0% found this document useful (0 votes)
5 views6 pages

Business Proposal

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 6

VaultCrypt

Session 2024 - 2028

Submitted by:
MUHAMMAD AZEEM AHMAD
2024-CS-63

Supervised by:
Dr. Awais Hassan
Course:
CSC-102 Programming Fundamentals

Department of Computer Science


University of Engineering and Technology
Lahore Pakistan

_____________________________________________________________________________________
MUHAMMAD AZEEM AHMAD 2024-CS-63 CSC-102 Programming Fundamentals
2
VaultCrypt

Table of Contents:
 Description of Project……………………………………………………………3
o Objectives…………………………………………………………………………………3
o Contribution to the Field of Computer Science…………….…………..3
o Results………………………………………………………………………………………3
 Users of Application………………………………………………………………4
 Functional Requirements………………………………………………………5

Table of Figures:
 Wireframes…………………………………………………………………………..6

_____________________________________________________________________________________
MUHAMMAD AZEEM AHMAD
2024-CS-63
3
VaultCrypt

● Description of Project:
VaultCrypt is a cryptography application to encrypt and
decrypt the string using encryption algorithm that is Caesar Cypher. Cryptography
application in C++ involve implementing algorithms and techniques for securing
communication, ensuring data integrity, and protecting sensitive information.

o Objectives:
 Data Confidentiality
 Data Integrity
 Authentication
 Secure Communication
 Digital Signatures and Non-Repudiation
 Access Control and Secure Systems

o Contribution to the Field of Computer Science:


 VaultCrypt allows the encryption of data so that only those with the proper key can
decrypt and access it. This is crucial in protecting sensitive information such as
personal data, financial records, or trade secrets.
 Cryptographic hash functions (e.g., SHA-256, MD5) are used to verify the integrity
of data. Any modification to the original data will result in a completely different
hash, allowing systems to detect tampering or corruption.
 Cryptographic techniques such as digital signatures and public key infrastructure
(PKI) are used to authenticate users or systems, ensuring that they are who they
claim to be.
 Cryptography is fundamental for creating secure communication protocols like
SSL/TLS, VPNs (Virtual Private Networks), and end-to-end encryption used in
messaging applications.
 Digital signatures, created using cryptographic algorithms, provide proof of
authorship and prevent parties from denying sending a message or approving a
transaction.
 Cryptographic techniques, such as public key infrastructure (PKI) or zero-knowledge
proofs, are used to implement secure authentication mechanisms.

o Result:
 Encrypted Files.
 Decrypted Files.

_____________________________________________________________________________________
MUHAMMAD AZEEM AHMAD
2024-CS-63
4
VaultCrypt

● Users of Application:
Vault are used by a wide range of individuals and
organizations across various sectors to enhance security, privacy, and trust in digital
communications and data storage. Here are some key users of cryptography application:

 Messaging App Consumers

 Employees

 E-commerce Companies

 Software Developers

 Corporate IT Departments

 Banks and Credit Unions

 Stock Exchange and Trading Platforms

 Intelligence and Security Agencies

 Law Enforcement

 Hospitals and Clinics

 Pharmaceutical Companies

 Telecommunication Companies

 Cloud Service Providers

 Researchers and Academics

 Cryptocurrency Users

 Cybersecurity Professionals

 IoT Device Manufacturers

 Legal and Compliance Professional

_____________________________________________________________________________________
MUHAMMAD AZEEM AHMAD
2024-CS-63
5
VaultCrypt

● Functional Requirements
Expected Functionalities According to users are:

User Type Functionalities Results

Individuals To protect personal information, Use secure messaging apps (e.g.,


passwords, and financial transactions WhatsApp, Signal)

Businesses To secure customer data, payment Online retailers like Amazon and
information payment processors like PayPal ,
build trust with their users
Financial Institutions To secure online banking platforms and Protection of sensitive financial
ensure secure transactions, protect data and security of data integrity
investor data, and ensure the integrity of
trading systems

Government To secure communications, evidence Agencies like the NSA (National


Agencies protection, and national security Security Agency) in the U.S.
operations employ cryptography in
investigations that involve
sensitive information
Healthcare Utilize encryption to protect patient data, ensure compliance with
Organizations secure electronic health records (EHR) regulations like HIPAA (Health
Insurance Portability and
Accountability Act)
Telecommunications To encrypt messages and calls secure data traffic over their
Companies networks to protect user privacy

Cryptocurrency Create and maintain decentralized Maintain privacy and secure


Users applications (dApps) transactions in Bitcoin and
Ethereum
Cybersecurity Implement and manage cryptographic Protection of evidence and
Professionals protocols to secure networks, data, and maintenance of data integrity
communications from cyber threats

_____________________________________________________________________________________
MUHAMMAD AZEEM AHMAD
2024-CS-63
6
VaultCrypt

IoT Device To secure communication between Ensure that devices are


Manufacturers Internet of Things (IoT) devices and authenticated before connecting to
protect data transmission networks.

Researchers and Fields like computer science, information Development of new algorithms,
Academics security, and cryptography research itself protocols, and security models

● Wireframe:

_____________________________________________________________________________________
MUHAMMAD AZEEM AHMAD
2024-CS-63

You might also like