Review Presentation

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

FileCrypter

Developers
– T.Prabaharan
– D.Suresh Kumar

Under the Guidance


Ms.S.Maheswari, M.C.A.
Dept. of B.C.A.
FileCrypter

Hardware Configuration

● Pentium Processor P4
● 256 MB RAM

● 5 MB of HDD space
FileCrypter

Software Configuration

● Windows XP SP-2
● Visual Basic 6

● ADO Library
FileCrypter

Abstract
The System 'FileCrypter' uses
cryptography technique.
System enables user to Encrypt or
Decrypt data/text based on a KEY.
Encryption & Decryption are done
based on Rijndael Algorithm.
FileCrypter

System Details

The System Consists of Two Modules.


● Encryption Module
● Decryption Module
FileCrypter

Encryption Module:
● Three steps are enclosed in this module.
KeyExpansion
Initial Round
Rounds
FileCrypter

1) Key Expansion:
This process involves getting of Round
Keys.
Round keys are keys generated by Key
Cycle process of Rijndael Algorithm.
Key Cycle process takes keys entered by
user as its input.
FileCrypter

2) Initial Expansion:
Each byte is combined with round keys.
Bitwise XOR operation is used to combine
the byte.
This process is so called ADD ROUND
KEY, since addition of round key to data
takes place.
FileCrypter
3) Rounds
Here three steps of process take place to
ENCRYPT.
Sub Bytes- a linear substitution where each
byte is replaced by verifying look up table.
Shift Rows- each row of state is shifted at a
sequence.
Mix Column- operation on column, combing
some bytes in each column.
FileCrypter

Decryption Module:
The decryption process involves three
steps.
Decryption is just a reverse process of
encryption.
It involves Key Expansion, Reverse
Rounding and Key decomposition.
FileCrypter
1) Key Expansion:
– Same as Key Expansion that done in Encryption,
(i.e) Rounding Keys.
2) Reverse Rounding:
– Based on key value the subtraction of bytes from
each column.
– Then rearranging of Rows in the data matrix
takes place.
FileCrypter

– Finally, referring look-up table substitution


performed.
3) Key Decomposition:
– The Key Decomposition is the process of
removing added Round Key from the
data matrix.
– This is the process of retrieval of original
data in the system.

You might also like