Skip to main content

TACKLING INSURGENCY USING CRYPTOGRAPHY

 

ATTENTION

 

BEFORE YOU READ THE ABSTRACT OR CHAPTER ONE OF THE PROJECT TOPIC BELOW, PLEASE READ THE INFORMATION BELOW.THANK YOU!

 

INFORMATION:

YOU CAN GET THE COMPLETE PROJECT OF THE TOPIC BELOW. THE FULL PROJECT COSTS N5,000 ONLY. THE FULL INFORMATION ON HOW TO PAY AND GET THE COMPLETE PROJECT IS AT THE BOTTOM OF THIS PAGE. OR YOU CAN CALL: 08068231953, 08168759420

 

WHATSAPP US ON  08137701720

 

 

 

TACKLING INSURGENCY USING CRYPTOGRAPHY

 

 

TACKLING INSURGENCY USING CRYPTOGRAPHY

 

CHAPTER ONE

 

INTRODUCTION

 

1.0           BACKGROUND OF THE STUDY

 

Communication is an essential key during military conflict. Information concerning the status of their adversary is of great demand and is been passed across either by cell phone, e-mail, fax and etc. This information can be accessed by insurgents if not secured and the country’s information can be exposed. Therefore, information security is of great importance to prevent loss of useful information.

 

Insurgency can be defined as a rebellious movement against an existing government with the aim of overthrowing the government through the use of subversion and armed conflict. One major way insurgents penetrate into a country is by gathering information therefore to tackle insurgency; information has to be secured through the use of cryptography. This method has been used to secure communications over the years.

 

Cryptography is the science of encrypting secret messages and transmitting the message from a sender to the receiver. The sent message can only be decoded by the receiver who has access to the software and must also know the password and encryption key to ensure high rate of security.

 

1.1           STATEMENT OF THE PROBLEM

 

Insurgency has really caused destruction, poverty and many individuals have lost their life during this period. Insurgency has become the order of the day; people no longer live peacefully in their homes as a result of fear. In recent time, technologies has grown wide, information can be accessed by different people anywhere and at anytime.

 

One major challenge in our present world is that communications are not secured. If an attempt is made to transmit a message over a public or private channel and it gets to a wrong hand (an adversary: someone who sees all communications occurring on the channel.) the message would be exposed, tampered with or lost.

 

Therefore the use of cryptography is a very important issue in this present time to avoid data lost and access by other people.

 

1.2           MOTIVATION OF THE STUDY

 

Insurgency has brought about destruction, poverty and has endangered so many people’s lives. One major way insurgents penetrate into a country is by gathering essential information about the country before setting their operations. They gather information so as to know how and when to push through with their plans.

 

Insurgency has really caused hazard and fear amongst every citizen in the country: which is actually the motivation behind this study.

 

1.3           AIM AND OBJECTIVES

 

The aim of this work is to develop a system which is responsible for encoding and decoding secret messages against insurgents. The system will be developed in such a way that only the user can have access to it and this will be done by the use of a password to ensure high rate of security.

 

Its objectives include;

 

                         i.                  To Prevent insurgents from monitoring secret messages in a country

 

                       ii.                  To secure information from access.

 

                    iii.                  To prevent insurgents from having access to essential information about a country.

 

1.4           SIGNIFICANCE OF THE STUDY

 

The primary goal of this work is to encrypt user’s data and provide a security mechanism. Therefore the significant of this study includes:

 

1.                 To develop a system that will serve as a means of sending information and secured.

 

2.                 The developed system will help the armed-force send secret messages.

 

3.                 The system will also be used to hide useful data.

 

4.                 This method of sending secret messages will help tackle the fear of insurgents.

 

1.5           SCOPE OF THE STUDY

 

This work is basically concerned with the tackling of insurgency by securing information through the use of cryptography. It focuses on data secrecy and integrity, which is to ensure that only those authorized will have access to it.

 

This work does not go deeply into discussing how insurgents operate in a country. The system will be designed using hash function SHA 256.

 

1.6           DEFINITION OF TERMS

 

·        Adversary: an opponent.

 

·        Conflict: a violent situation between different people.

 

·        Decryption: to change information that is in code into ordinary language so that it can be understood by anyone.

 

·        Encryption: To put information into a special code especially in order to prevent people from looking at it without authority.

 

·        Information: a comprehensive detail about something.

 

·        Insurgents: group of people rising against an authority.

 

·        Integrity: maintaining and assuring that data can only be modified by those authorized to do that.

 

·        Password: a confidential word or phrase.

 

·        Rebellious: to oppose to the government of a country.

 

·        Secrecy: making sure that nothing is known about something that is being secret.

 

·        Security: the act of protecting a country or something from people.

 

·        Subversion: an act of attacking the authority of a system secretly or indirectly.      

 

·        Tackling: a process of dealing with a difficult problem or situation.

 

 

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5,000) into our bank Account below, send the following information to

08068231953 or 08168759420

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) after we receive bank alert

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 3139283609

Bank: FIRST BANK

FOR MORE INFORMATION, CALL:

08068231953 or 08168759420

AFFILIATE LINKS:

myeasyproject.com.ng

easyprojectmaterials.com

easyprojectmaterials.net.ng

easyprojectsmaterials.net.ng

easyprojectsmaterial.net.ng

easyprojectmaterial.net.ng

projectmaterials.com.ng

googleprojectsng.blogspot.com

myprojectsng.blogspot.com.ng

https://projectmaterialsng.blogspot.com.ng/

https://foreasyprojectmaterials.blogspot.com.ng/

https://mypostumes.blogspot.com.ng/

https://myeasymaterials.blogspot.com.ng/

https://eazyprojectsmaterial.blogspot.com.ng/

https://easzprojectmaterial.blogspot.com.ng/

 

 

 

 

 

Comments

Popular posts from this blog

DESIGN AND IMPLEMENTATION OF ONLINE JAMB EXAMINATION PROCESSING SYSTEM

  ATTENTION   BEFORE YOU READ THE ABSTRACT OR CHAPTER ONE OF THE PROJECT TOPIC BELOW, PLEASE READ THE INFORMATION BELOW.THANK YOU!   INFORMATION: YOU CAN GET THE COMPLETE PROJECT OF THE TOPIC BELOW. THE FULL PROJECT COSTS N5,000 ONLY. THE FULL INFORMATION ON HOW TO PAY AND GET THE COMPLETE PROJECT IS AT THE BOTTOM OF THIS PAGE. OR YOU CAN CALL: 08068231953, 08168759420   WHATSAPP US ON  08137701720       DESIGN AND IMPLEMENTATION OF ONLINE JAMB EXAMINATION PROCESSING SYSTEM       DESIGN AND IMPLEMENTATION OF ONLINE JAMB EXAMINATION PROCESSING SYSTEM   A CASE STUDY JAMB, LAGOS   ABSTRACT             Computer are known for their wide range of uses especially in scientific and mathematical field. However, title or no thought has been given to designing a complete and true intelligence test on a computer system in our immediate envir...

THE CHALLENGES OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) TO MODERN SECRETARIES

  ATTENTION   BEFORE YOU READ THE ABSTRACT OR CHAPTER ONE OF THE PROJECT TOPIC BELOW, PLEASE READ THE INFORMATION BELOW.THANK YOU!   INFORMATION: YOU CAN GET THE COMPLETE PROJECT OF THE TOPIC BELOW. THE FULL PROJECT COSTS N5,000 ONLY. THE FULL INFORMATION ON HOW TO PAY AND GET THE COMPLETE PROJECT IS AT THE BOTTOM OF THIS PAGE. OR YOU CAN CALL: 08068231953, 08168759420   WHATSAPP US ON  08137701720       THE CHALLENGES OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) TO MODERN SECRETARIES       THE CHALLENGES OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) TO MODERN SECRETARIES (STUDY OF NIGERIAN-AMERICAN   BANK LIMITED (NAMBL) AND        WEMA BANK PLC)   CHAPTER ONE   INTRODUCTION   The world of business is changing rapidly as a result of technological development. This is very wide departure from the traditional business enterprises ...

ONLINE MONEY MAKING FROM RELATIONSHIP MARKETING.

  ONLINE MONEY MAKING FROM RELATIONSHIP MARKETING. RELATIONSHIP MARKETING IS NOW THE BEST FORM OF MARKETING When credibility increases confidence increases, and increased confidence brings emotional acceptance. This is why people immediately buy products recommended by their friends, they buy because they are confident in their friend suggesting something, they believe it will be good, their fear is eliminated. Confidence eliminates fear. And how to increase that confidence from potential customers to you is by first making them your friend. How to Make Them Your Friend 1. Answer their questions. 2. Research and solve their fears, challenges, and problems, write about them, answer their questions. Chat with them. 3. Follow them up with more articles, useful information and more answers. 4. Get their emails to remind them of periodics from you, if you constantly release useful information they will almost always stop to read from you. And soon they may start talking about you if you...