Project Synopsis On Encryption Algorithms
Project Synopsis On Encryption Algorithms
Project Synopsis On Encryption Algorithms
business
Jhanjeri, Mohali-140307
Department of Computer Applications
Minor Project On
Text encryption using
various algorithms
Submitted By :
6 ENCRYPTION ALGORITHMS 7
8 MODULES/COMPONENTS 9
9 EXPECTED OUTPUTS 10
10 APPLICATIONS 11
12 CONCLUSION 12
Table Of Content
INTRODUCTION
In the last few years the security and integrity of the data is the most
important concern. Now a day’s almost all the data is transferred over the
computer networks and it has increased the attacks over the network.
Before transmitted data it has to be encrypted and store so that it cannot be
attacked by various attackers. Encryption is a process of hiding the data,
where it converts the original text into cipher text. Encryption uses different
algorithm to encrypt the data into different form. Cryptographic Algorithm
uses a set of keys with the different characters for both encryption and
decryption. By using key the plain text is converted to the cipher text and
decryption is done by converting back the plaintext from the cipher text.
Cryptography is a process of transmitting and storing data in a form that it is
read only by authorised users. Cryptography is a science of protection of
data by encoding it into unreadable form. It is useful way of protecting the
important sensitive information by using mathematical form algorithm for
both encryption and decryption process. The encryption and decryption
process depend on the key value. The strength of the algorithm is how
difficult it is to determine the key value and get the original text . The
algorithm is majorly divided into two types symmetric and asymmetric
depending on the keys. If same keys are used for both encrypting and
decrypting then it is called symmetric algorithm. Symmetric algorithm is
further divided into stream and block ciphers. A stream cipher is done on
the single byte of data, where as the block a cipher is done on the block of
data. Asymmetric algorithm uses two different keys one for encryption and
both for decryption. The key should be kept secret so that the message
should be not be decrypted. The purpose of cryptography is to provide
Authentication (proving the one’s identity), Non-repudiation (the receiver
should know the sender should not be faking), Integrity (data should be
correct, accuracy, and trustworthiness), and Privacy/confidentiality
(message is read by only the intended receiver).
The project focuses on implementing text encryption techniques using
various encryption algorithms in Python. Encryption is essential for securing
sensitive information from unauthorized access, and it plays a critical role in
data transmission over insecure channels.
PROBLEM DEFINITION
Existing System
The model for encryption and decryption of any text is designed with the some
objectives:
algorithms.
MD5 (Message Digest Algorithm 5): A widely used but less secure hashing
function.
TOOLS AND LIBRARIES
User Interface: Allows the user to input text, select the encryption algorithm,
and display the encrypted or hashed text.
Encryption Engine: Contains the logic for each encryption and decryption
process, depending on the algorithm chosen.
The Python application will encrypt text using the selected algorithm and allow
decryption where applicable. Additionally, it will hash text and display
performance metrics, such as the time taken for encryption/decryption and the
security level of each algorithm.
APPLICATIONS