0% found this document useful (0 votes)
153 views

Data Encryption and Decription

This document presents a simple encryption and decryption software for general use. It allows users to encrypt messages and files with a provided key for security. The encryption works by converting the original text into random letters. It then demonstrates encrypting and decrypting a sample message. While simple, this approach aims to provide an affordable encryption solution for small organizations. Further improvements could include stronger encryption algorithms and supporting additional file types.

Uploaded by

Kapil Shrestha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
153 views

Data Encryption and Decription

This document presents a simple encryption and decryption software for general use. It allows users to encrypt messages and files with a provided key for security. The encryption works by converting the original text into random letters. It then demonstrates encrypting and decrypting a sample message. While simple, this approach aims to provide an affordable encryption solution for small organizations. Further improvements could include stronger encryption algorithms and supporting additional file types.

Uploaded by

Kapil Shrestha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Data Encryption and

Decryption

Bibek Khanal- THA075BCT016


Kapil Shrestha- THA075BCT022
Sumit Shrestha-THA075BCT0

BCT
IOE,Thapathali Campus.

2019/03/07
Motivation

1. Concern for data privacy.


2. Securing data for small scale organization.
3. A possible stand-alone software usable with minimum
training.
4. Encryption system available in current market are
complex and cannot be used in general encryption.

05/17/2021 2
Objectives

• To help safeguard private data


• To minimize data piracy.
• To maximize data privacy.
• This is simple encryption program and so helps for
common people in general purpose.

05/17/2021 3
Introduction

• This program can be used to encrypt the data, message


or files for security proposes.
• This is recreation of new encryption software for general
usage.
• It is a standalone program that can easily be updated.
• A way to make program affordable to small scale
organizations.
• We created a simpler way to safeguard personal data.

05/17/2021 4
Methodology
Working Method of Encrypt Function

First It asks user either they want to encrypt or decrypt the file
or message then after the selection of encryption option the
following options pop.
>Encrypt file
>Encrypt message
If we select the ‘encrypt message’ the program asks for the
message that they want to encrypt then it asks a key for
encryption and also for decryption. Once it is provided by the
user it displays the original message and the encrypted
message.
If we select ‘encrypt file’ the program asks for file path. After
the path is provided the program encrypts the text in the file
itself
Working Method of Decrypt Function
First it asks user either they want to encrypt or decrypt the file
or message then after the selection of decryption the following
options pop.
>Decrypt file
>Decrypt message
This function asks for encrypted message that they want to
decrypt then it asks for key used for encryption earlier. Once
the key is provided by the user it converts the encrypted
message into original message using the encryption key.
Similarly if the user selects the ‘decrypt file’ the program asks
for file path. After the path is provided the program decrypts
the text in the file itself.
 

05/17/2021 6
Demo with sample Data
Encryption

05/17/2021 7
Decryption

05/17/2021 8
Conclusion

Hence, this cryptography method enables the conduct of


business over the networks using the computer systems in
extremely efficient and effective manner. And moreover, it
ensures the safety of users critical data. And since it is a
simple encryption method which is much easier to use than
other complex encryption systems and it is secure enough
to safeguard the sensitive data of the users.

05/17/2021 9
Further works

We encrypt our data by converting the user input data into


random alphabets. Our system can be made much more
secure by addition of symbols and numeric characters. The
user interface we created can also be refined. This program
only encrypts .txt files. It can be modified to encrypt other
types of files. Our program is case insensitive. It can be
modified to work with upper and lower case characters.

05/17/2021 10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy