Select Currency
Translate this page

DESIGNED TO ENCRYPT DATA AND DECRYPT COURT DATA ONLY BY THE AUTHORIZED USER

Format: MS WORD  |  Chapter: 1-5  |  Pages: 70  |  767 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

DESIGNED TO ENCRYPT DATA AND DECRYPT COURT DATA ONLY BY THE AUTHORIZED USER

 

CHAPTER ONE

INTRODUCTION

1.0 Introduction

Since times immemorial, the major issue in data communication are security of data to maintain its confidentiality, proper access control, integrity and availability of data. As soon as a sensitive message was etched on a clay tablet or written on the royal walls, then it must have been foremost in the sender’s mind that the information should  not get intercepted and read by a rival.

Today in the e-age, the need to protect communications from prying eyes is greater than ever before. Cryptography, the science of encryption plays a central role in mobile phone communication, e-commerce, Pay-TV, sending private e-mails, transmitting financial information and touches on many aspects of daily lives.

Today’s technology can be traced back to earliest ciphers, and have grown as a result of evolution. The initial ciphers were cracked, so new, stronger ciphers emerged. Code breakers set to work on these and eventually found flaws, forcing cryptographers to invent better ciphers and so on. The significance of key is an enduring principle of cryptography

Conventional Encryption is referred to as symmetric encryption or single key encryption. It was the only type of encryption in use prior to the development of public-key encryption. Conventional encryption can further be divided into the categories of classical and modern techniques. The hallmark of the classical technique is that the cipher or the key to the algorithm is shared i.e. known by the parties involved in the secured communication. So there are two types of cryptography: secret key and public key cryptography .In secret key same key is used for both encryption and decryption. In public key cryptography each user has a public key and a private key.

Theoretical Background

The recent proliferation of powerful and inexpensive encryption technology has given law-abiding citizens and criminals alike an unprecedented ability to keep their secrets safe. Potent encryption software is freely available online, and even a novice computer user now has the power to protect her private and confidential data behind a virtually impenetrable wall of protection. Yet, the spread of encryption has also seriously hindered law enforcement during the investigation of cybercrimes.

Criminals are able to hide incriminating digital evidence in encrypted hard drives and volumes, which can make it impossible for investigators to access the data. There is therefore need for courts to encrypt their data before anyone can have access to them.

Statement of the Problem

The following problems were identified in managing court data:

Courts do not have an efficient system to secure their information Accumulation of paper files in court. Unauthorized access to sensitive information

1.3 Aim and Objectives of the Study

The aim of the study is to develop a computerized data encryption and decryption system. The following are the objectives of the study:

To develop a software that will aid the encryption of court data. To implement a system that will allow authorized users only to decrypt court record data. To design a system that maintains a database of court records that can be encrypted

1.4 Significance of the study

The significance of the study is that it will provide an effective means to secure court data. The study is also significant in that it will serve as a useful research material for other researchers seeking information pertaining the subject.

1.5 Scope of the Study

The research work is designed to encrypt court data and decrypt court data only by the authorized user. This is to enable lawmakers maintain accurate information in the magistrate court, Ikot Ekpene

1.6 Organization of the Research

This research work is organized into five chapters.

Chapter one is concerned with the introduction of the research study and it presents the preliminaries, theoretical background, statement of the problem, aim and objectives of the study, significance of the study, scope of the study, organization of the research and definition of terms.

Chapter two focuses on the literature review, the contributions of other scholars on the subject matter is discussed.

Chapter three is concerned with the system analysis and design. It analyzes the present system to identify the problems and provides information on the advantages and disadvantages of the proposed system. The system design is also presented in this chapter.

Chapter four presents the system implementation and documentation. The choice of programming language, analysis of modules, choice of programming language and system requirements for implementation.

Chapter five focuses on the summary, conclusion and recommendations are provided in this chapter based on the study carried out.

1.7 Definition of terms

Data: A representation of facts or ideas in a formalized manner capable of being communicated or manipulated by some process..

Encryption – The process of encoding a message so that its meaning is not obvious

Decryption – The process of decoding a an encoded message to make the meaning obvious

Cryptography – The practice of concealing  information from unauthorized users.

Security: The art of protecting an item, information or individual from harm or alteration.

System: A combination of related parts or components working together to achieve a particular goal.

Software: Set of instructions given to the computer to execute.

Record: A set of data relating to a single individual or item.

  DOWNLOAD THE COMPLETE PROJECT

DESIGNED TO ENCRYPT DATA AND DECRYPT COURT DATA ONLY BY THE AUTHORIZED USER

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGNED TO ENCRYPT DATA AND DECRYPT COURT DATA ONLY BY THE AUTHORIZED USER INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Stancy M
Abia State University, Uturu
I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much iprojectmaster, infact, I owe my graduating well today to you guys...
Excellent
Uduak From Uniuyo
IProjectMaster is the best project site for students. Their works are unique and free of plagiarism!
Excellent
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
Abubakar Iliyasu Hashim
Federal college of education pankshin affiliated to university of jos
I am highly impressed with your unquantifiable efforts for the leaners, more grace to your elbow.I will inform my colleagues about your website.
Very Good
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Peace From Unilag
I cried not knowing how to go about my project but the day i searched online and saw iprojectmaster, i called and got my full project in less than 15minutes, i was shocked!
Excellent
Temitayo Ayodele
Obafemi Awolowo University
My friend told me about iprojectmaster website, I doubted her until I saw her download her full project instantly, I tried mine too and got it instantly, right now, am telling everyone in my school about iprojectmaster.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work
Very Good

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGNED TO ENCRYPT DATA AND DECRYPT COURT DATA ONLY BY THE AUTHORIZED USER?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGNED TO ENCRYPT DATA AND DECRYPT COURT DATA ONLY BY THE AUTHORIZED USER?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGNED TO ENCRYPT DATA AND DECRYPT COURT DATA ONLY BY THE AUTHORIZED USER, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!