Professional Documents
Culture Documents
Newpresentation (DES)
Newpresentation (DES)
ENCRYPTION
STANDARD
ROLE OF ENCRYPTION:
Encryption of data plays a vital role in the real time environment to keep the data
Out of reach of the unauthorised people,such it is not altered and tampered
EXISTING SYSTEM:
The existing system uses a traditional two tier architecture and the system is
Not user friendly .
SOFTWARE REQUIREMENTS:
Operating System
Windows NT/2000 (Client/Server).
Software requirements
Front-end: Java Swings.
Communication Architecture: Database maintenance: Oracle 8i.
HARDWARE REQUIREMENTS:
System Configuration
Pentium III Processor with 700 MHz Clock Speed
128 MB RAM 20 GB HDD,
32 Bit PCI Ethernet Card
SYSTEM DESCRIPTION:
GUI MODULE
SYSTEM DESIGN:
Maintanance of user information and their authorization services
login details.
Message sending service with a prescribed encryption format.
Receiving service at the other end with decryption process
provision to manipulate the concerned information according to
personal use.
Communication channel to the user to communicate with the
registered users.
TO provide authentication and authorization.
DATAFLOW DIAGRAMS:
LEVEL-1 DFD
USER
DEATAILS
USER
ENCRYPTION
REGISTR
ATION
LOGIN
GUI DISPLAYING
SET OF
OPERATIONS
CONNECTION
MANAGER
DECRYPTION
AUTHENTIC
ATION
LEVEL -2 DFDS:
ENCRYPTION
GUI
CONTAINING
DATA FIELD
ENTER
DATA
APPLY KEY
DEFINE
KEY
LOGISTI
C SS
KEY
PLAIN TEXT
PLAIN TEXT
DECRYPTION
GUI CONTAING
DATA FIELD
CIPHER TEXT
RECEIVE
DATA FOR
DECRYPTION
KEY
DEFINE KEY
LOGISTICS
PLAIN TEXT
APPLY KEY
ON
CIPHER TEXT
CONNECTION MANAGER
GUI TO ENTER URL
OF THE SYSTEM
TO CONNECT
NETWORK
STANDARDS
GIVE THE
URL OF
SYSTEM
APPLY
STANDARDS
TO
DATA
GIU FOR
AUTHENTICATION
DISCONNECT
AUTHENTILCATE
DATA
DISCONNECT
AFTER DATA
TRANSFER
User Name
and
Password
Authentication
Server
Authorization
GUI Interface
GUI Interface
File Security
Interface
User
Option1
Option1
Encryption
Encryption
GUI
Option1
Option1
Encryption
Encryption
Security System
File to be
encrypted?
GUI
File
Option1
to be
Encryption
encrypted?
User
Data Flow Diagram for User Specifying File Name and Path
User
File Name
and path
GUI
Encrypted
File & Path
to save?
GUI
File
encrypted
and saved?
User
Data Flow Diagram for User specifying the Path to Save File
User
Path and
File name to
save?
GUI
Data Flow Diagram for Security System to Save File in Specified Path
Security System
Path to save
file
GUI
Data Flow Diagram for Specifying File Name and Path in Security System
GUI
File Name
and path
Security System
Data Flow Diagram for User Interacting with the Interface of Decryption
User
Option2
Decryption
GUI
File to be
decrypted?
GUI
File
Option1
to be
Encryption
decrypted?
User
Data Flow Diagram for Specifying File Name and Path by User
User
File Name
and path
GUI
Data Flow Diagram for Specifying Decrypted File and Path and to Save
Security System
Decrypted
File & Path
to save?
GUI
Data Flow Diagram for Specifying Path to Save the File by User
GUI
Path to save
the file?
User
Path and
File name to
save?
GUI
File
decrypted
and saved?
GUI
Data Flow Diagram for User Interacting with GUI of Connection Manager
User
Option3
Sending a
file
Connection
Manager
Through GUI
destination IP
address
User
User
Through
GUI IP
address
Connection
Manager
Connection
Manager
Encrypted
File
Destination
System
Data Flow Diagram for Specifying Path of the File to Send Destination
User
Path of the
File to send
Connection
Manager
Data Flow Diagram for User Interacting with GUI to Specify Key
User
Option4
Key
Prescription
GUI
User
Option5
Exit
GUI
Data Flow Diagram for Showing the User the Message after existing
gui
Good day
user
ALGORITHM USED:
P-box
S-box
D
E
C 3
O TO
D 8
E
R
E
N
C
O
D
E
R
8
TO
3
DES ALGORITHM:
INITIAL TRANSPOSITION
56
B
I
T
K
E
Y
ITERATION1
ITERATION2
ITERATION 16
32 BIT SWAP
INVERSE TRANSPOSITION
Li-1
Ri-1
32bit
Li
32 bit
ri
UML DIAGRAM
Logs In
File Selection
Encryption
Decryption
send
Column name
Data type
Size
Constraint
Login id
Varchar2
20
Not Null
password
Varchar2
20
Not Null
LOGIN SCREEN
DATABASE CONNECTION
LOGIN MATCH
MAIN SCREEN
FILE SELECTION
KEY ENTERING
CLIENT ADDRESS
INFORMATION
CONCLUSION
The challenge of cryptography is developing a system in which it is impossible to determine the key.
This is accomplished the use of a one-way function. With a one-way function, it is relatively easy to
compute a result given some input values.
The project work done herewith has given a lot of insight into the working of the
Networking-programming environment. The program written for encryption and decryption
using DES Algorithm is tested on several textual files and results are observed.
The program could achieve a better secure transferring of files between the server and
various clients