Skip to content

A full stack windows form application for sensitive image storing in encrypted format using symmetric key cryptography, and user data storing/securing using hash algorithms.

License

Notifications You must be signed in to change notification settings

saahen-sriyan-mishra/Camouflage-Shield

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Camouflage Shield

Camouflage Shield is a Windows Form application designed for sensitive image storage in an encrypted format. The project employs various encryption and hashing algorithms to ensure secure user authentication and image protection.

Features

  • User signup with OTP verification (for demonstration purposes).
  • Strong password enforcement during user registration.
  • Multi-algorithm image encryption (AES, DES, 3DES, RC2, Rijndael).
  • Image storage in Base64 format with encryption details.
  • Copy and view encrypted image codes.
  • Hash text encrypter supporting MD5, SHA-1, SHA-256, SHA-384, and SHA-512.

Prerequisites

  • Visual Studio (for running the project).
  • .NET Framework.

Getting Started

  1. Clone the repository.
  2. Open the project in Visual Studio.
  3. Build and run the application.

Usage

  • Launch the application and sign up for a new account.
  • Log in with your credentials.
  • Encrypt and save images using different algorithms.
  • Copy the encrypted image code.
  • View encrypted images using the proper algorithm and key after entering the proper image code.
  • Use the hash text encrypter for text-based encryption. (used for demonstartion in case Database not is accessable)

Limitations UPDATED.. New version do not contain these

  • Avoid high-resolution or very complex images (limited to 1MB).
  • The application may face challenges with large volumes of data generated while image processing.

Limatations

  • Dynamic updation limitation (need to re-start application to login, image encrypted code is visible only after re-start)
  • Useer profile may not show any text for encryption but can be copy pasted for decrypting and viewing the image.

Security Considerations

  • Passwords are hashed using MD5, SHA-1, SHA-256, SHA-384, and SHA-512
  • Multi-algorithm image encryption using AES, DES, 3DES, RC2, Rijndael.

Note:

  • MD5, SHA-1, SHA-256, SHA-384 and SHA-512 are used for encrypting and storing the login credentials data, but for understanding purposes the hash text button is used.
  • (MD5 and SHA1 are low level algorithm for data storing so not used in real world application, but used here for diversity in algorithms)
  • Also for reference, actual error message are kept visible along with implementational error message.

Releases

No releases published

Packages

No packages published