Professional Documents
Culture Documents
SYSTEM
ABSTRACT
EXISTING SYSTEM
DRAWBACKS
Since the actual processing of the data takes place on the remote
client the data has to be transported over the network, which
requires a secured format of the transfer method. How to conduct
transactions is to be controlled by the client and advanced
techniques implementing the cryptographic standards in the
executing the data transfer transactions. Present day transactions
are considered to be "un-trusted" in terms of security, i.e. they are
relatively easy to be hacked. Nevertheless,sensitive data transfer
is to be carried out even if there is lack of an alternative.
PROPOSED SYSTEM
ADVANTAGES
information
such
as
User
authorization
and
Memory Requirements
128MB
Processor Specifications
686 MHz
50 MB
Operating System
Screen Resolution
Programming Language
MODULES
Encrypt
Decrypt
Send
Information
ENCRYPT
This accepts the location of the file with its name to be encrypted.
It also takes the key. This buttons connects to the algorithm
implementation and gives an encrypted format (cipher text) of the
original file. Then it accepts the location of the file to be stored. If
the system finds the given location of the file then it executes
successfully, otherwise the system shoots the error to client giving
invalidity of mentioned file.
DECRYPT
This button when activated accepts the file path and its name,
which needs to be decrypted. The input must be an encrypted file.
If a wrong path is entered then the system directs the client with
path mismatch error. The correct path takes the location of the
decrypted file to be stored.
SEND
INFORMATION
SYSTEM DESIGN
SEQUENCE DIAGRAM
COMPONENT DIAGRAM
CLASS DIAGRAM
ACTIVITY DIAGRAM
CONCLUSION
The entire project has been developed and implemented as per the
requirements stated by the user, it is found to be bug free as per
the testing standards that is implemented.
Any specification-