Select Currency
Translate this page

TACKLING INSURGENCY USING CRYPTOGRAPHY

Format: MS WORD  |  Chapter: 1-5  |  Pages: 77  |  1282 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

TACKLING INSURGENCY USING CRYPTOGRAPHY

 

CHAPTER ONE

INTRODUCTION

1.0   BACKGROUND TO THE STUDY

Communication is an essential key during military conflict. Information concerning the status of their adversary is of great demand and is been passed across either by cell phone, e-mail, fax and etc. This information can be accessed by insurgents if not secured and the country’s information can be exposed. Therefore, information security is of great importance to prevent loss of useful information. Insurgency can be defined as a rebellious movement against an existing government with the aim of overthrowing the government through the use of subversion and armed conflict. One major way insurgents penetrate into a country is by gathering information therefore to tackle insurgency; information has to be secured through the use of cryptography. This method has been used to secure communications over the years. Cryptography is the science of encrypting secret messages and transmitting the message from a sender to the receiver. The sent message can only be decoded by the receiver who has access to the software and must also know the password and encryption key to ensure high rate of security.

1.1   STATEMENT OF THE PROBLEM

Insurgency has really caused destruction, poverty and many individuals have lost their life during this period. Insurgency has become the order of the day; people no longer live peacefully in their homes as a result of fear. In recent time, technologies has grown wide, information can be accessed by different people anywhere and at anytime.  One major challenge in our present world is that communications are not secured. If an attempt is made to transmit a message over a public or private channel and it gets to a wrong hand (an adversary: someone who sees all communications occurring on the channel.) the message would be exposed, tampered with or lost. Therefore the use of cryptography is a very important issue in this present time to avoid data lost and access by other people.

1.2   MOTIVATION OF THE STUDY

Insurgency has brought about destruction, poverty and has endangered so many people’s lives. One major way insurgents penetrate into a country is by gathering essential information about the country before setting their operations. They gather information so as to know how and when to push through with their plans. Insurgency has really caused hazard and fear amongst every citizen in the country: which is actually the motivation behind this study.

1.3   AIM AND OBJECTIVES

The aim of this work is to develop a system which is responsible for encoding and decoding secret messages against insurgents. The system will be developed in such a way that only the user can have access to it and this will be done by the use of a password to ensure high rate of security.

Its objectives include;

i.   To Prevent insurgents from monitoring secret messages in a country

ii.  To secure information from access.

iii. To prevent insurgents from having access to essential information about a country.

1.4   SIGNIFICANCE OF THE STUDY

The primary goal of this work is to encrypt user’s data and provide a security mechanism. Therefore the significant of this study includes:

1. To develop a system that will serve as a means of sending information and secured.

2. The developed system will help the armed-force send secret messages.

3. The system will also be used to hide useful data.

4. This method of sending secret messages will help tackle the fear of insurgents.

1.5   SCOPE OF THE STUDY

This work is basically concerned with the tackling of insurgency by securing information through the use of cryptography. It focuses on data secrecy and integrity, which is to ensure that only those authorized will have access to it.

This work does not go deeply into discussing how insurgents operate in a country. The system will be designed using hash function SHA 256.

1.6   DEFINITION OF TERMS

· Adversary: an opponent.

· Conflict: a violent situation between different people.

· Decryption: to change information that is in code into ordinary language so that it can be understood by anyone.

· Encryption: To put information into a special code especially in order to prevent people from looking at it without authority.

· Information: a comprehensive detail about something.

· Insurgents: group of people rising against an authority.

· Integrity: maintaining and assuring that data can only be modified by those authorized to do that.

· Password: a confidential word or phrase.

· Rebellious: to oppose to the government of a country.

· Secrecy: making sure that nothing is known about something that is being secret.

· Security: the act of protecting a country or something from people.

· Subversion: an act of attacking the authority of a system secretly or indirectly.       

· Tackling: a process of dealing with a difficult problem or situation.

  DOWNLOAD THE COMPLETE PROJECT

TACKLING INSURGENCY USING CRYPTOGRAPHY

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON TACKLING INSURGENCY USING CRYPTOGRAPHY INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Stancy M
Abia State University, Uturu
I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much iprojectmaster, infact, I owe my graduating well today to you guys...
Excellent
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Abdulrazak Bello Marsha
Usman Dan fodio University
It was quite a better guide for project and paper presentation purpoting. Many thanks.
Average
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
Samuel From Ajayi Crowther University
You guys just made life easier for students. Thanks alot iprojectmaster.com
Excellent
Temitayo Ayodele
Obafemi Awolowo University
My friend told me about iprojectmaster website, I doubted her until I saw her download her full project instantly, I tried mine too and got it instantly, right now, am telling everyone in my school about iprojectmaster.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work
Very Good
MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent
Azeez Abiodun
Moshood Abiola polytechnic
I actually googled and saw about iproject master, copied the number and contacted them through WhatsApp to ask for the availability of the material and to my luck they have it. So there was a delay with the project due to the covid19 pandemic. I was really scared before making the payment cause I’ve been scammed twice, they attended so well to me and that made me trust the process and made the payment and provided them with proof, I got my material in less than 10minutes
Very Good
Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
Peace From Unilag
I cried not knowing how to go about my project but the day i searched online and saw iprojectmaster, i called and got my full project in less than 15minutes, i was shocked!
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on TACKLING INSURGENCY USING CRYPTOGRAPHY?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on TACKLING INSURGENCY USING CRYPTOGRAPHY?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for TACKLING INSURGENCY USING CRYPTOGRAPHY, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!