You are on page 1of 35

CRYPTOSOFT

Presented by,

Divya G.R.
Gigi P.S.
SethuParvathi C.
CONTENTS
• Problem Definition
• Problem Description
• Software requirements
• Data protection software
• Use case diagram
• Data Flow Diagram
• Applications
• Conclusion
PROBLEM DEFINITION

• Main aim
 Develop a cryptosystem for ensuring data security
 Used to encrypt or decrypt files , folders or even the drives of a computer system
 Scope of the project is not only to meet the needs of an organisation but also on
individual needs
 The proposed system achieves the following goals:
Confidentiality: To protect a user's identity or data from being read.
Data integrity: To protect data from being altered.
Authentication: To assure that data originates from a particular party.
PROBLEM DESCRIPTION
• Based on cryptography

• Implementing cryptographic techniques such as encryption and


description
• Two types of cryptographic schemes

1.Secret key (or symmetric) cryptography

2. Public-key (or asymmetric) cryptography.


• Algorithms used are DES,Triple DES,Rijandael algorithms for message
encryption & decryption and RSA for key encryption and decryption
SOFTWARE
REQUIREMENTS
• The main theme of this project C#.NET
• Database collected from SQL Server 2000
• Extenstion of encrypted file is changed to .cpt
• Environment:Microsoft.NET framework
• User interfaces are designed with simplicity
• High-end performance is maintained.
WHY CRYPTOSOFT???
• Software customization facility
• Drive Encryption facility
• Accurate output is provided
• Excellent performance for ensuring data security
• Helpful to maintain confidential databases
• Simple user interfaces
• Easy implementation
• Low cost hardware requirements
• User friendly
• No need for any maintanence.
WHAT IS CRYPTOGRAPHY???
• Cryptography : from the Greek for “secret writing”
• It is the mathematical “scrambling” of data so that
only someone with the necessary key can
“unscramble” it.
• Secure transmission of private information
• Secure storage of sensitive data
DATA FLOW DIAGRAMS

• Level 0 DFD

PLAIN TEXT CIPHER TEXT


Input Crypto Output
system
ENCRYPTION-
TERMINOLOGY…
SYMMETRIC ENCRYPTION &
DECRYPTION

• Same algorithm with


same key is used for
encryption & decryption.
• Sender & the receiver
must share the algorithm
and the key.
• The key must be kept
secret.
ASYMMETRIC ENCRYPTION AND
DECRYPTION
• Sending keys
securely
• 1 algorithm
-encryption &
decryption + a pair
of keys
• One of the two keys
must be kept secret.
COMBINING SYMMETRIC &
ASYMMETRIC ENCRYPTION
• Each user should have a
pair of keys (public,
private).
• Sender encrypt the
plaintext using the
receivers public key and
send it to the receiver.
• Receiver can decrypt the
cipher text with his
private key.
DATA PROTECTION
SOFTWARE
The proposed software performs the following
tasks.

• Software Customization

• Symmetric Encryption & Decryption

• Asymmetric Encryption & Decryption


• Level 1 DFD Symmetric
( Data Protection Software ) Encryption

C
KE ETRI
Y
M
M
SY
Symmetric
IC Decryption
ETR
MM Y
SY KE
User CODE NO Software
Customizatio
n AS
YM
M
KE ETR
Y IC Asymmetric

AS KE
Encryption

YM Y
ME
TR
IC

Asymmetric
Decryption
SOFTWARE CUSTOMIZATION
• Input a secret code number.
• Software performs mathematical calculations and the
result is used to select one of the embedded cryptographic
schemes.
• User should use the same customization code for both
encryption & decryption of a document.
• The sender while sending a cipher text, should
communicate customization code to the receiver.
• Level 1.1 DFD
( Software Customization Module )

DES
Algorithm

AG ION
FL C T
LE
SE
User CODE NO Arithmetic RESULT Algorith Triple
m
SELECTION DES
operations FLAG Algorithm
Selection

SE FL
LE AG
CT
IO
N
Rijndael
Algorithm
SYMMETRIC ENCRYPTION &
DECRYPTION
• The plaintext & the secret key are fed to the
algorithm.
• The plaintext is divided into blocks of bits.
• Each block is again divided and combined with a
sub key and will undergo permutation &
substitution operations to produce the cipher text
• The proposed software uses DES , TripleDES &
Rijandael algorithms for both encryption &
decryption.
Structure Of Encryption Process
64-bit
Plaintext
64-bit key

Phase 1 Initial
Permutation Permuted choice 1

K1
Round 1 Permuted choice 2 Left circular shift

K2
Round 2 Permuted choice 2 Left circular shift

Phase 2
K16
Round 16 Permuted choice 2 Left circular shift

32-bit swap

Phase 3 Inverse Initial


Permutation

64-bit Ciphertext
CALCULATION OF F(R,K)
S box substitution
DES,TRIPLE DES AND
RIJANDAEL PARAMETERS
• Level 1.2 DFD
( Symmetric Encryption Module )

Triple DES

File Encryption
Algorithm

PLAIN TEXT
PLAIN TEXT DES CIPHER TEXT Encrypted
User Folder Encryption documents
Algorithm
SYMMETRIC
KEY

Drive
Rijandael
Encryption

Algorithm
• Level 1.3 DFD
( Symmetric Decryption Module )

Triple DES

File Decryption
Algorithm

CIPHER TEXT
DES
CIPHER TEXT PLAIN TEXT Decrypted
User Folder Decryption
documents
Algorithm
SYMMETRIC
KEY

Drive Rijandael

Decryption
Algorithm
ASYMMETRIC ENCRYPTION
AND DECRYPTION
• This feature is added for transferring the
symmetric key & customization code
securely.
• The proposed software uses RSA algorithm
for encryption & decryption.
• RSA algorithm is based on mathematical
techniques rather than on substitution &
permutation.
• Level 1.4 DFD
( Asymmetric Encryption Module )

PUBLIC KEY OF
CLIENT
RSA CIPHER TEXT
User Encrypted keys
Encryption
SYMMETRIC
KEY Algorithm
& CODE NO
• Level 1.5 DFD
( Asymmetric Decryption Module )

PRIVATE KEY OF SYMMETRIC KEY


User CLIENT RSA & CODE NO
Decryption Decrypted keys
CIPHER TEXT Algorithm
USE CASE DIAGRAMS
SOFTWARE
CUSTOMIZATION

Obtain a number

Repeat the entry

Press the customize


button
File & Folder Encryption

Obtain source file Obtain source


folder

Obtain destination Obtain destination


file folder

Obtain Password
Obtain Password

Press the Encrypt


Press the Encrypt
button button
Drive Encryption & File
Decryption
Obtain source
drive Obtain source file

Obtain destination
drive Obtain destination
file

Obtain Password
Obtain Password

Press the Encrypt


button Press the decrypt
button
Drive & Folder Decryption
Obtain source
drive Obtain source
folder

Obtain destination
drive Obtain destination
folder

Obtain Password
Obtain Password

Press the decrypt


button Press the decrypt
button
Key Settings & Key
Encryption Enter the key

Obtain public
key

Enter the
code

Obtain private
key

Enter Password

Press generate key


button
Obtain the
destination
folder

Press the encrypt


button
Key Decryption
Obtain the source
file

Obtain the
destination file

Enter Password

Press the Decrypt


button
CONCLUSION
• The primary objective of this system is to protect
confidential documents
• Cryptography helps to store confidential data of any
size
• DES, Triple DES and Rijndael algorithms are fast and
are well suited for performing cryptographic
transformations on large streams of data.
• The implementation and the design will be presented
in the later phases
Thank you!!!

You might also like