Encryption And Decryption
Click here to load reader
-
Upload
sk-singh -
Category
Self Improvement
-
view
465 -
download
1
Transcript of Encryption And Decryption
![Page 1: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/1.jpg)
Text Encryption and Decryption
Developed By:
Shashi Kr. Singh (1150986)
Sandeep Prasad (1150980)
Sumit Kumar (1150994)
Rishabh Anand (1150967)
Submitted To:
Rupinder Kaur GurmDepartment of Computer Science
RIMT-Institute of Engineering & Technology
Punjab ( India.)
![Page 2: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/2.jpg)
Table of Content
1. Introduction
2. Text Encryption
3. Text Decryption
4. Feasibility-Study
5. Methodology
6. Purpose of Project
7. System Requirements
![Page 3: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/3.jpg)
The process of converting plaintext into
ciphertext
The process of converting ciphertext into
plaintext
Introduction
Encryption
plaintext
message
ciphertext
message
Encryption
Decryption
Decryption
![Page 4: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/4.jpg)
• Encryption is a process wherebyplaintext is converted into or ciphertext.
EncryptionPlaintext X Ciphertext Y
Key K
Text Encryption
The original unaltered contents of themessage or text is called plaintext.
![Page 5: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/5.jpg)
• Decryption is the reverse process of
encryption or encipherment, which is to
convert ciphertext back to its original form of
plaintext.
DecryptionCiphertext Y Plaintext X
Key K
Text Decryption
The altered text after encryption is called as
enciphered text or ciphertext.
![Page 6: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/6.jpg)
• Decryption process needs to use the same key
that is used in the encryption process to obtain
the original plaintext.
• Although one may obtain a copy of the
encrypted message, one must use the correct
key to successfully decrypt the message.
Text Decryption
![Page 7: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/7.jpg)
Feasibility-Study
![Page 8: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/8.jpg)
Methodology
![Page 9: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/9.jpg)
Purpose of Project
• Provides security
• File encryption
• Communication encryption
• Network traffic encryption
• Password manager
• Single sign-on
![Page 10: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/10.jpg)
System Requirements
• Turbo C & C++ and Dev-C
• Works on Windows 7, XP, Vista and 8
• Works on 64 bit Windows & 32 bit Windows
• Mac OS X 10.3 and above
Software Requirements
Hardware Requirements
• Intel Pentium 4 or above
• Floppy-Drive
• CD-ROM drive
• 10 GB of free hard-disk
• keyboard and mouse
• RAM(minimum 512 MB)
![Page 11: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/11.jpg)
Friends…. Any Question ?
![Page 12: Encryption And Decryption](https://reader038.fdocuments.net/reader038/viewer/2022100518/559a03dc1a28aba85c8b46d5/html5/thumbnails/12.jpg)