www.seminarsonly.com

 

 

Text Encryption And Decryption

Abstract

Cryptosystems, highly technical systems that provide privacy through secret encoding, have been an important part of the electronic information world for many years. These systems are the foundation for all electronic information exchange. For example, financial institutions and banks rely upon cryptography to securely transmit critical and private information over the Internet. Especially now, during the e-commerce explosion, secure and reliable exchange systems are vital for the world's economy.

These cryptosystems protect data by using hardware and software in a process that protects data by performing mathematical operations/algorithms on it. The result is data rendered unintelligible, which is called cipher text. This cipher text is then transmitted over insecure phone lines or networks such as the Internet. If someone intercepts this cipher text, it is indecipherable and meaningless to him or her. When the cipher text reaches its final destination, it can be decrypted into the original state of the data.

SOFTWARE REQUIREMENTS:-

  • Operating System : Windows 2000/xp
  • Jdk 1.5.0;

HARDWARE REQUIREMENTS:-

 

  • Processor : Pentium III/AMD Athlone XP
  • RAM : 128 MB
  • Hard disk : 20 GB
  • FDD : 1.44MB
  • Monitor : 14 inch
  • Mouse : 3 Button scroll
  • CD Drive : 52 X
  • Keyboard : 108 keys

 

<< back

Related Projects : Online Real Estate Property Management ,Online Recruitment System ,Online Rental House Web Portal ,Online University ,Optimal Channel Access Management with QoS Support for Cognitive Vehicular Networks ,Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks ,Orkut Using Java ,Personal Authentication Based On Iris Recognition ,Planning of Wireless Sensor Networks ,Predicting Missing Items in Shopping Carts ,Project Controller ,Project Scheduler ,Project Tracking ,Promotional Portal ,Random Cast ,Real-Time Detection Of Clone Attacks ,Reality Shows Organization ,Record Tracker ,Remote Administration using Mobile ,Remote PC Administration Using J2ME ,Resilient Online Coverage For Surveillance Applications , Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services ,RITAS: Services For Randomized Intrusion Tolerance ,Route Stability in MANETs under the Random Direction Mobility Model ,Script Identification Through Temporal Sequence Of The Strokes ,Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients ,Secure and Policy-Compliant Source Routing ,Secure Data Transmission , Ship Store System ,Smart Network Profile Manager

 

 

 
Copyright © V2computers 2006 through 2017