+ All Categories
Home > Documents > File and Text Encryption and Decryption Using Web Services(Synopsis)

File and Text Encryption and Decryption Using Web Services(Synopsis)

Date post: 02-Jun-2018
Category:
Upload: sanjaykumarguptaa
View: 224 times
Download: 0 times
Share this document with a friend

of 12

Transcript
  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    1/12

    File and Text Encryption and Decryption Using

    Web Services

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    2/12

    INTRODUCTION TO PROJECT

    Encryption is the process of transforming information so it is unintelligible to anyone but the intended

    recipient. Decryption is the process of transforming encrypted information so that it is intelligible again.

    A cryptographic algorithm, also called a cipher, is a mathematical function used for encryption or

    decryption. In most cases, two related functions are employed, one for encryption and the other for

    decryption.

    With most modern cryptography, the ability to keep encrypted information secret is based not

    on the cryptographic algorithm, which is widely known, but on a number called a keythat must be used

    with the algorithm to produce an encrypted result or to decrypt previously encrypted information.

    Decryption with the correct key is simple. Decryption without the correct key is very difficult, and in

    some cases impossible for all practical purposes.

    Symmetric-Key Encryption

    With symmetric-key encryption,the encryption key can be calculated from the decryption key and vice

    versa. With most symmetric algorithms, the same key is used for both encryption and decryption, as

    shown inFigure 1

    Figure 1 Symmetric-key encryption

    Symmetric-key encryption is effective only if the symmetric key is kept secret by the two parties

    involved. If anyone else discovers the key, it affects both confidentiality and authentication. A person

    with an unauthorized symmetric key not only can decrypt messages sent with that key, but can encrypt

    new messages and send them as if they came from one of the two parties who were originally using

    the key.

    Public-Key Encryption

    Public-key encryption(also called asymmetric encryption) involves a pair of keys--a public key

    and a private key--associated with an entity that needs to authenticate its identity electronically or to

    sign or encrypt data.

    Figure 2 shows a simplified view of the way public-key encryption works.

    http://docs.sun.com/source/816-6154-10/contents.htm#1043591http://docs.sun.com/source/816-6154-10/contents.htm#1007213http://docs.sun.com/source/816-6154-10/contents.htm#1007213http://docs.sun.com/source/816-6154-10/contents.htm#1043591
  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    3/12

    Figure 2 Public-key encryption

    PURPOSE OF THE PROJECT

    The purpose of a key in encryption systems is to ensure privacy by keeping information hidden from

    whom it is not intended. There are two types of encryption systems: secret-key and public-key systems.

    Encryption is the transformation of data, the plaintext,into a form that is as close to impossible

    as possible to read, the ciphetext,without the appropriate knowledge (a key). Its purpose is to ensure

    privacy by keeping information hidden from anyone for whom it is not intended, even those who have

    access to the encrypted data, the ciphetext.

    There are two types of encryption systems: secret-key and public-key systems (see Figure 1). In

    secret-key encryption, also referred to as symmetric cryptography, the same key is used for both

    encryption and decryption. In a brute-force attack, an N bits long key, which implies 2 N possible keys,

    will take 2 N attempts for the hacker to find the correct key. That is, the longer the key is, the longer it

    will take for a certain computer to find the correct key among the 2 N possible keys. Besides the key,

    there is another factor to determine the interval of a successful brute force attack: the speed of each

    test which relies on the speed of the computer and the

    On the other hand, in a public-key system, each user has a public key and a private key. The public key

    maybe made public while the private key remains secret. Encryption is performed with the one key

    while decryption is done with the other. That is, the algorithms are based on the difficulty of factoring

    large numbers that are the product of two large prime numbers. One of the most popular public-key

    encryption algorithms, the RSA public-key cryptosystem, is a typical factorization based algorithm.

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    4/12

    PROBLEM IN EXISTING PROJECT

    The existing system has been maintained manually. The system, which has been

    maintained manually, had been complex and complicated.

    In the existing system file is not transfer encrypt and decrypt

    The existing system we can use Encrypted format secure text Data will be loss.

    No security Issue.

    In the existing system of using public-key cryptography for encryption is speed: there are popular secret-

    key encryption methods that are significantly faster thanany currently available public-key encryptionmethod. Nevertheless, public-key cryptography can be used with secret-key cryptography to get the

    best of both worlds. For encryption, the best solution is to combine public- and secret-key systems in

    order to get both the security advantages of public-key systems and the speed advantages of secret-key

    systems

    PROPOSED SYSTEM

    Considering the anomalies in the existing system computerization of the whole activity is

    being suggested after initial analysis by the organization.

    The proposed system keeps the Username and password of the application server that is in

    running and stopped status.

    The user who wants to use the system should have login and password. Each activity

    carried out by him can be tracked later by using log files. Hence this helps out in error detection

    and correction.

    In the Proposed system file is transfer encrypt to decrypt format

    The Proposed system we can use Encrypted format secure very high.

    In this system hackers cant easily access the datas.

    \

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    5/12

    ANALYSIS

    Service Oriented Architecture

    Web services can also be used to implement architecture according to Service-oriented architecture

    (SOA) concepts, where the basic unit of communication is a message, rather than an operation. This is

    often referred to as "message-oriented" services. SOA Web services are supported by most major

    software vendors and industry analysts. Unlike RPC Web services, loose coupling is more likely, because

    the focus is on the "contract" that WSDL provides, rather than the underlying implementation details.

    In the flexibility of uses the interface has been developed a graphics concepts in mind,

    associated through a browser interface. The GUIs at the top level has been categorized as follows

    1.

    Administrative User Interface Design

    2.

    The Operational and Generic User Interface Design

    The administrative user interface concentrates on the consistent information that is practically,

    part of the organizational activities and which needs proper authentication for the data collection. The

    Interface helps the administration with all the transactional states like data insertion, data deletion, and

    data updating along with executive data search capabilities.

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    6/12

    The operational and generic user interface helps the users upon the system in transactions

    through the existing data and required services. The operational user interface also helps the ordinary

    users in managing their own information helps the ordinary users in managing their own information in

    a customized manner as per the assisted flexibilities

    The major inputs and outputs and major functions of the system are follows:

    Inputs:

    User Can provide his details for registration

    Unique user id and password is choose by the user

    User Can provide his credentials to log into the system

    For image searching user can enter a query the system user interface

    User can choose options for image types.

    User can choose customizable colors for the images

    User can save the retrieved image on the local system disk.

    Considering the anomalies in the existing system computerization of the whole activity is

    being suggested after initial analysis by the organization.

    The proposed system keeps the Username and password of the application server that is in

    running and stopped status.

    The primary advantage of public-key cryptography is increased security and

    convenience: private keys never need to transmitted or revealed to anyone. In a secret-key

    system, by contrast, the secret keys must be transmitted ,and there may be a chance that an

    enemy can discover the secret keys during their transmission.

    typically used to authorize and authenticate the user (command codes are shown in

    parentheses)

    Web services can also be used to implement architecture according to Service-oriented architecture

    (SOA) concepts, where the basic unit of communication is a message, rather than an operation. This isoften referred to as "message-oriented" services. SOA Web services are supported by most major

    software vendors and industry analysts. Unlike RPC Web services, loose coupling is more likely, because

    the focus is on the "contract" that WSDL provides, rather than the underlying implementation details.

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    7/12

    TP for transport) to encode and transmit application data. Consumers of a Web Service do not need to

    know anything about the platform, object model, or programming language used to implement the

    service; they only need to understand how to send and receive SOAP messages

    (HTTP and XML).

    ASP.NET Web Services

    Web Services are simple and easy to understand. It is possible, in fact, to author a simple application

    that surfaces data as XML conforming to the SOAP specification. It would also be relatively

    straightforward to build an application capable of receiving SOAP messages over HTTP and deriving

    meaningful value out of it. However, just as we use frameworks such as ASP and ASP.NET to build Web

    applications, we would much rather use a framework for building Web Services

    . HTML

    XML

    Process Flow of Web services

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    8/12

    STUDY OF THE SYSTEM

    In the flexibility of uses the interface has been developed a graphics concepts

    in mind, associated through a browser interface. The GUIs at the top level has been categorized as

    follows

    3.

    Administrative User Interface Design

    4.

    The Operational and Generic User Interface Design

    The administrative user interface concentrates on the consistent information that is practically,

    part of the organizational activities and which needs proper authentication for the data collection. The

    Interface helps the administration with all the transactional states like data insertion, data deletion, and

    data updating along with executive data search capabilities.

    The operational and generic user interface helps the users upon the system in transactions

    through the existing data and required services. The operational user interface also helps the ordinary

    users in managing their own information helps the ordinary users in managing their own information in

    a customized manner as per the assisted flexibilities

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    9/12

    INPUT AND OUTPUT

    The major inputs and outputs and major functions of the system are follows:

    Inputs:

    User Can provide his details for registration

    Unique user id and password is choose by the user

    User Can provide his credentials to log into the system

    For image searching user can enter a query the system user interface

    User can choose options for image types.

    User can choose customizable colors for the images

    User can save the retrieved image on the local system disk.

    Outputs:

    Registration can be accessed by the system

    User id and password is assigned by the users.

    User credentials can be verified by the system data base

    Based on the user query image can be retrieved.

    PROPOSED SYSTEM

    Considering the anomalies in the existing system computerization of the whole activity is

    being suggested after initial analysis by the organization.

    The proposed system keeps the Username and password of the application server that is in

    running and stopped status.

    Another major advantage of public-key systems is that they can provide a method fordigital signatures. Authentication via secret-key systems requires the sharing of some secret

    and sometimes requires trust of a third party as well. As a result, a sender can repudiate a

    previously authenticated message by claiming that the shared secret was somehow

    compromised of the parties sharing the secret.

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    10/12

    PROCESS MODEL USED WITH JUSTIFICATION

    ACCESS CONTROL FOR DATA WHICH REQUIRE USER AUTHENTICATION

    The following commands specify access control identifiers and they are typically used to

    authorize and authenticate the user (command codes are shown in parentheses)

    USER NAME (USER)

    The user identification is that which is required by the server for access to its file system. This

    command will normally be the first command transmitted by the user after the control connections are

    made (some servers may require this).

    PASSWORD (PASS)

    The user identification is that which is required by the server for access to its file system. This

    command will normally be the first command transmitted by the user after the control connections are

    made (some servers may require this).

    Purpose:The main purpose for preparing this document is to give a general insight into

    the analysis and requirements of the existing system or situation and for determining the operating

    characteristics of the system.

    Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the

    complete requirement of the system. It is meant for use by the developers and will be the basic during

    testing phase. Any changes made to the requirements in the future will have to go through formal

    change approval process.

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    11/12

    OUT PUT SCREENS

  • 8/10/2019 File and Text Encryption and Decryption Using Web Services(Synopsis)

    12/12


Recommended