Professional Documents
Culture Documents
Presented by,
Divya G.R.
Gigi P.S.
SethuParvathi C.
CONTENTS
• Problem Definition
• Problem Description
• Software requirements
• Data protection software
• Use case diagram
• Data Flow Diagram
• Applications
• Conclusion
PROBLEM DEFINITION
• Main aim
Develop a cryptosystem for ensuring data security
Used to encrypt or decrypt files , folders or even the drives of a computer system
Scope of the project is not only to meet the needs of an organisation but also on
individual needs
The proposed system achieves the following goals:
Confidentiality: To protect a user's identity or data from being read.
Data integrity: To protect data from being altered.
Authentication: To assure that data originates from a particular party.
PROBLEM DESCRIPTION
• Based on cryptography
• Level 0 DFD
• Software Customization
C
KE ETRI
Y
M
M
SY
Symmetric
IC Decryption
ETR
MM Y
SY KE
User CODE NO Software
Customizatio
n AS
YM
M
KE ETR
Y IC Asymmetric
AS KE
Encryption
YM Y
ME
TR
IC
Asymmetric
Decryption
SOFTWARE CUSTOMIZATION
• Input a secret code number.
• Software performs mathematical calculations and the
result is used to select one of the embedded cryptographic
schemes.
• User should use the same customization code for both
encryption & decryption of a document.
• The sender while sending a cipher text, should
communicate customization code to the receiver.
• Level 1.1 DFD
( Software Customization Module )
DES
Algorithm
AG ION
FL C T
LE
SE
User CODE NO Arithmetic RESULT Algorith Triple
m
SELECTION DES
operations FLAG Algorithm
Selection
SE FL
LE AG
CT
IO
N
Rijndael
Algorithm
SYMMETRIC ENCRYPTION &
DECRYPTION
• The plaintext & the secret key are fed to the
algorithm.
• The plaintext is divided into blocks of bits.
• Each block is again divided and combined with a
sub key and will undergo permutation &
substitution operations to produce the cipher text
• The proposed software uses DES , TripleDES &
Rijandael algorithms for both encryption &
decryption.
Structure Of Encryption Process
64-bit
Plaintext
64-bit key
Phase 1 Initial
Permutation Permuted choice 1
K1
Round 1 Permuted choice 2 Left circular shift
K2
Round 2 Permuted choice 2 Left circular shift
Phase 2
K16
Round 16 Permuted choice 2 Left circular shift
32-bit swap
64-bit Ciphertext
CALCULATION OF F(R,K)
S box substitution
DES,TRIPLE DES AND
RIJANDAEL PARAMETERS
• Level 1.2 DFD
( Symmetric Encryption Module )
Triple DES
File Encryption
Algorithm
PLAIN TEXT
PLAIN TEXT DES CIPHER TEXT Encrypted
User Folder Encryption documents
Algorithm
SYMMETRIC
KEY
Drive
Rijandael
Encryption
Algorithm
• Level 1.3 DFD
( Symmetric Decryption Module )
Triple DES
File Decryption
Algorithm
CIPHER TEXT
DES
CIPHER TEXT PLAIN TEXT Decrypted
User Folder Decryption
documents
Algorithm
SYMMETRIC
KEY
Drive Rijandael
Decryption
Algorithm
ASYMMETRIC ENCRYPTION
AND DECRYPTION
• This feature is added for transferring the
symmetric key & customization code
securely.
• The proposed software uses RSA algorithm
for encryption & decryption.
• RSA algorithm is based on mathematical
techniques rather than on substitution &
permutation.
• Level 1.4 DFD
( Asymmetric Encryption Module )
PUBLIC KEY OF
CLIENT
RSA CIPHER TEXT
User Encrypted keys
Encryption
SYMMETRIC
KEY Algorithm
& CODE NO
• Level 1.5 DFD
( Asymmetric Decryption Module )
Obtain a number
Obtain Password
Obtain Password
Obtain destination
drive Obtain destination
file
Obtain Password
Obtain Password
Obtain destination
drive Obtain destination
folder
Obtain Password
Obtain Password
Obtain public
key
Enter the
code
Obtain private
key
Enter Password
Obtain the
destination file
Enter Password