Abstract
In this rationalized epoch, the orb is gyrating around technological progression with encouraging upshot. Nevertheless, it is decent being expectant, though circumstances urge for cynicism too. Being conscious of the fact that constructive facets of technology should not be a dispiriting aspect, rather emphasis should be toward curbing continuing cybercrimes, diurnal data stealth, malicious intrusions, etc. Computer systems are frequently harmed by network security. Employment of cryptography and cryptographic modus operandi is ensured to overawe such issues. The paper emphasizes utilization of cipher text in determining the critical path employing project management method. Project management method demonstrates all the activities requisite to accomplish a task in the finest feasible manner. The time though which it consumes sets out all the individual activities, partaking in crafting a colossal project. The apposite order has to be upheld as one activity could transpire only if other activity is accomplished, whereas in other cases, some activities transpire concurrently. The most convenient path forms the critical path. The proposed work is principally an amalgamation of project management method along with IC Engine Transmission Ratio and Simple Interest Formula, developed with a purpose of data safekeeping, which is an indispensable facet for apiece organizational accentuation.