30-07-2011, 12:16 PM
[attachment=14942]
Abstract
Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered. But sending the large amount of data through the network is also takes lot of time. The File Splitter is software, which tries to alter the originality of the text into some encrypted form and split the encrypted file into user specified size. Then the spitted files can easily send through the network in very less time. The major task of the File splitter is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user. Before decrypting the file the user has to merge the files.
We need to design software, which provides the users with the flexibility of
Sending and receiving files or messages in a secured format. This software design
Includes the encryption and decryption algorithms for converting the normal text to
Cipher text for a secured transfer and splitting the file will make the user to transfer
The files very easily. File Splitter is software, which is used to split the user-
Specifying file according to the user specifying size. It is very difficult to transfer
one big file from one end to another through any media like Internet or small
storage like Floppy, Pen drive etc
Existing System:
In the traditional architecture there existed only the server and the client. In most cases the server was only a data base server that can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system. This makes maintenance expensive. Such clients are called as ‘fat clients’. This also means that every client has to be trained as to how to use the application and even the security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the data has to be transported over the network, which requires a secured format of the transfer method. How to conduct transactions is to be controlled by the client and advanced techniques implementing the cryptographic standards in the executing the data transfer transactions. Present day transactions are considered to be "un-trusted" in terms of security, i.e. they are relatively easy to be hacked. And also we have to consider the transfer the large amount of data through the network will give errors while transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an alternative. Network security in the existing system is the motivation factor for a new system with higher-level security standards for the information exchange.