encryption decryption full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP
**

Posts: 559
Joined: Mar 2010
#1
21-03-2010, 06:45 PM



.pptx   encrption decryption.pptx (Size: 118.74 KB / Downloads: 518)

A MINI PROJECT ON
ENCRYPTION DECRYPTION


Submitted By :
Chandan Gautam
(CSE ËœAâ„¢)
Reg.No:350074040


Guided By:
L Ramalingam ,Sr. Lecturer
Department of Computer Science Engineering
(AVIT)


Cryptography is the science of writing messages in secret codes .
Cryptography, a word with Greek origins ,means SECRET WRITING.
Cryptography components :
PLAIN TEXT
CIPHER TEXT
ENCRYPTION
DECRYPTION


Plaintext : It is original message ,before being transformed .The data are not encrypted.
Ciphertext : After the message is transformed . The data are encrypted.
Alice : Alice is the person who needs to send secure data.
Bob : Bob is the recipient of the data.
Eve : Eve is the person who somehow disturbs the communication between Alice and Bob.

ENCRYPTION
Information is often stored and transmitted in a file.
Encryption algorithm transforms the plain text into cipher text.
A plain text file uses a common encoding format such as ASCII or UNICODE to represent the character of file.
Encryption is a translation of a file into a format that hides the content from EVE ;secret code;ciphertext.

Continued....
DECRYPTION
After sending the information by ALICE , BOB receive the information and decrypt the data.
A decryption algorithm transforms the ciphertext back into plaintext.
For decrypting the data receiver uses three types of key :
Secret key
Public key
Private key




ALGORITHM :
Two categories :

Symmetric key cryptography
Asymmetric key cryptography

In symmetric key cryptography,the same key is used by the sender(for Encryption) and the receiver(for Decryption) .
In case of symmetric key,the key is shared.



In asymmetric key cryptography,two types of key is used :

DES: DATA ENCRYPTION STANDARDS



DES encrypts and decrypts at the bit level.
The plaintext are broken into segments of 64 bits.
Each section is encrypted using a 56-bit key. (Fig. 16.3)
Every bit of ciphertext depends on every bit of plaintext and the key.
It is very difficult to guess the bits of plaintext from the bits of ciphertext.
Uses of Encryption & Decryption :
Privacy & Secruty : E-mail message,Wireless network
Confidentiality Tongueersonal records,Transaction records .
Authentication : Digital signatures,Login.
Intellectual Property : Copy protection
Advantage & Disadvantage
Advantage
Individuals can post their public key on their Web site.
The number of the keys is only twice of the number of user.
Disadvantage
The complexity of the algorithm: calculating the ciphertext from plaintext using the long keys takes a lot of time
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
shradhaparashar
Active In SP
**

Posts: 1
Joined: Sep 2010
#2
07-09-2010, 11:33 AM

plz send me encryption decryption full report.
thanx
Reply
Centman
Active In SP
**

Posts: 2
Joined: Sep 2010
#3
06-10-2010, 04:33 AM

Thanks for this. please i'll need a seminar and presentation on xml encryption. The one on the other thread refused to open on my system after i completed the downloads.
Please can you be kind to send a new copy of it to my e-mail. centjay4real@yahoo.com
Thanks
Reply
seminar tips
Super Moderator
******

Posts: 8,857
Joined: Oct 2012
#4
15-10-2012, 01:17 PM

to get infomation about the topic "encryption and decryption program" full report ppt and related topic refer the link bellow

topicideashow-to-program-to-encrypt-and-decrypt-a-text-data-using-rsa-algorithm

topicideashow-to-to-write-a-c-program-to-perform-encryption-and-decryption-of-the-given-data

topicideashow-to-encryption-decryption-full-report
Reply
ayeshaali
Active In SP
**

Posts: 3
Joined: Jul 2013
#5
17-07-2013, 11:28 PM

can i get the encryption and decryption source code in java with complete explanation..
Reply
study tips
Super Moderator
******

Posts: 10,180
Joined: Feb 2013
#6
18-07-2013, 09:30 AM

To get full information or details of encryption decryption please have a look on the pages

topicideashow-to-wireless-encryption-and-decryption

seminar and presentationproject and implimentationsshowthread.php?mode=linear&tid=49972

topicideashow-to-encryption-and-decryption

topicideashow-to-encryption-decryption-full-report

if you again feel trouble on encryption decryption please reply in that page and ask specific fields in encryption decryption
Reply
Guest
Thinking To Register

 
#7
16-01-2014, 11:16 AM

plz sent seminar report on the topic of encryption and decryption to my mail shaliniforsmile@gmail.com
Reply
seminar project topic
Super Moderator
******

Posts: 490
Joined: Jan 2014
#8
16-01-2014, 11:54 AM

To get full information or details of encryption decryption please have a look on the pages

topicideashow-to-encryption-decryption-full-report?highlight=encryption+decryption

topicideashow-to-to-write-a-c-program-to-perform-encryption-and-decryption-of-the-given-data

if you again feel trouble on encryption decryption please reply in that page and ask specific fields in encryption decryption
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Brain Chips full report seminar class 2 3,316 13-07-2016, 03:38 PM
Last Post: jaseela123
  Intranet Mailing System full report seminar tips 4 1,648 06-05-2016, 11:25 AM
Last Post: mkaasees
  chat server full report project report tiger 10 16,578 06-11-2015, 07:20 PM
Last Post: Guest
  email flyer design full report project report tiger 9 27,937 26-02-2015, 03:06 PM
Last Post: oiajecuot
Brick V3 MAIL SERVER full report project report tiger 4 6,508 04-10-2014, 02:39 PM
Last Post: GaCcBuH
  data mining full report project report tiger 35 199,297 03-10-2014, 04:30 AM
Last Post: kwfEXGu
  INSURANCE AGENT\'S COMMISSION TRACKING SYSTEM full report project report tiger 1 2,103 10-04-2014, 02:25 AM
Last Post: whyuvyoo
  ONLINE JOB PLACEMENT full report seminar presentation 3 4,778 12-10-2013, 09:59 AM
Last Post: Guest
  FULL REPORT ON ONLINE SOCIAL NETWORKING seminar projects maker 0 502 30-09-2013, 03:54 PM
Last Post: seminar projects maker
  PAYROLL MANAGEMENT SYSTEM full report seminar ideas 3 4,079 27-09-2013, 09:29 AM
Last Post: seminar projects maker