TECHNIQUES OF ASYMMETRIC FILE ENCRYPTION Abstract As more and more people are linking to the Internet, threats to the security and privacy of information continue to grow. To solve this growing problem, encryption programs have been created to protect privacy during a transfer of files and to make sure that sensitive files will be protected. My project is to create an asymmetric file encryption program. This means that encrypted files will need a pass-key to open that will be different from the key used to encrypt. This program could be applied practically to protect files during transfers. Background and Research This area of research has been extensively researched in the past. Even before the widespread use of the Internet, file encryption had been developed for many years. At the moment, there exists programs capable of encrypting files on a large scale. Some of very efficient, able to not only encrypt, but also compress files. are many kinds of encryption. Two are public-key encryption private-key encryption. This project will focus on private-key encryption methods. There are also many different types of encryption methods, including translation tables, data repositioning, and rotation. I have not yet decided which method to use. In the early stages of the project, I will use a downloaded encryption algorithm my program. When the other aspects of the program are working, write my own encryption algorithm. This way, I will utilize and off of existing work in this area. Visual, Code Input- Output Example Picture Procedure, Results, and Conclusion By Alvin Li Class of 2005