You are on page 1of 7

Project Synopsis ON ENCRYPTION AND DECRYPTION

Contents
1. Introduction3 2. Brief Literature Survey...4 3. Problem Formulation..5 4. Objectives...5 5. Methodology..6 6. Facilities Required..6

1. Introduction
The title of our project is ENCRYPTION AND DECRYPTION. This project encrypts and decrypts the text by using cryptographic algorithm. Encryption and Decryption is a strong text and file encryption software for personal and professional security. Cryptography is the science of information security. The word is derived from the Greekkryptos, meaning hidden. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plain text(ordinary text, sometimes referred to as clear text) into cipher text (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers. Modern cryptography concerns itself with the following four objectives: 1) Confidentiality (the information cannot be understood by anyone for whom it was unintended) 2) Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected) 3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information) 4) Authentication (the sender and receiver can confirm each others identity and the origin/destination of the information) Procedures and protocols that meet some or all of the above criteria are known as cryptosystems. Cryptosystems are often thought to refer only to mathematical procedures and computer programs; however, they also include the regulation of human behaviour, such as choosing hard-to-guess passwords, logging off unused systems, and not discussing sensitive procedures with outsiders.

2. Brief Literature Survey


In recent times, cryptography has turned into a battleground of some of the world's best mathematicians and computer scientists. The ability to securely store and transfer sensitive information has proved a critical factor in success in war and business. Because governments do not wish certain entities in and out of their countries to have access to ways to receive and send hidden information that may be a threat to national interests, cryptography has been subject to various restrictions in many countries, ranging from limitations of the usage and export of software to the public dissemination of mathematical concepts that could be used to develop cryptosystems. However, the Internet has allowed the spread of powerful programs and, more importantly, the underlying techniques of cryptography, so that today many of the most advanced cryptosystems and ideas are now in the public domain. Today's cryptography is vastly more complex than its predecessor. Unlike the original use of cryptography in its classical roots where it was implemented to conceal both diplomatic and military secrets from the enemy, the cryptography of today, even though it still has farreaching military implications, has expanded its domain, and has been designed to provide a cost-effective means of securing and thus protecting large amounts of electronic data that is stored and communicated across corporate networks worldwide. Cryptography offers the means for protecting this data all the while preserving the privacy of critical personal financial, medical and e-commerce data that might end up in the hands of those who shouldnt have access to it.

3. Problem Formulation
The aim of our project is to develop software named ENCRYPTION AND DECRYPTION.The project encrypts and decrypts the textual files using cryptographic algorithm to maintain the security and integrity of data and information and to provide high protection against unauthorized data access. Our target is the common man who wants to interact electronically, whether it is through emails

4. Objectives
1.The main objective of our project is to encrypt/decrypt the textual files for personal and professional security. Encryption and Decryption protects privacy of our messages,

documents by encrypting them using a cryptographic algorithm to provide high protection against unauthorized data access. 2. The system provides the security and integrity of data or information. 3. It will provide a more clear and non ambiguous description of the functions. 4. The system is highly user friendly. 5. It uses two different keys (a key pair) for encryption and decryption.These algorithms are called "public-key" because the encryption key can be made public. Anyone can use the public key to encrypt a message, butonly the owner of the corresponding private key can decrypt it. 6. The software provides clarity in its functionality even to nave users.

5. Methodology

6. Facilities Required for Proposed Work


Server Side:-

Client Side:-

You might also like