TECHNIQUES OF ASYMMETRIC FILE
ENCRYPTION
Abstract
As more and more people are linking to the Internet, threats to the
security and privacy of information continue to grow. To solve this growing
problem, encryption programs have been created to protect privacy during a
transfer of files and to make sure that sensitive files will be protected. My
project is to create an asymmetric file encryption program. This means that
encrypted files will need a pass-key to open that will be different from the key
used to encrypt. This program could be applied practically to protect files during
transfers.

Background and Research
This area of research has been extensively researched in the past. Even before the widespread use of the Internet, file encryption had been developed for many years. At the moment, there exists programs capable of encrypting files on a large scale. Some of very efficient, able to not only encrypt, but also compress files. are many kinds of encryption. Two are public-key encryption private-key encryption. This project will focus on private-key encryption methods. There are also many different types of encryption
methods, including translation tables, data repositioning, and rotation. I have not yet decided which method to use. In the early stages of the project, I will use a downloaded encryption algorithm my program. When the other aspects of the program are working, write my own encryption algorithm. This way, I will utilize and off of existing work in this area.
Visual, Code Input- Output Example
Picture
Procedure, Results, and
Conclusion
By Alvin Li Class of 2005