DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
TABLE OF CONTENTS
TABLE OF FIGURES      
ABSTRACT

CHAPTER ONE
1.0      INTRODUCTION
1.1      BACKGROUND OF THE STUDY
1.2   STATEMENT OF THE PROBLEM  
1.3   OBJECTIVES OF THE STUDY
1.4   SIGNIFICANCE OF THE STUDY
1.5   LIMITATION OF THE STUDY
1.6      DEFINITION OF TERMS

CHAPTER TWO

2.1      LITERATURE REVIEW

CHAPTER THREE
3.0   RESEARCH METHODOLOGY & SYSTEM
ANALYSIS
3.1   SYSTEM INVESTIGATIONS AND ANALYSIS
3.2   FACT FINDING
3.3   RESEARCH METHODOLOGY
3.4   SOURCE OF DATA
3.5   METHODS OF DATA COLLECTION
3.6   ANALYSIS OF DATA
3.7   SYSTEM ANALYSIS
3.8   CRYPTOGRAPHY KEYS
3.9   SYMMETRIC-KEY CRYPTOGRAPHY
3.10 CIPHERS
3.11 PUBLIC KEY CRYPTOGRAPHY
3.12 MESSAGE SECURITY
3.13 DIGITAL SIGNATURE
3.14 SIGNING THE DIGEST
3.15 KEY MANAGEMENT
3.16 SYMMETRIC KEY DISTRIBUTION
3.17 DESIGN OF THE NEW SYSTEM
3.18 PROPOSAL OF THE NEW SYSTEM
3.19 OBJECTIVES OF THE NEW SYSTEM
3.20 DESIGN OF THE NEW SYSTEM
3.21 THE ALGORITHM
CHAPTER FOUR
4.0   PROGRAMMING,IMPLEMENTATION AND
TEST RUN
4.1   CHOICE OF PROGRAMMING LANGUAGE
4.2   PROGRAM DEVELOPMENT
4.3   CREATING THE SOURCE PROGRAM
4.4   TAKING OUT FOR A TEST RUN
4.5   THE PROGRAM FRAME WORK
4.6   PROGRAM FLOWCHARTS
4.7   PROGRAM IMPLEMENTATION
4.7.1          INTRODUCTION 

 CHAPTER FIVE
 5.0      SUMMARY, CONCLUSION, RECOMMENDATION
5.1      SUMMARY
5.2      CONCLUSION
5.3      RECOMMENDATION

BIBLIOGRAPHY
APPENDIX

ABSTRACT
Computer security is a process of protecting computer system and information from harm and unauthorized use. The most important security tool beyond human integrity used is cryptography. Cryptography is used to hide data from public view and to ensure that the integrity and privacy of any data sent across a network has not been compromised. This project work helps you to understand what cryptography is all about and the procedures used to achieve this aim, it explains the design and implementation of computer security: data encryption and decryption and key hash algorithm. The programming language used in the development of this project is Microsoft C sharp(C#), In this project the researcher achieved all she has in mind in designing this program by making sure that the integrity and the privacy of an individual is not compromise. In conclusion, security in communication and network system have come a long way to ensure that information transmitted between two or more parities involved in a conversation enjoys the benefits of privacy. the researcher suggested that developers and engineers need to research more on computer security in order to provide a stronger security unit on information and data.
CHAPTER ONE
1.0        INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets. Hard drives and floppy disks hold many of our secret information..

In the physical world, security is a fairly simple concept. If the locks on your house’s doors and windows are so strong that a thief cannot break in to steal your belongings, the house is secure. For further protection against intruders breaking through the locks, you might have security alarms. Similarly, if someone tries to fraudulently withdraw money from your bank account but the teller asks for identification and ......

For more Information Technology Projects click here
================================================================
Item Type: Project Material  |  Attribute: 76 pages  |  Chapters: 1-5
Format: MS Word  |  Price: N3,000  |  Delivery: Within 30Mins.
================================================================

Share:

No comments:

Post a Comment

Select Your Department

Featured Post

Reporting and discussing your findings

This page deals with the central part of the thesis, where you present the data that forms the basis of your investigation, shaped by the...

Followers