user id and password is choose by the user
User Can provide his credentials to log into the system
For image searching user can enter a query the system user interface
User can choose options for image types.
User can choose customizable colors for the images
User can save the retrieved image on the local system disk.

Considering the anomalies in the existing system computerization of the whole activity is
being suggested after initial analysis by the organization.
The proposed system keeps the Username and password of the application server that is in
running and stopped status.
The primary advantage of public-key cryptography is increased security and
convenience: private keys never need to transmitted or revealed to anyone. In a secret-key
system, by contrast, the secret keys must be transmitted ,and there may be a chance that an
enemy can discover the secret keys during their transmission.
typically used to authorize and authenticate the user (command codes are shown in
parentheses)

Web services can also be used to implement architecture according to Service-oriented architecture
(SOA) concepts, where the basic unit of communication is a message, rather than an operation. This is
often referred to as "message-oriented" services. SOA Web services are supported by most major
software vendors and industry analysts. Unlike RPC Web services, loose coupling is more likely, because
the focus is on the "contract" that WSDL provides, rather than the underlying implementation details.

TP for transport) to encode and transmit application data. Consumers of a Web Service do not need to
know anything about the platform, object model, or programming language used to implement the
service; they only need to understand how to send and receive SOAP messages

(HTTP and XML).

ASP.NET Web Services


Web Services are simple and easy to understand. It is possible, in fact, to author a simple application
that surfaces data as XML conforming to the SOAP specification. It would also be relatively
straightforward to build an application capable of receiving SOAP messages over HTTP and deriving
meaningful value out of it. However, just as we use frameworks such as ASP and ASP.NET to build Web
applications, we would much rather use a framework for building Web Services

. HTML
XML

Process Flow of Web services

STUDY OF THE SYSTEM


In the flexibility of uses the interface has been developed a graphics concepts
in mind, associated through a browser interface. The GUIs at the top level has been categorized as
follows
3. Administrative User Interface Design
4. The Operational and Generic User Interface Design
The administrative user interface concentrates on the consistent information that is practically,
part of the organizational activities and which needs proper authentication for the data collection. The
Interface helps the administration with all the transactional states like data insertion, data deletion, and
data updating along with executive data search capabilities.
The operational and generic user interface helps the users upon the system in transactions
through the existing data and required services. The operational user interface also helps the ordinary
users in managing their own information helps the ordinary users in managing their own information in
a customized manner as per the assisted flexibilities

INPUT AND OUTPUT


The major inputs and outputs and major functions of the system are follows:
Inputs:

User Can provide his details for registration


Unique user id and password is choose by the user
User Can provide his credentials to log into the system
For image searching user can enter a query the system user interface
User can choose options for image types.
User can choose customizable colors for the images
User can save the retrieved image on the local system disk.

Registration can be accessed by the system


User id and password is assigned by the users.
User credentials can be verified by the system data base

Based on the user query image can be retrieved.

Outputs:

PROPOSED SYSTEM
Considering the anomalies in the existing system computerization of the whole activity is
being suggested after initial analysis by the organization.
The proposed system keeps the Username and password of the application server that is in
running and stopped status.
Another major advantage of public-key systems is that they can provide a method for
digital signatures. Authentication via secret-key systems requires the sharing of some secret
and sometimes requires trust of a third party as well. As a result, a sender can repudiate a
previously authenticated message by claiming that the shared secret was somehow
compromised of the parties sharing the secret.

PROCESS MODEL USED WITH JUSTIFICATION


ACCESS CONTROL FOR DATA WHICH REQUIRE USER AUTHENTICATION

The following commands specify access control identifiers and they are typically used to
authorize and authenticate the user (command codes are shown in parentheses)

USER NAME (USER)


The user identification is that which is required by the server for access to its file system. This
command will normally be the first command transmitted by the user after the control connections are
made (some servers may require this).

PASSWORD (PASS)
The user identification is that which is required by the server for access to its file system. This
command will normally be the first command transmitted by the user after the control connections are
made (some servers may require this).
Purpose: The main purpose for preparing this document is to give a general insight into
the analysis and requirements of the existing system or situation and for determining the operating
characteristics of the system.
Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the
complete requirement of the system. It is meant for use by the developers and will be the basic during
testing phase. Any changes made to the requirements in the future will have to go through formal
change approval process.

OUT PUT SCREENS

You might also like