You are on page 1of 35

DATA

ENCRYPTION
STANDARD

ROLE OF ENCRYPTION:
Encryption of data plays a vital role in the real time environment to keep the data
Out of reach of the unauthorised people,such it is not altered and tampered

AIM OF THE PROJECT:


The Digital Encryption System is a software which tries to alter the originality of
The text into some encrypted form .
The major task of the Digital Encryption System is to provide the user the
Flexibility of passing the information as per the specification and algorithms
Proposed.

EXISTING SYSTEM:
The existing system uses a traditional two tier architecture and the system is
Not user friendly .

LIMITATIONS OF THE EXISTING SYSTEM:


Traditional two tier architecture
Client has to be trained
Platform dependent
No rich GUI
No proper navigation
Lacks Network Security and Standards
Lacks Authorization and Authentication

FEATURES OF THE PROPOSED SYSTEM:


The transactions should take place in a secured format between various
clients
The validation code should be placed on the server and not on the client
so that data transfer takes place between registered users only
The server should identify the type of request (GET/POST) and perform
appropriate action

SOFTWARE REQUIREMENTS:
Operating System
Windows NT/2000 (Client/Server).

Software requirements
Front-end: Java Swings.
Communication Architecture: Database maintenance: Oracle 8i.

HARDWARE REQUIREMENTS:
System Configuration
Pentium III Processor with 700 MHz Clock Speed
128 MB RAM 20 GB HDD,
32 Bit PCI Ethernet Card

SYSTEM DESCRIPTION:

GUI MODULE

AUTHORIZATION AND AUTHENTICATION MODULE

CONNECTION MANAGER MODULE

SECURITY SYSTEM MODULE

SYSTEM DESIGN:
Maintanance of user information and their authorization services
login details.
Message sending service with a prescribed encryption format.
Receiving service at the other end with decryption process
provision to manipulate the concerned information according to
personal use.
Communication channel to the user to communicate with the
registered users.
TO provide authentication and authorization.

DATAFLOW DIAGRAMS:
LEVEL-1 DFD

USER
DEATAILS

USER

ENCRYPTION

REGISTR
ATION

LOGIN

GUI DISPLAYING
SET OF
OPERATIONS

CONNECTION
MANAGER

DECRYPTION
AUTHENTIC
ATION

LEVEL -2 DFDS:
ENCRYPTION
GUI
CONTAINING
DATA FIELD

ENTER
DATA

APPLY KEY

DEFINE
KEY
LOGISTI
C SS

KEY

PLAIN TEXT

PLAIN TEXT

DECRYPTION

GUI CONTAING
DATA FIELD

CIPHER TEXT

RECEIVE
DATA FOR
DECRYPTION

KEY

DEFINE KEY
LOGISTICS

PLAIN TEXT

APPLY KEY
ON
CIPHER TEXT

CONNECTION MANAGER
GUI TO ENTER URL
OF THE SYSTEM
TO CONNECT

NETWORK
STANDARDS

GIVE THE
URL OF
SYSTEM

APPLY
STANDARDS
TO
DATA

GIU FOR
AUTHENTICATION

DISCONNECT

AUTHENTILCATE
DATA

DISCONNECT
AFTER DATA
TRANSFER

LOW LEVEL DFDS


Data Flow Diagram for User Authentication
GUI Interface

User Name
and
Password

Authentication
Server

Data Flow Diagram for Authorization


Authentication
Server

Authorization

GUI Interface

Data Flow Diagram for File Security Interface

GUI Interface

File Security
Interface

User

Data Flow Diagram for User Interacting with GUI Interface of


Encryption
User

Option1
Option1
Encryption
Encryption

GUI

Data Flow Diagram for Encryption Interacting with Security


GUI

Option1
Option1
Encryption
Encryption

Security System

Data Flow Diagram for Security System Interacting with File


Security System

File to be
encrypted?

GUI

Data Flow Diagram for User Interacting with the File


GUI

File
Option1
to be
Encryption
encrypted?

User

Data Flow Diagram for User Specifying File Name and Path
User

File Name
and path

GUI

Data Flow Diagram for Specifying path to Save Encrypted File


Security System

Encrypted
File & Path
to save?

GUI

Data Flow Diagram for Showing the Encrypted File is Saved


GUI

File
encrypted
and saved?

User

Data Flow Diagram for User specifying the Path to Save File
User

Path and
File name to
save?

GUI

Data Flow Diagram for Security System to Save File in Specified Path
Security System

Path to save
file

GUI

Data Flow Diagram for Specifying File Name and Path in Security System
GUI

File Name
and path

Security System

Data Flow Diagram for User Interacting with the Interface of Decryption

User

Option2
Decryption

GUI

Data Flow Diagram for Specifying the File to be Decrypted


Security System

File to be
decrypted?

GUI

Data Flow Diagram for Specifying File to be Decrypted by User


GUI

File
Option1
to be
Encryption
decrypted?

User

Data Flow Diagram for Specifying File Name and Path by User
User

File Name
and path

GUI

Data Flow Diagram for Specifying Decrypted File and Path and to Save

Security System

Decrypted
File & Path
to save?

GUI

Data Flow Diagram for Specifying Path to Save the File by User

GUI

Path to save
the file?

User

Data Flow Diagram for Specifying File Name to Save by User


User

Path and
File name to
save?

GUI

Data Flow Diagram to Display File Decrypted and Saved


Security System

File
decrypted
and saved?

GUI

Data Flow Diagram for User Interacting with GUI of Connection Manager

User

Option3
Sending a
file

Connection
Manager

Data Flow Diagram for Specifying the Destination IP Address


Connection
Manager

Through GUI
destination IP
address

User

Data Flow Diagram for Sending Data Through Connection Manager

User

Through
GUI IP
address

Connection
Manager

Data Flow Diagram for Sending Encrypted File to Destination System

Connection
Manager

Encrypted
File

Destination
System

Data Flow Diagram for Specifying Path of the File to Send Destination
User

Path of the
File to send

Connection
Manager

Data Flow Diagram for User Interacting with GUI to Specify Key

User

Option4
Key
Prescription

GUI

Data Flow Diagram for User to Exit the System

User

Option5
Exit

GUI

Data Flow Diagram for Showing the User the Message after existing
gui

Good day

user

ALGORITHM USED:

DES: DATA ENCRYPTION STANDARD


It is symmetric key algorithm

P-box

S-box

D
E
C 3
O TO
D 8
E
R

E
N
C
O
D
E
R

8
TO
3

DES ALGORITHM:

64 BIT PLAIN TEXT

INITIAL TRANSPOSITION
56
B
I
T
K
E
Y

ITERATION1

ITERATION2

ITERATION 16

32 BIT SWAP

INVERSE TRANSPOSITION

64 BIT CIPHER TEXT

Li-1

Ri-1

Li-1 xor f(Ri-1,Ki)

32bit
Li

32 bit
ri

UML DIAGRAM

HIGH LEVELUSECASE DIAGRAM

Logs In
File Selection
Encryption
Decryption
send

DATABASE (PHYSICAL DESIGN)


LOGIN USER DETAILS:

Column name

Data type

Size

Constraint

Login id

Varchar2

20

Not Null

password

Varchar2

20

Not Null

INTERFACE AND OUTPUT SCREENS

LOGIN SCREEN

DRIVER CONNECTION ERROR

DATABASE CONNECTION

LOGIN MATCH

MAIN SCREEN

FILE SELECTION

KEY ENTERING

CLIENT ADDRESS

MESSAGE SENT SUCCESSFULLY

INFORMATION

CONCLUSION
The challenge of cryptography is developing a system in which it is impossible to determine the key.
This is accomplished the use of a one-way function. With a one-way function, it is relatively easy to
compute a result given some input values.
The project work done herewith has given a lot of insight into the working of the
Networking-programming environment. The program written for encryption and decryption
using DES Algorithm is tested on several textual files and results are observed.
The program could achieve a better secure transferring of files between the server and
various clients

You might also like