Encryption/Decryption Application
Encryption/Decryption Application
Encryption/Decryption Application
Niteesh Kumar1, K.Sameer Kumar2, B.Sanjay kumar3, T.Venkata Ramana4
1,2
Computer Science Department, spoorthy engineering college Professor & Head, Department of CSE, SLCS IET. Abstract This paper presents about Encryption/Decryption application that is able to work with any
type of file; for example: image files, data files, documentation filesetc. The method of encryption is simple enough yet powerful enough to fit the needs of students and staff in a small institution. Our application uses simple key generation method using AES (Advance Encryption Standard) algorithm. The key generation and Encryption are all done by the system itself after clicking the encryption button with transparency to the user. The same encryption key is also used to decrypt the encrypted binary file i.e. Symmetric key encryption is used. Keywords Encryption , Decryption,AES,Security,Files
Introduction Encryption is the most effective way to achieve data security. The process of plaintext and the encrypted data as the cipher text, which is representation of the original data in a different form. Key-based algorithms use an Encryption key to encrypt the message. There are two general categories for key-based Encryption: Symmetric Encryption which uses a single key to encrypt and decrypt the message and Asymmetric Encryption which uses two different keys a public key to encrypt the message, and a private key to decrypt it. Currently, there are several types of key based Encryption algorithms such as: DES, RSA,
Encryption hides the contents of a message in a way that the original information is recovered only through a decryption process. The purpose of Encryption is to prevent unauthorized parties from viewing or
modifying the data. Encryption occurs when the data is passed through some substitute technique, shifting technique, table references or mathematical operations. All those
processes generate a different form of that data. The unencrypted data is referred to as the
IJARAI.COM
JAN/2013
Page 109
IPHV1I20014X
2 25 70
5 62 112
AES is an iterated block cipher with a fixed block length of 128 bits and a variable key length that can be 128, 192 or 256 bits. The algorithm, shown in Figure, passes plain text through a number of round transformations to produce the cipher. The algorithm allows 10, 12, or 14 transformations, depending on the key length. Each round transformation is composed of three distinct transformations, called layers. The first is the non-linear layer, Sub Bytes, which interchanges blocks of bytes within the word. The second is the linear mixing layer (Shift Rows + Mix Columns), and the third is the key addition layer (Add Round key). The transformations are
II. FILE TYPES
There are no limitations of the type of files accepted for encryption in this application, which means any type of a file such as data files, audio files, video files or image files can be encrypted by the application. This is because all the files are encrypted at the binary level. There is also no limitation of the size of the file that can be encrypted using this application, which provides flexibility to the user. The encrypted file can only be opened and viewed after it has been decrypted to its original file using the symmetric encryption key.
III. FEATURES
invertible, allowing the cipher text to be converted back to plain text if one has the key. The approximate time of encryption , decryption and size of encrypted file is in table I. Table I Origina l Encrypte Encryptio Decryptio n time(ms)
The interface of the application is simple enough to be used by any user The encryption is performed simply by choosing any file while decryption is executed by choosing an encrypted file with an appropriate key. The encrypted file is given with a unique extension .SNS which can be easily distinguishable from other files
d size(kb) n time(ms)
Size(kb )
IJARAI.COM
JAN/2013
Page 110
IPHV1I20014X
by snooping about in their hard disk. A person or company may wish to transport to a distant location a computer which contains sensitive information without being
concerned that if the computer is examined en route (e.g. by foreign customs agents) then the
information will be revealed. Two individuals may wish to correspond by email on matters that they wish to keep private and be sure that no-one else is reading their mail. Can be used in small institution such as a small university for lecturers daily use of sending exam files and sensitive material such that the material can be encrypted and the file is sent in one e-mail while the encryption key is sent in another e-mail or via any secure
confidential, records,
medical etc.
salary
records,
Employees will feel safer knowing that these files are encrypted and are not accessible to casual inspection by data entry clerks (who may be bribed to obtain information on someone). Individuals may share working space with others, of whose honour they are not entirely sure, and may wish to make certain that in their absence no-one will find anything
communication channel. Porting this application to different platforms like windows phone , Android , Windows 8 ,etc., Further, providing security to the data while sending an SMS from a phone. The text which is to be sent will be encrypted at source and will
IJARAI.COM
JAN/2013
Page 111
IPHV1I20014X
Figure I
The basic user interface of the application is shown in Figure 1. It allows the user to browse the file which is to be encrypted, the name to be given to the encrypted file. The buttons Encrypt, Decrypt and used for encryption and decryption of the file. Figure 2 shows the browsing of a file using a file dialog. Figure III
IJARAI.COM
JAN/2013
Page 112
IPHV1I20014X
The version of this application is V1.1. Most of the formatting instructions in this document have been developed and compiled using Eclipse and Java as programming language. REFERENCES [1] www.wikipedia.org Figure V [2] www.stackoverflow.com [3] www.way2java.com [4] http://docs.oracle.com/
Figure IV
IJARAI.COM
JAN/2013
Page 113