Research Methodology
Research Methodology
Research Methodology
H/CS/16/385
Research Methodology COM 325
Introduction
Since times immemorial, the major issues in data communication are security of data to
maintain its confidentiality, proper access control, integrity and availability of data. As soon
as a sensitive message was etched on a clay tablet or written on the royal walls, then it must
have been foremost in the senders mind that the information should not get intercepted and
read by a rival.
Today in the e-age, the need to protect communications from prying eyes is greater than ever
before. Cryptography, the science of encryption plays a central role in mobile phone
The aim of the study is to develop a computer data encryption and decryption systems. The
The significance of the study is that it will provide an effective means to secure data. The
study is also significant in that it will serve as a useful research material for other researchers
The research work is designed to encrypt data and decrypt data only by the authorized user.
Literature Review
Theoretical background
The recent proliferation of powerful and inexpensive encryption technology has given law-
abiding citizens and criminals alike an unprecedented ability to keep their secrets safe. Potent
encryption software is freely available online and even a novice computer user now has the
power to protect her private and confidential data behind a virtually impenetrable wall of
protection. Yet, the spread of encryption has also seriously hindered law enforcement during
Criminals are able to hide incriminating digital evidence in encrypted hard drives and volume
which can make it impossible for investigators to access the data. There is therefore need for
courts to encrypt their data before anyone can have access to them.
Todays technology can be traced back to earliest ciphers, and have grown as a result of
evolution. The initial ciphers were cracked, so new stringer ciphers emerged. Code breakers
set to work on these and eventually found flaws, forcing cryptographers to invent better
was the only type of encryption is use prior to the development of public-key encryption.
Conversional encryption can further be divided into the categories of classical and modern
techniques. The hallmark of the classical techniques is that the cipher or the key to the
Lawal Abimbola A. H/CS/16/385
Research Methodology COM 325
algorithm is shared i.e. known by the party involved in the secured communication. So there
In secret key, the same key is used for both encryption and decryption. In public key
Amrita Sahu et al proposed a new key generation algorithm based on palm print which is
used encryption and decryption of an image. Our scheme allows one party to a secret image
to another party over the open network, even if eavesdroppers listen. This scheme gives
reliable security. They presented an image encryption/decryption scheme based on bit XOR
method in this paper. The salient features of the proposed asymmetry image encryption
Iirfan Landge et.al describes that both color and black & white image of any size saved in
tagged image file format (TIF) can be encrypted & decrypted using Blowfish algorithm.
Histogram of encrypted image is less dynamic and significantly different from the respective
histograms of the original image. Blowfish cannot be broken until an attacker tries 28r+1
Rajan S.Jamgeker et al shows that MREA algorithm is used to encrypt files and transcript
Methodology
Lawal Abimbola A. H/CS/16/385
Research Methodology COM 325
The threat of illegal data access, storage transmission and data security has become
network is proposed to protect them from unauthorized readers and illegal reproduction.
Various means of security networks and systems have been adopted in the past and they have
faced various challenges such as cracking, hacking and attacking of the system.
The purpose of system implementation can be summarized as making the new system
available to a prepared set of users (the deployment), and positioning on-going support and
maintenance of the system within the performing organization (the transition). At a finer level
of details, deploying the system consists of executing all the steps necessary to educate the
users on the use of the new system, placing the newly developed system into production,
confirming that all data required at the start of operations is available and accurate, and
validating that business functions that interact with the system are functioning properly.
Conclusion
After implementing the system in the market its advantages were incomparable to the present
contemporary systems available in the market. The most admirable feature founded was its
simplicity in terms of application to the user but its highly beneficial outputs cant be ignored.
There is always a room for improvement in any software, however efficient the system may
be. The system is flexible enough for future modifications. The system has been factored into
Lawal Abimbola A. H/CS/16/385
Research Methodology COM 325
different modules to make the system adapt to further changes. Every effort has been made to
References
Baker, M. (2005, January). Keeping a Secret. Technology Review, 108(1), 82-83. RetrievedAugust
Bhargav-Spantzel,A., Camenisch, J., Gross, T., & Sommer, D. (2007, October). User centricity:A
taxonomy and open issues. Journal of Computer Security, 15(5), 493-527. RetrievedAugust 2, 2008,
Bohli, J., Gonzlez Vasco, M., & Steinwandt, R. (2007, July). Secure group key establishment
revisited. International Journal of Information Security, 6(4), 243-254. Retrieved August2, 2008,
doi:10.1007/s10207-007-0018-x
Callas,J. (2007, January). The Future of Cryptography. Information Systems Security, 16(1), 15-22.
Fagin, B., Baird, L., Humphries, J., & Schweitzer, D., (2008, January). Skepticism and
Cryptography. Knowledge, Technology & Policy, 20(4), 231-242. Retrieved August 2,2008,
doi:10.1007/s12130-007-9030-8
Webb, W. (2006, July 20). Hack-proof design. (cover story). EDN, 51(15), 46-54.Retrieved August