TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
TABLE OF CONTENTS
TABLE OF FIGURES
ABSTRACT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
1.2 STATEMENT OF THE PROBLEM
1.3 OBJECTIVES OF THE STUDY
1.4 SIGNIFICANCE OF THE STUDY
1.5 LIMITATION OF THE STUDY
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.1 LITERATURE REVIEW
CHAPTER THREE
3.0 RESEARCH METHODOLOGY & SYSTEM
ANALYSIS
3.1 SYSTEM INVESTIGATIONS AND ANALYSIS
3.2 FACT FINDING
3.3 RESEARCH METHODOLOGY
3.4 SOURCE OF DATA
3.5 METHODS OF DATA COLLECTION
3.6 ANALYSIS OF DATA
3.7 SYSTEM ANALYSIS
3.8 CRYPTOGRAPHY KEYS
3.9 SYMMETRIC-KEY CRYPTOGRAPHY
3.10 CIPHERS
3.11 PUBLIC KEY CRYPTOGRAPHY
3.12 MESSAGE SECURITY
3.13 DIGITAL SIGNATURE
3.14 SIGNING THE DIGEST
3.15 KEY MANAGEMENT
3.16 SYMMETRIC KEY DISTRIBUTION
3.17 DESIGN OF THE NEW SYSTEM
3.18 PROPOSAL OF THE NEW SYSTEM
3.19 OBJECTIVES OF THE NEW SYSTEM
3.20 DESIGN OF THE NEW SYSTEM
3.21 THE ALGORITHM
CHAPTER FOUR
4.0 PROGRAMMING,IMPLEMENTATION AND
TEST RUN
4.1 CHOICE OF PROGRAMMING LANGUAGE
4.2 PROGRAM DEVELOPMENT
4.3 CREATING THE SOURCE PROGRAM
4.4 TAKING OUT FOR A TEST RUN
4.5 THE PROGRAM FRAME WORK
4.6 PROGRAM FLOWCHARTS
4.7 PROGRAM IMPLEMENTATION
4.7.1 INTRODUCTION
CHAPTER FIVE
5.0 SUMMARY, CONCLUSION, RECOMMENDATION
5.1 SUMMARY
5.2 CONCLUSION
5.3 RECOMMENDATION
BIBLIOGRAPHY
APPENDIX
ABSTRACT
Computer security is a process of protecting computer system and information from harm and unauthorized use. The most important security tool beyond human integrity used is cryptography. Cryptography is used to hide data from public view and to ensure that the integrity and privacy of any data sent across a network has not been compromised. This project work helps you to understand what cryptography is all about and the procedures used to achieve this aim, it explains the design and implementation of computer security: data encryption and decryption and key hash algorithm. The programming language used in the development of this project is Microsoft C sharp(C#), In this project the researcher achieved all she has in mind in designing this program by making sure that the integrity and the privacy of an individual is not compromise. In conclusion, security in communication and network system have come a long way to ensure that information transmitted between two or more parities involved in a conversation enjoys the benefits of privacy. the researcher suggested that developers and engineers need to research more on computer security in order to provide a stronger security unit on information and data.
CHAPTER ONE
1.0 INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets. Hard drives and floppy disks hold many of our secret information..
================================================================
Item Type: Project Material | Size: 76 pages | Chapters: 1-5
Format: MS Word | Delivery: Within 30Mins.
================================================================