Professional Documents
Culture Documents
Review Presentation
Review Presentation
Review Presentation
Developers
– T.Prabaharan
– D.Suresh Kumar
Hardware Configuration
● Pentium Processor P4
● 256 MB RAM
● 5 MB of HDD space
FileCrypter
Software Configuration
● Windows XP SP-2
● Visual Basic 6
● ADO Library
FileCrypter
Abstract
The System 'FileCrypter' uses
cryptography technique.
System enables user to Encrypt or
Decrypt data/text based on a KEY.
Encryption & Decryption are done
based on Rijndael Algorithm.
FileCrypter
System Details
Encryption Module:
● Three steps are enclosed in this module.
KeyExpansion
Initial Round
Rounds
FileCrypter
1) Key Expansion:
This process involves getting of Round
Keys.
Round keys are keys generated by Key
Cycle process of Rijndael Algorithm.
Key Cycle process takes keys entered by
user as its input.
FileCrypter
2) Initial Expansion:
Each byte is combined with round keys.
Bitwise XOR operation is used to combine
the byte.
This process is so called ADD ROUND
KEY, since addition of round key to data
takes place.
FileCrypter
3) Rounds
Here three steps of process take place to
ENCRYPT.
Sub Bytes- a linear substitution where each
byte is replaced by verifying look up table.
Shift Rows- each row of state is shifted at a
sequence.
Mix Column- operation on column, combing
some bytes in each column.
FileCrypter
Decryption Module:
The decryption process involves three
steps.
Decryption is just a reverse process of
encryption.
It involves Key Expansion, Reverse
Rounding and Key decomposition.
FileCrypter
1) Key Expansion:
– Same as Key Expansion that done in Encryption,
(i.e) Rounding Keys.
2) Reverse Rounding:
– Based on key value the subtraction of bytes from
each column.
– Then rearranging of Rows in the data matrix
takes place.
FileCrypter