Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

FILE ENCRYPTION SYSTEM

PROJECT REPORT

Submitted by

BHUMIT MALVI(ROLL NO 26)


VED KOKANE(ROLL NO. 20)
VINIT MORE(ROLL NO. 32)
To

The Mumbai University

in partial fulfillment of the requirements for second year of degree of

Bachelor of Computer Engineering

Under the guidance of

Mr. Vikrant A. Agaskar

DEPERTMENT OF COMPUTER ENGINEERING

VIDYAVARDHINI’S COLLEGE OF ENGINEERING AND TECHNOLOGY


K. T. MARG, VASAI ROAD (W.) DIST-THANE, PIN:401202

(Affiliated to University of Mumbai )

2019-2020
VIDYAVARDHINI’S COLLEGE OF ENGINEERING AND TECHNOLOGY
K. T. MARG, VASAI ROAD (W.) DIST-THANE, PIN:401202

DEPERTMENT OF COMPUTER ENGINEERING

CERTIFICATE

This is to certify that the project entitled to “file encryption system”is a bonafide work of
“bhumit malvi(26)”,”ved kokane(20)”,”vinit more(32)”submitted to University of Mumbai in
partial fulfilment of the requirements for the award of second year of the degree of “Bachelor of
Engineering” in “Computer Engineering”.

Mr. Vikrant A. Agaskar

Project Guide
ACKNOWLEDGEMENT

It gives us a great pleasure to express our deep sense of gratitude and indebtedness to our guide Mr.
Vikrant A. Agaskar for his valuable support and encouragement throughout the project. We are highly
obliged to him for providing us this opportunity to carry out this idea as a part of curriculum of the subject
Object Oriented Programming Methodology during Semester III and helping us to gain the successful
completion of our Project.

Our special thanks go to the Head of the Department of Computer Engineering of our college, Prof.
Megha Trivedi and to all of the faculties for allowing us to come here and encouraging us constantly to
work hard in this project.

I
ABSTRACT:

File encryption system is a software that uses a specific algorithm to encrypt or


decrypt data inside the specified file into the target file. The program provides the user the
option to select a source file, target file and a 4-digit numeric key. The key is used by the
algorithm to encrypt or decrypt the file. The contents of the target file change according to
the key. Thus, the file can only be encrypted or decrypted by the user and no one else.

The techniques used in the project are

 GUI in Java
 File handling in Java
 EXOR Encryption algorithm

Functionality:

It helps the Administrative department to access the Student's information wherever


required and also update them as and when required along with the images of the respective
documents. The Attendance section can be managed only by the Staff members. The Head of
the respective departments can only access the records but not change them. The records once
updated cannot be manipulated again. Only the Principal and the Dean has the rights to
access each and every department but does not have the permission to change them. The
Principal and the Dean can issue notices whenever required.

2
INDEX

Sr No Topic Page No

1. Problem Definition 4

2. Implementation methodology 4

3. Scope of Project 5

4. Sample Code 5

5. Result 7

6. Conclusion 8

3
Problem Definition

The project aims to create a system to encrypt and decrypt private and sensitive data
by using secure encryption methods. The program provides security to data in a simple and
easy manner. The system will encrypt the files provided by the user according to the key
provided and encrypt it as well as decrypt it.

The interface of the program must be user-friendly whose functioning must be


understood by the users. There should be no confusion or lack of clarity in the user while
handling the software. A ‘Help’ webpage or some mechanism to explain any complex part of
the functioning of the website, if any must be designed. There should be links for proper
navigation between pages. There should also be mechanism to handle situation where a user
cannot remember the functionality of the program.

Implementation methodology
The program is developed on the Object-Oriented Programming language Java. The
development environment used for the program is NetBeans 8.2.

Modules:
1.Source file: -
The first module contains a file selector named source file. This is used for selecting the file
which the user wishes to encrypt or decrypt.

2.Target File: -
The second module is another file selector named Target file. This module is used for
selecting the file in which the user aims to store the encrypted or decrypted file.

3.Key: -
This module gives the user a textbox to enter the key he/she wishes to encrypt or decrypt the
file selected in the first module to the second module.

4.Action buttons: -

4
1.Encypt/decrypt button encrypts/decrypts the source file and stores in the target file upon
user click.

2.Exit button closes the program upon user click.

Scope of project
In the 21st century, due to the increase in the Internet, the threat of cybercrimes has
increased. User data security has been compromised greatly. The need to create safe and
simple security systems has increased. Through this program the user can easily encrypt
his/her data under 3-4 clicks. The system will encrypt the data as well as decrypt it according
to the key entered by the user. Making it user defined reduces the chances of anyone cracking
the key and accessing it’s data.

The encrypted file is nearly impossible to be interpreted in its raw form which makes
this program effective. The program can be used for various purposes ranging from low
sensitive data to high quarantined data. The program is robust and rarely fails to do the
assigned job. The encryption algorithm is simple yet effective. The encryption algorithm can
be updated in the future to make it even more secure.

Sample code

private void EncrryptActionPerformed(java.awt.event.ActionEvent evt) {//GEN-


FIRST:event_EncrryptActionPerformed

int ch,avg=0,e,i;
char[] keey=ke.getPassword();
String output = target1.getText();
String input = source.getText();
for(i=0;i<4;i++)
{
avg=avg+keey[i];
}
avg=avg/4;
FileWriter fw=null;
try
{
fw = new FileWriter(output);

5
} catch (IOException ex) {
System.out.println("an Error occured");
}
FileReader fr=null;
try
{
fr = new FileReader(input);
}
catch (FileNotFoundException fe)
{
System.out.println("File not found");
}

try {
// read from FileReader till the end of file
while ((ch=fr.read())!=-1)
{
e=ch^avg;
fw.write(e);
}
} catch (IOException ex) {
System.out.println("an Error occured");
}
try {
// close the file
fw.close();
} catch (IOException ex) {
Logger.getLogger(login.class.getName()).log(Level.SEVERE, null, ex);
}
try {
fr.close();
} catch (IOException ex) {
Logger.getLogger(login.class.getName()).log(Level.SEVERE, null, ex);
}
ke.setText("");
start();
Progress bar= new Progress();
bar.setVisible(true);

}//GEN-LAST:event_EncrryptActionPerformed

6
Result

This software offers hassle free and simple way to encrypt /decrypt data and
provides security to user data. This is very useful for casual users because of its simple
design and for professional users because of its strong security.
The project takes the idea of a basic function Exor and build over it to create
an efficient and simple system.
The working and flow of the program is easy to understand. The user is only
given a single screen and in a few clicks the user’s demand is fulfilled.
Thus, this project fulfils all the requirements needed to successfully encrypt
or decrypt user data in a safe and secure manner

7
Conclusion

It has been great pleasure for us to work on this project. This project provides
us practical knowledge of creating our own website. It also provides us an experience
of handling all the procedures related to ‘File Encryption System’. Here, we also
handled the files used in the system.
While working on the project, we gained knowledge about various software
used for web development. The project helped to nurture our mindset what thinking is
required to develop a project in a real sense which has application in the real world.
We also got an idea about what problems or hindrances can occur during project
development and discovered ways to tackle them and resolve them. The project also
gave an opportunity for us to work as a team, thus providing us with a useful
experience in working in a project management team.
This project will provide better opportunities in future in developing projects
independently.

8
9

You might also like