Professional Documents
Culture Documents
Why Cryptography ?
We all know that now a day this is the world of information technology and
almost everyone have to communicate with each other. Most of the time this
communication occurs on the network. During the communication of data it
may be possible that the data we are sending or receiving can be hacked or
edited by someone. The data we are communicating may be bank a/c number,
passwords or some important files etc. To protect the data from this type of
unwanted things “Cryptography” is very useful.
This project is all about providing security while communicating any data on
the network between two or many user. We are going to discuss about the main
ciphers used in Cryptography in this project.
There are various techniques of encryption and decryption which are used in
this project such as
Shift or Substitution cipher
Monoalphabetic cipher
Playfair cipher
Vegenere cipher
Authentication
Privacy/Confidentiality
Integrity
Non-repudiation
Cryptography, then not only protect data from theft or alteration, but
can also be used for user authentication.
3. Objective
4. System Specification
Hardware
Software
5. Future Scope
6. Conclusion
Introduction
The word cryptography or cryptology comes from an Ancient Greek. The word
cryptology is made of two components ”crypto”, which means hidden or secret
and “logos” which means word. It is a Science of writing in secret code.
Cryptography is the study of techniques for secure communication.
There are two important concepts of cryptography, first one is Encryption &
the second one is Decryption. Encryption is the process in which the plain text
is changed into cipher Text & decryption is just reverse process of encryption
that means cipher text is changed into plain text. There are various techniques
of Encryption & Decryption which are used in this project such as Shift Cipher,
Playfair Cipher, Monoalphabetic Cipher, Vanier Cipher.
We use the term cryptography to refer to the science and art for transforming
message to make them secure from attacks.
The original message before being transformed is called ”Plaintext”. After the message
is transformed is called ”Ciphertext”. An encryption algorithm transform the Plaintext
into Ciphertext & a decryption algorithm transforms the Ciphertext back into Plaintext.
( Plaintext ) ( Plaintext )
Hello World! Hello World!
( ciphertext )
#%GIUYRWKMN,S:{?
Encryption Decryption
i) Files
ii) Messages
4. User will be able to use their own keys to encrypt the data.
SYSTEM SPECIFICATION
SOFTWARE REQUIREMENTS :
OPERATING SYSTEM : WINDOWS XP / 7
FRONT END : C#.net
BACK END : SQL Server
HARDWARE REQUIREMENTS :
Processor : Pentium IV & above
Processor Speed : 1 G Hz
RAM : 2 GB
Hard Disc : 10 GB
TABLES
LOGIN TABLE :
Member_id int
Password char 20
(FOREIGN KEY)
MEMBER DETAIL TABLE
Member_id int
Name char 20
Mobile char 10
Email_id char 30
Address Char 50
(Primary Key)
LOG TABLE
Member_id int
Data datetime
Type char 10
(FOREIGN KEY)
LOGS
MEMBER IN LOGIN
History
Record
Member
id
File
Name
LOG
Data
Type
TYPES OF CRYPTOGRAPHIC ALGORITHMS
Defined by their application and use. The three types of algorithms that will be
3. Hash Function
SECRET KEY (SKC)
Single key used to encrypt and decrypt .
Encrypt Decrypt
Recipient
Sender
Shared Secret
Key
PUBLIC KEY (PKC)
Tw o d i f f e r e n t k e y s a r e u s e d i n t h i s c r y p t o g r a p h y
H
Message A Digest
( variable size ) S ( fixed size )
H
F i n a l l y, w e c a n s a y t h a t i n t h i s
project development we have
learnt a lot and during the process
we will get the chance to explore
cryptography and the concepts
involved.