It is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a message “Access is denied” will be displayed showing that such user is un-authorized. Package like Ms-Word, Ms- Excel, as well as slide are attached to the program for users to use and encrypt such file after saving.

File encryption is the process of translating plain text data into something meaningless (cipher text) while decryption is the reverse. Visual Basic programming language is used in designing this security program to protect file and data in order to achieve its aims and objectives.



There are a number of methods for security measures to be attached to files or documents, these may include file password or file locking, data / file encryption and decryption, installation of antivirus, USB encryption, laptop encryption, firewall, password encryption, database encryption, disk encryption for data etc. Since the use of the computer is so wide and data or file security is very important, an important concept to note is that data or file encryption is one of the best security measures and can be incorporated into systems that participate in data or file transfer and sharing to allow for privacy. This is because it places security measure on the system on the data itself. Applications need to have a way of encrypting data or documents before sending to the recipient(s) at the receiving end, and the recipient should also be able to have a means to decrypt or unlock the encrypted message being sent. This is made possible by using a unique pass code (key or password) for both the encryption and the decryption processes. Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (cipher text). Decryption is the process of converting cipher text back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used because it renders main security goals which are privacy and authenticity of the communicated data. A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of cipher text, the key that was used to encrypt the data must be used. 

Fig.1.0 Symmetric key cryptography process description

The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated cipher text without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of cipher text without possessing the key.

It is difficult to determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose one that has been in use for several years and has successfully resisted all attacks.

1.0 Background of the Study

Due to insecurities in files and data, many researchers over the years in the ICT fields have carried out numerous researches in files/data encryption and decryption. They have encrypted and decrypted files using both private and public keys and even other minor methods when sending or receiving files on the internet. Public keys data encryption and decryption method and other minor methods have been found out to be slow and not suitable for large ranges of data/files as a result most researchers have recommended files/data encryption and decryption using the symmetric – key type (private key) of data encryption and decryption.

The method to be used for data encryption and decryption is cryptography. Cryptography is therefore the science of using mathematics to encrypt and decrypt information. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet) so that it cannot be read by anyone except the intended recipient.

Cipher algorithm will be used, which can be defined thus: A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key (a number, word, or phrase) to encrypt and decrypt data. To encrypt, the algorithm mathematically combines the information to be protected with a supplied key. The result of this combination is the encrypted data. To decrypt, the algorithm performs a calculation combining the encrypted data with a supplied key. The result of this combination is the decrypted data. If either the key or the data is modified, the algorithm produces a different result. The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated cipher text without using the key. If a really good encryption algorithm is used, then there is no technique significantly better than methodically trying every possible key. Even for a key size of just 40 bits, this works out to 2ˆ40 (just over 1 trillion) possible keys.

1.1 Statement of the Problem

A lot of problems are always being encountered during the process of data or file transfer and sharing and even chatting or sending Email among clients or server-to client on a network. The problem arises as a result of data or file insecurity over a network. Since the data or file can be transferred or shared among clients or users on a network, some protocols are being breached which leads some clients or users to having or gaining access to data or file/document they are not supposed to. Because of these problems, this then calls for a research to address the problems on file insecurities using cryptographic algorithm or cipher. These problems can be tackled by joint efforts of software programmers, analysts and researchers in ICT field.

1.2 Aim and Objectives Of the study

This project is aimed at designing and implementing security software using cryptography method (process in which plain text is converted to cipher text (encrypted text) which uses a key that is known to both sender and receiver and a process in which cipher text is converted to plain text (decrypted text)). It would be developed for individuals or organisations that need to secure their files and other document.

Specifically, the objectives of this project are stated as follows:

⦁ To ensure that data files resident on a system are well secured or protected.

⦁ To ensure data communication a client-to-client or server-to-client relationship on a network.

⦁ Securities and confidentiality of personal document for clients or users on a network involved in data or transfer or sharing.

⦁ To replace the traditional unsecured chatting and file transfer application with a more secured encryption and decryption enabled data communication application

⦁ To ensure that illegal alterations to personal or confidential information is greatly reduced.

1.3 Significance of the Study

Some of the significance of this project research is explained below as data/files encryption and decryption is very essential in the life of an individual, ICT researchers, ICT companies and non – ICT companies. The various significance of this research work is explained below: The importance of the encryption techniques for large and growing sectors of the society is fundamental. The use of encryption is as important for the storage and use of information as it is for data and telecommunication. In order to secure the necessary legal, evidentiary function of digital information as we go away from the use of physical documents, strong cryptographic techniques are required. The importance of encryption in file transfer applications will increase substantially in the coming years in place with the growing traffic on publicly available networks, like the internet as they continue to increase in size; Files or documents are well protected on a network with the existence of Encryption algorithm embedded in the application. Private persons, companies, government agencies and other organisations use cryptography techniques in order to safely communicate with partners, customers, etc, but also in order to increase security in their own internal processes; to protect stored information, and communicate with employees who are geographically distributed or work from a distance. By using encryption for communication over open and publicly accessible networks, information/data can be transferred from the sender to receiver without unauthorized interpretation (data integrity).

1.4 Scope of the study

The scope of this project is essentially centred on incorporating encryption and decryption algorithms into data communication which entails encryption and decryption enabled files transfer applications and generally securing data against illegal access or transfer or file sharing systems. This project is a security application program on a network or popularly referred to as security “socket programming”. It explores data or file encryption, socket programming, cryptography, local area network (LAN), Bluetooth connection, wireless, wireless connection, IP addressing and port numbering.

1.5 Definition of terms

i. Data: Information in raw form or unorganized form such as alphabets, numbers, or symbols that refer to or represent condition, ideas or object.

ii. Database: A systematically organized or repository of indexed information usually a group of linked data files that allows easy retrieval, updating, analysis and output of a data usually stored in a computer.

iii. File: Is a collection of data stored in one unit, identified by a Filename. It can be a document, picture, audio or video stream, data library, application or other collection of data.

iv. Encryption: Encryption is the process of translating plain text data (iv. plaintext) into something that appears to be random and meaningless (cipher text). Decryption is the process of converting cipher text back to plaintext.

v. Decryption: Decryption is the process of converting cipher text back to plaintext.

vi. Plain-text: Plain-text is any text that is still in its readable format or that has been converted from cipher-text back to plain text as a result of Decryption.

vii. Cipher-text: Cipher-text is the text which has been converted to the format that cannot be read as a result of encrypting the text.

viii. Firewall: Set of related networks located at a network gateway server that protects the resources of a private network from users from other networks.

ix. Cryptography: it is the act of writing in code or cipher.

x. Symmetric-key: The method of using a single key for encryption and decryption. It can also be referred to as private-key 

xi. Asymmetric-key: The method of using a key for encryption and another key for decryption. It can also be referred to as a public-key.

xii. Algorithm: It is a step by step instruction of solving problem.

xiii. LAN: Local Area Network.

xiv. Kernel: A kernel is the piece or pieces of pieces of software that is responsible for servicing resource request from the application and the management of resources. A kernel grant access to resources such as allocating space for a new file or creating a network collection.

xv. Cryptography API: Contains functions that allows applications to encrypt or digitally signed sign data in a flexible manner, while providing protection for the user’s sensitive private key data.

xvi. Stream Cipher: xvi. Stream ciphers, which encrypt continuous streams of data.

xvii. Block Cipher: xvii. Block ciphers, which encrypt block of data of fixed size.



RESEARCHWAP.COM is an online repository for free project topics and research materials, articles and custom writing of research works. We’re an online resource centre that provides a vast database for students to access numerous research project topics and materials. guides and assist Postgraduate, Undergraduate and Final Year Students with well researched and quality project topics, topic ideas, research guides and project materials. We’re reliable and trustworthy, and we really understand what is called “time factor”, that is why we’ve simplified the process so that students can get their research projects ready on time. Our platform provides more educational services, such as hiring a writer, research analysis, and software for computer science research and we also seriously adhere to a timely delivery.


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

    Hilary Yusuf, United States International University Africa, Nairobi, Kenya.
  • " is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "" and God bless you and your business! ."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • " is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

    Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing