You are on page 1of 20

“Cryptography”

Why Cryptography ?

We all know that now a day this is the world of information technology and
almost everyone have to communicate with each other. Most of the time this
communication occurs on the network. During the communication of data it
may be possible that the data we are sending or receiving can be hacked or
edited by someone. The data we are communicating may be bank a/c number,
passwords or some important files etc. To protect the data from this type of
unwanted things “Cryptography” is very useful.
 This project is all about providing security while communicating any data on
the network between two or many user. We are going to discuss about the main
ciphers used in Cryptography in this project.

 There are various techniques of encryption and decryption which are used in
this project such as
 Shift or Substitution cipher
 Monoalphabetic cipher
 Playfair cipher
 Vegenere cipher

 Within the context of application-to-application communication, there are some


specific security requirements, including:

 Authentication
 Privacy/Confidentiality
 Integrity
 Non-repudiation
 Cryptography, then not only protect data from theft or alteration, but
can also be used for user authentication.

 There are, in general two types of Cryptographic schemes typically


used to accomplish these goal:

(1) Private–key ( or symmetric ) cryptography

(2) Public-Key ( or asymmetric ) cryptography

 In all the cases,


 The initial unencrypted data is referred to as “plaintext”.
 The encrypted data is referred to as “cipher text”.
(which will in turn (usually) be decrypted into usable plaintext)
1. Introduction
1.1 Introduction to Cryptography
1.2 Types of Cryptographic Algorithm
1.2.1 Secret key Cryptography
1.2.2 Public Key Cryptography
1.2.3 Hash Function
2. Purpose

3. Objective

4. System Specification
 Hardware
 Software

5. Future Scope

6. Conclusion
Introduction
 The word cryptography or cryptology comes from an Ancient Greek. The word
cryptology is made of two components ”crypto”, which means hidden or secret
and “logos” which means word. It is a Science of writing in secret code.
Cryptography is the study of techniques for secure communication.

 There are two important concepts of cryptography, first one is Encryption &
the second one is Decryption. Encryption is the process in which the plain text
is changed into cipher Text & decryption is just reverse process of encryption
that means cipher text is changed into plain text. There are various techniques
of Encryption & Decryption which are used in this project such as Shift Cipher,
Playfair Cipher, Monoalphabetic Cipher, Vanier Cipher.

 We use the term cryptography to refer to the science and art for transforming
message to make them secure from attacks.
 The original message before being transformed is called ”Plaintext”. After the message
is transformed is called ”Ciphertext”. An encryption algorithm transform the Plaintext
into Ciphertext & a decryption algorithm transforms the Ciphertext back into Plaintext.

( Plaintext ) ( Plaintext )
Hello World! Hello World!
( ciphertext )

#%GIUYRWKMN,S:{?

Encryption Decryption

( Shared Secret Key )


Objective
1. To d e v e l o p a s o f t w a r e i n w h i c h w e w i l l i n p u t :

i) Files
ii) Messages

and we will get encrypted files or messages.

2. The encrypted information can be used in the network


(local or internet) in a safe and secured way

3. The software can also be used to decrypt the encrypted data


in the original form

4. User will be able to use their own keys to encrypt the data.
SYSTEM SPECIFICATION

SOFTWARE REQUIREMENTS :
 OPERATING SYSTEM : WINDOWS XP / 7
 FRONT END : C#.net
 BACK END : SQL Server

HARDWARE REQUIREMENTS :
 Processor : Pentium IV & above
 Processor Speed : 1 G Hz
 RAM : 2 GB
 Hard Disc : 10 GB
TABLES
LOGIN TABLE :

COLUMNS DATA TYPE SIZE

Member_id int

Password char 20

Security Question char 30

Security Answer char 20

(FOREIGN KEY)
MEMBER DETAIL TABLE

COLUMNS Data Type Size

Member_id int

Name char 20

Mobile char 10

Email_id char 30

Address Char 50

(Primary Key)
LOG TABLE

Columns Data Type Size

Member_id int

File name char 20

Data datetime

Type char 10

(FOREIGN KEY)

Encryption & Decryption


Mob Email
Name no. Security
id Password
Question

MEMBER MEMBER Security


id Address id Answer

LOGS
MEMBER IN LOGIN

History
Record

Member
id
File
Name

LOG
Data

Type
TYPES OF CRYPTOGRAPHIC ALGORITHMS

 There are several ways of classifying cryptographic algorithm.

 Defined by their application and use. The three types of algorithms that will be

discussed are as follows.

1. Secret key Cryptography(SKC)

2. Public Key cryptography(PKC)

3. Hash Function
SECRET KEY (SKC)
Single key used to encrypt and decrypt .

Key must be known by both parties.

Plaintext Ciphertext Plaintext

Encrypt Decrypt
Recipient
Sender

Same Key is used to


Encr ypt and Decr ypt data

Shared Secret
Key
PUBLIC KEY (PKC)
 Tw o d i f f e r e n t k e y s a r e u s e d i n t h i s c r y p t o g r a p h y

One key is used for encryption & other for decryption

Plaintext Ciphertext Plaintext

Encrypt Decrypt Recipient


Sender

Different Keys are used to


Encrypt and Decrypt data

Recipient Public Recipient Private


Key Key
HASH FUNCTION
 Hash is a function which is used to compress the string.

 The input in the hash function is known as “Message” and


output is called “Digest”.

H
Message A Digest
( variable size ) S ( fixed size )
H

 Hash functions have four main properties :


 It is easy to compute the hash value for any given message.
 It is infeasible to generate a message from its hash.
 It is infeasible to modify a message without changing the hash.
 It is infeasible to find two different message with the same hash.
Future scope

Our project(system) can do the cryptography by


encrypting and decrypting data. We are dependent
on other mailing systems Like – gmail, yahoo etc for
information transfer.

In future we can add the information transfer


module so that after encryption users can transfer
information by the same software.
CONCLUSION

F i n a l l y, w e c a n s a y t h a t i n t h i s
project development we have
learnt a lot and during the process
we will get the chance to explore
cryptography and the concepts
involved.

You might also like