Professional Documents
Culture Documents
Contents
1. Introduction3 2. Brief Literature Survey...4 3. Problem Formulation..5 4. Objectives...5 5. Methodology..6 6. Facilities Required..6
1. Introduction
The title of our project is ENCRYPTION AND DECRYPTION. This project encrypts and decrypts the text by using cryptographic algorithm. Encryption and Decryption is a strong text and file encryption software for personal and professional security. Cryptography is the science of information security. The word is derived from the Greekkryptos, meaning hidden. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plain text(ordinary text, sometimes referred to as clear text) into cipher text (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers. Modern cryptography concerns itself with the following four objectives: 1) Confidentiality (the information cannot be understood by anyone for whom it was unintended) 2) Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected) 3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information) 4) Authentication (the sender and receiver can confirm each others identity and the origin/destination of the information) Procedures and protocols that meet some or all of the above criteria are known as cryptosystems. Cryptosystems are often thought to refer only to mathematical procedures and computer programs; however, they also include the regulation of human behaviour, such as choosing hard-to-guess passwords, logging off unused systems, and not discussing sensitive procedures with outsiders.
3. Problem Formulation
The aim of our project is to develop software named ENCRYPTION AND DECRYPTION.The project encrypts and decrypts the textual files using cryptographic algorithm to maintain the security and integrity of data and information and to provide high protection against unauthorized data access. Our target is the common man who wants to interact electronically, whether it is through emails
4. Objectives
1.The main objective of our project is to encrypt/decrypt the textual files for personal and professional security. Encryption and Decryption protects privacy of our messages,
documents by encrypting them using a cryptographic algorithm to provide high protection against unauthorized data access. 2. The system provides the security and integrity of data or information. 3. It will provide a more clear and non ambiguous description of the functions. 4. The system is highly user friendly. 5. It uses two different keys (a key pair) for encryption and decryption.These algorithms are called "public-key" because the encryption key can be made public. Anyone can use the public key to encrypt a message, butonly the owner of the corresponding private key can decrypt it. 6. The software provides clarity in its functionality even to nave users.
5. Methodology
Client Side:-