encryption decryption full report
#1

[attachment=2742]

A MINI PROJECT ON
ENCRYPTION DECRYPTION


Submitted By :
Chandan Gautam
(CSE ËœAâ„¢)
Reg.No:350074040


Guided By:
L Ramalingam ,Sr. Lecturer
Department of Computer Science Engineering
(AVIT)


Cryptography is the science of writing messages in secret codes .
Cryptography, a word with Greek origins ,means SECRET WRITING.
Cryptography components :
PLAIN TEXT
CIPHER TEXT
ENCRYPTION
DECRYPTION


Plaintext : It is original message ,before being transformed .The data are not encrypted.
Ciphertext : After the message is transformed . The data are encrypted.
Alice : Alice is the person who needs to send secure data.
Bob : Bob is the recipient of the data.
Eve : Eve is the person who somehow disturbs the communication between Alice and Bob.

ENCRYPTION
Information is often stored and transmitted in a file.
Encryption algorithm transforms the plain text into cipher text.
A plain text file uses a common encoding format such as ASCII or UNICODE to represent the character of file.
Encryption is a translation of a file into a format that hides the content from EVE ;secret code;ciphertext.

Continued....
DECRYPTION
After sending the information by ALICE , BOB receive the information and decrypt the data.
A decryption algorithm transforms the ciphertext back into plaintext.
For decrypting the data receiver uses three types of key :
Secret key
Public key
Private key




ALGORITHM :
Two categories :

Symmetric key cryptography
Asymmetric key cryptography

In symmetric key cryptography,the same key is used by the sender(for Encryption) and the receiver(for Decryption) .
In case of symmetric key,the key is shared.



In asymmetric key cryptography,two types of key is used :

DES: DATA ENCRYPTION STANDARDS



DES encrypts and decrypts at the bit level.
The plaintext are broken into segments of 64 bits.
Each section is encrypted using a 56-bit key. (Fig. 16.3)
Every bit of ciphertext depends on every bit of plaintext and the key.
It is very difficult to guess the bits of plaintext from the bits of ciphertext.
Uses of Encryption & Decryption :
Privacy & Secruty : E-mail message,Wireless network
Confidentiality Tongueersonal records,Transaction records .
Authentication : Digital signatures,Login.
Intellectual Property : Copy protection
Advantage & Disadvantage
Advantage
Individuals can post their public key on their Web site.
The number of the keys is only twice of the number of user.
Disadvantage
The complexity of the algorithm: calculating the ciphertext from plaintext using the long keys takes a lot of time
Reply
#2
plz send me encryption decryption full report.
thanx
Reply
#3
Thanks for this. please i'll need a seminar on xml encryption. The one on the other thread refused to open on my system after i completed the downloads.
Please can you be kind to send a new copy of it to my e-mail. centjay4real[at]yahoo.com
Thanks
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: pgp encryption technology full report for siminar, encryption decryption uml diagrams, seminar report on encryption and decryption, algorithm for encryption decryption for rf projects, avit vmu, seminar report on topic encryption decryption system in pdf file, decryption software,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,756 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,877 08-01-2018, 02:33 PM
Last Post: RaymondGom
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,764 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,876 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Employee Cubicle Management System full report computer science technology 4 5,115 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 25,979 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,210 29-11-2015, 02:37 PM
Last Post: Guest
  steganography full report project report tiger 31 33,848 07-07-2015, 02:57 PM
Last Post: seminar report asees
  TEA ENCRYPTION (ALGORITHM) computer science technology 1 2,659 11-11-2014, 10:45 AM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,211 10-11-2014, 09:15 PM
Last Post: Guest

Forum Jump: