Overview of the system:
In this project Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.
The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a "code," can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer a algorithm that rearranges the data bits in digital signals.
In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm that "undoes" the work of the encryption algorithm. Alternatively, a computer can be used in an attempt to "break" the cipher. The more complex the encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the key.
ncryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to "tap" than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher – that is, the harder it is for unauthorized people to break it – the better, in general. However, as the strength of encryption/decryption increases, so does the cost.
In recent years, a controversy has arisen overso-called strong encryption. This refers to ciphers that are essentially unbreakable without the decryption keys. While most companies and their customers view it as a means of keeping secrets and minimizing fraud, some government’s view strong encryption as a potential vehicle by which terrorists might evade authorities. These governments, including that of the United States, want to set up a key-escrow arrangement. This means everyone who uses a cipher would be required to provide the government with a copy of the key.
Decryption keys would be stored in a supposedly secure place, used only by authorities, and used only if backed up by a court order. Opponents of this scheme argue that criminals could hack into the key-escrow database and illegally obtain, steal, or alter the keys. Supporters claim that while this is a possibility, implementing the key escrow scheme would be better than doing nothing to prevent criminals from freely using encryption/decryption.
Cryptography is one of the most important security technologies which used to secure the data transmission and the data itself. As the time and challenge growth, the cryptography also grows up with variety of encryption techniques and algorithms. Among the algorithms, one of the most popular is the RSA. This thesis concentrates on the study of the PKI concept generally and the RSA algorithm specifically. Furthermore, through this thesis we developed the prototype of chat using Java Programming Language. The development process follows the seven systematic phases of system development life cycle. At the end of the development, the prototype of the application is come out readily to be tested. The prototype only covers the transmitting and receiving chat messages between two parties (client and server).Each message, it should be able to decrypt the cipher text back to the original plaintext. This thesis actually is just a beginning step to discover the PKI system. The PKI system is very complex and complicated. More resource, energy and time are needed to develop a complete PKI system. Hopefully this thesis can be a stepping stone to go further and deeper in the world of information security, focusing on encryption within PKI environment.
The prototype only covers the transmitting and receiving chat messages between two parties (client and server).Each message, it should be able to decrypt the cipher text back to the original plaintext. This thesis actually is just a beginning step to discover the PKI system. The PKI system is very complex and complicated. More resource, energy and time are needed to develop a complete PKI system. Hopefully this thesis can be a stepping stone to go further and deeper in the world of information security, focusing on encryption within PKI environment.
In the existing system, the encrypted key is send with the document .If the key is send with document, any user can view the encrypted document with that key. It means the security provided for the encryption is not handled properly.
And also the Key byte (encrypted key) generate with random byte. Without the user interaction the Key byte is generated.
Some of the drawbacks are:
1. Lack of security
2. Key byte is generated without user interaction
To overcome all the problems in the existing system, we develop an “Encryption -Secure Communication Using Public Key Infrastructure via TCP/IP Network Protocol” to ease the operation.
A system is required which is being capable of elimination all the problems and become useful to users and thus the new system is derived. Here, User can set the byte of key manually.
Some of the benefits are:
1. Security is enhanced in well manner.
2. Users set the byte key manually.
• SYSTEM : Pentium IV 2.4 GHz
• HARD DISK : 40 GB
• RAM : 256 MB
• Operating system : Windows XP Professional
• Technology : Microsoft Visual Studio .Net 2005
• Coding Language : C#
Encryption -Secure Communication Using Public Key Infrastructure via TCP/IP Network Protocol