Professional Documents
Culture Documents
Team members:
1. INTRODUCTION
1 .1 Purpose
1.2 System Overview
1.3 Design Map
1.4 Definition and Acronyms
2. DESIGN CONSIDERATIONS
2.1 Assumptions
2.2 Constraints
2.3 System Environment
2.4 Design Methodology
2.5 Risks and Volatile Areas
3. ARCHITECTURE
3.1 Overview
3.2 Subsystem, Component, or Module
3.3 Strategy
4. DATABASE SCHEMA
4.1 Tables, Fields and Relationships
4.1 .1 Databases
4.1.2 New Tables
4.1.3 New Fields
4.1.4 Fields Changes
4.1 .5All other changes
4.2 Data Migration
2.2. Constraints
Compiler: 32 bit
Application Program: C
User Interface: Front end and back end using GCI compiler
Hardware interface: Windows Supporting 'C' program
4. DATABASE SCHEMA
4.1. Tables, Fields and Relationships
This section defines the project's required tables and their respective
fields.
This figure describes all the relationships between
different entities(modules) of our project.
4.1 .1 . Database
A database is necessary to store the user identification information.
file.
If KEY is
Empty
START
Load CIPHER
Enter Key
If KEY is
Destroy Cipher
Correct
5.6. Component Diagram
GUI interface on which end user enter their text and security key
should be entered so that the text can be encrypted and converted to
cipher text and the key will be checked finally to decrypt the data.
This system feature involves encrypting the data using one of many
asymmetric cryptographic ciphers for data security
1 . Select the file using browse option that he wants to encrypt and
select the file.
2. You must enter the key(public key) that help to encrypt your
File.
3. It gives the key option and validates the key and then
encryption is done.
4. After encryption file is in destination folder.
Options for choosing manual password protection, one time password
protection and dynamic round protection will be given.
NO
Interface:
Option 1:
Option 2: