Data Encryption and Decription

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

Data Encryption and

Decryption

Bibek Khanal- THA075BCT016


Kapil Shrestha- THA075BCT022
Sumit Shrestha-THA075BCT0

BCT
IOE,Thapathali Campus.

2019/03/07
Motivation

1. Concern for data privacy.


2. Securing data for small scale organization.
3. A possible stand-alone software usable with minimum
training.
4. Encryption system available in current market are
complex and cannot be used in general encryption.

05/17/2021 2
Objectives

• To help safeguard private data


• To minimize data piracy.
• To maximize data privacy.
• This is simple encryption program and so helps for
common people in general purpose.

05/17/2021 3
Introduction

• This program can be used to encrypt the data, message


or files for security proposes.
• This is recreation of new encryption software for general
usage.
• It is a standalone program that can easily be updated.
• A way to make program affordable to small scale
organizations.
• We created a simpler way to safeguard personal data.

05/17/2021 4
Methodology
Working Method of Encrypt Function

First It asks user either they want to encrypt or decrypt the file
or message then after the selection of encryption option the
following options pop.
>Encrypt file
>Encrypt message
If we select the ‘encrypt message’ the program asks for the
message that they want to encrypt then it asks a key for
encryption and also for decryption. Once it is provided by the
user it displays the original message and the encrypted
message.
If we select ‘encrypt file’ the program asks for file path. After
the path is provided the program encrypts the text in the file
itself
Working Method of Decrypt Function
First it asks user either they want to encrypt or decrypt the file
or message then after the selection of decryption the following
options pop.
>Decrypt file
>Decrypt message
This function asks for encrypted message that they want to
decrypt then it asks for key used for encryption earlier. Once
the key is provided by the user it converts the encrypted
message into original message using the encryption key.
Similarly if the user selects the ‘decrypt file’ the program asks
for file path. After the path is provided the program decrypts
the text in the file itself.
 

05/17/2021 6
Demo with sample Data
Encryption

05/17/2021 7
Decryption

05/17/2021 8
Conclusion

Hence, this cryptography method enables the conduct of


business over the networks using the computer systems in
extremely efficient and effective manner. And moreover, it
ensures the safety of users critical data. And since it is a
simple encryption method which is much easier to use than
other complex encryption systems and it is secure enough
to safeguard the sensitive data of the users.

05/17/2021 9
Further works

We encrypt our data by converting the user input data into


random alphabets. Our system can be made much more
secure by addition of symbols and numeric characters. The
user interface we created can also be refined. This program
only encrypts .txt files. It can be modified to encrypt other
types of files. Our program is case insensitive. It can be
modified to work with upper and lower case characters.

05/17/2021 10

You might also like