ABSTRACT
This project concerns the design and implementation of data
encryption system. In the course of this research, five methods of encryption
were adopted. These are the substitution, transposition, exclusive-OR method,
rotation and data encryption standard method. The exclusive-OR method made use
of two data inputs bits that were allowed to rotate to the left or right. The
researcher also developed software program for encryption system. Each of these
methods was tested to ensure integrity of data and give authentication to
specific parties in order to facilitate non-repudiation thereby preserving the
confidentiality of information that may fall into the possession of
unauthorized parties, especially users of internet
EMOLE, E (2021). Design And Implementation Of Encryption System. Mouau.afribary.org: Retrieved Nov 23, 2024, from https://repository.mouau.edu.ng/work/view/design-and-implementation-of-encryption-system-7-2
ENOCH, EMOLE. "Design And Implementation Of Encryption System" Mouau.afribary.org. Mouau.afribary.org, 05 Jul. 2021, https://repository.mouau.edu.ng/work/view/design-and-implementation-of-encryption-system-7-2. Accessed 23 Nov. 2024.
ENOCH, EMOLE. "Design And Implementation Of Encryption System". Mouau.afribary.org, Mouau.afribary.org, 05 Jul. 2021. Web. 23 Nov. 2024. < https://repository.mouau.edu.ng/work/view/design-and-implementation-of-encryption-system-7-2 >.
ENOCH, EMOLE. "Design And Implementation Of Encryption System" Mouau.afribary.org (2021). Accessed 23 Nov. 2024. https://repository.mouau.edu.ng/work/view/design-and-implementation-of-encryption-system-7-2