Design And Implementation Of Encryption System

EMOLE CHUKWUEMEKA ENOCH | 63 pages (13697 words) | Projects

ABSTRACT

This project concerns the design and implementation of data encryption system. In the course of this research, five methods of encryption were adopted. These are the substitution, transposition, exclusive-OR method, rotation and data encryption standard method. The exclusive-OR method made use of two data inputs bits that were allowed to rotate to the left or right. The researcher also developed software program for encryption system. Each of these methods was tested to ensure integrity of data and give authentication to specific parties in order to facilitate non-repudiation thereby preserving the confidentiality of information that may fall into the possession of unauthorized parties, especially users of internet

Overall Rating

0.0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

EMOLE, E (2021). Design And Implementation Of Encryption System. Repository.mouau.edu.ng: Retrieved May 17, 2024, from https://repository.mouau.edu.ng/work/view/design-and-implementation-of-encryption-system-7-2

MLA 8th

ENOCH, EMOLE. "Design And Implementation Of Encryption System" Repository.mouau.edu.ng. Repository.mouau.edu.ng, 05 Jul. 2021, https://repository.mouau.edu.ng/work/view/design-and-implementation-of-encryption-system-7-2. Accessed 17 May. 2024.

MLA7

ENOCH, EMOLE. "Design And Implementation Of Encryption System". Repository.mouau.edu.ng, Repository.mouau.edu.ng, 05 Jul. 2021. Web. 17 May. 2024. < https://repository.mouau.edu.ng/work/view/design-and-implementation-of-encryption-system-7-2 >.

Chicago

ENOCH, EMOLE. "Design And Implementation Of Encryption System" Repository.mouau.edu.ng (2021). Accessed 17 May. 2024. https://repository.mouau.edu.ng/work/view/design-and-implementation-of-encryption-system-7-2

Related Works
Please wait...