0% found this document useful (0 votes)
120 views2 pages

Project Plan for OKR-Based Encryption Research

This project plan outlines research on encryption techniques for a capstone project broken into two phases over two academic quarters. The objectives of the Autumn quarter phase are to research encryption methods, select the best algorithm, split files and deploy encrypted shares to cloud storage with self-destruction functionality. The objectives of the Winter quarter phase are to build core functions for decrypting data using shares and keys, analyze performance by comparing reconstructed to original data, design a GUI, and prepare a final report and defense.

Uploaded by

Guddi Shelar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views2 pages

Project Plan for OKR-Based Encryption Research

This project plan outlines research on encryption techniques for a capstone project broken into two phases over two academic quarters. The objectives of the Autumn quarter phase are to research encryption methods, select the best algorithm, split files and deploy encrypted shares to cloud storage with self-destruction functionality. The objectives of the Winter quarter phase are to build core functions for decrypting data using shares and keys, analyze performance by comparing reconstructed to original data, design a GUI, and prepare a final report and defense.

Uploaded by

Guddi Shelar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Project Plan:

Objectives and Key Results aka OKRs (For managing the progress of the project, I am going to use
techniques learnt in software management course and try OKRs in real life project) The 10 credits for
capstone project will be broken down as follows – 6 credits for phase 1 during Autumn 2021, 4 credits
during Winter 2021.

Autumn Quarter (6 credits)

Objective: Research and Analysis

1. Literature Review

In this part various literature in encryption and decryption technology will be study. This research will
help to define the problems and their solution in implementation.

2. Text data parsing: text file data- fetch from a file


Text parsing is a common programming task that splits the given sequence of characters or values (text) into
smaller parts based on some rules. It has been used in a wide variety of applications ranging from simple file parsing to
large scale natural language processing

3. Interpretation of Encryption technique- check various algos

Encryption is a critical part in the research as it protect data, establish trust, and maintain regulatory
compliance. Different encryption methods are based on the type of keys used, key length, and size of data
blocks encrypted. Advanced Encryption Standard (AES),  Rivest-Shamir-Adleman (RSA), Triple DES
(Data Encryption Standard, Twofish are some of the common encryption methods that might see used in
various encryption tools

4. Selection of best encryption technique.

In this research we will select best algorithm that suits our application. Method should be robust in
terms of security and reconstruction loss.

5. File splitting functionality- 2 shares

In this research we will generate two separate shares or files by using encrypted data. This will help us to
increase the security as original data is splitted in to two parts.

6. Encrypted data deployment- cloud either local or ThingSpeak (free services)

In this part we will save all the encrypted share sto cloud. Cloud will be local or free like thingspeak. In
thingspeak we cann make channel and deploy all data to that channel.

7. Self-Destruction functionality

In this research we will keep the shared file on clous for some duration. After that time files will get
removed automatially.

8. First draft of the project.


Winter Quarter (4 credits)

Objective: Build core functionalities

1. data decryption using share and secret key

In this research user will use thos shares and then combine. After that data is decrypted using key.

2. Performance analysis -Collect and analyze results against the defined metrics

In this part reconstructed data is compared with original data. Then error is calculated, to test the
systems robuestenss and accuracy.

3. GUI Designing

In this part we will design GUI using PYQT libarary.

4. Final Project Report


5. Prepare Defense

Common questions

Powered by AI

Implementing a self-destruction functionality involves challenges such as ensuring the accuracy of the file destruction timing, maintaining user access until expiration, and preventing unauthorized access or premature deletion. Also, it is crucial to balance between the security provided by file self-destruction and the potential data loss risks it poses if incorrectly configured or triggered .

Choosing between local storage and cloud services such as ThingSpeak affects both project development and security. Local storage may offer greater control and potentially enhanced security, while cloud services provide accessibility and scalability benefits. ThingSpeak, as a free service, allows data to be deployed to a dedicated channel, facilitating easy data sharing and online availability, but it may raise concerns about data security and privacy due to third-party involvement .

Using a free cloud service like ThingSpeak offers benefits such as reduced costs, easy implementation, and accessibility. However, it might raise issues regarding data security and control, as the data resides on a third-party server. A local cloud solution, on the other hand, may provide better data security and control, albeit at potentially higher costs and increased setup complexity, including maintenance and resource allocation .

Performance analysis is essential for evaluating how accurately the decrypted data matches the original data, determining the success of the decryption process, and measuring the system's robustness against errors. This involves collecting results and analyzing metrics to ensure high accuracy, low error rates, and compliance with predefined security standards, which are central to the project's objectives .

Text data parsing is crucial as it divides the data into manageable parts according to predefined rules, which facilitates easier data manipulation and prepares it for encryption. This preprocessing step can enhance the efficiency of encryption, improve the accuracy of data handling, and simplify subsequent data processing tasks, directly contributing to more organized project documentation and execution .

Writing the first draft requires clear articulation of the research objectives, methodologies, and anticipated outcomes. Key considerations include accurately documenting the selection of encryption techniques, detailing the data parsing methods, and outlining the implementation and performance metrics. Additionally, reflecting on potential challenges and solutions in data security and management is crucial for a comprehensive draft .

A GUI, particularly using PYQT, makes the encryption project more accessible and user-friendly by providing a visual and interactive interface for users to manage encryption and decryption tasks. It facilitates easier user interaction and reduces the learning curve associated with text-based or command-line interfaces, enhancing the overall user experience .

Integrating share and secret key methods enhances data recovery by combining distributed data pieces with a secure key to reconstruct the original information. This requires precision in aligning the shares and using the correct key, which bolsters security but necessitates meticulous management to ensure the decryption process is seamless and resistant to data manipulation attempts .

Choosing the right encryption algorithm is crucial as it determines both the robustness of security and the ease of data management. Algorithms like AES, RSA, and Twofish offer varying levels of security based on key lengths and data processing methods. An algorithm that provides strong security yet remains efficient and compatible with existing systems ensures that data protection is maintained without overly complicating data management processes .

File splitting enhances security by dividing the encrypted data into two separate shares, reducing the risk of unauthorized users accessing complete information. However, it introduces complexity in data management and retrieval, as both file shares must be correctly maintained and joined for successful decryption, which can be a point of failure if not carefully managed .

You might also like