You are on page 1of 14

DSP PROJECT

SIMPLE ENCRYPTION AND DECRYPTION TOOL USING AES-128

Name – Subhrajyoti Mall Roll no – D21035

Name - PONDI DEEPAK PANI Roll no – D21025

Name – Kunal M Virmani Roll no – D21019

Name- Bondada Manoj Kumar Roll no – D21008


WHY ENCRYPTION IS NECESSARY ?

 In this day and age cyber criminals are after data which must be protected to keep organizations viable and
successful.
 For which, businesses must be well-versed in encryption methods and communications to help protect their own
and their customers’ sensitive data.
 There are many aspects to security and many applications, ranging from secure commerce and payments to private
communications and protecting passwords. One essential aspect for secure communications is that of encryption.
ENCRYPTION & DECRYPTION

Encryption:-
Is the process through which data is encoded so that it remains hidden from or inaccessible to unauthorized users. It
helps protect private information, sensitive data, and can enhance the security of communication between client apps
and servers. In essence, when your data is encrypted, even if an unauthorized person or entity gains access to it, they
will not be able to read it.

Decryption:-
The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of
encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because
decryption requires a secret key or password.
A - Sender
B - Receiver

Click icon to add picture


SYMMETRIC ENCRYPTION

Symmetric – With a symmetric algorithm, both encryption and decryption keys are the same, so the same key
must be used to enable secure communication. Symmetric algorithm encryptions are commonly used for bulk
data encryption and are fast and easily implemented by hardware.
Some examples of symmetric encryption algorithms include:
• AES (Advanced Encryption Standard), DES (Data Encryption Standard), IDEA (International Data
Encryption Algorithm), Blowfish (Drop-in replacement for DES or IDEA)
Advantages of Symmetric Encryption:
• Security: symmetric encryption algorithms like AES take billions of years to crack using brute-force attacks.
• Speed: symmetric encryption, because of its shorter key lengths and relative simplicity compared to
asymmetric encryption, is much faster to execute.
ASYMMETRIC ENCRYPTION

The problem with symmetric encryption is with its key distribution mechanisms. To overcome this problem,
asymmetric encryption is used.
Asymmetric - In asymmetric algorithm encryption, two separate but mathematically linked encryption keys are
used. A public key is used to encrypt the data and can be distributed while the private key is used to decrypt the data
and, therefore, is kept private. Through the use of a private key, asymmetric encryption eliminates the preliminary
exchange of secret keys, allows for public key to be shared with anyone.
The disadvantages are that it is slower than symmetric algorithm encryption and that it requires greater computation
power.
Examples of Asymmetric Algorithms:
Rivest Shamir Adleman (RSA), The Digital Signature Standard (DSS), which incorporates the Digital Signature
Algorithm (DSA), Elliptical Curve Cryptography (ECC), The Diffie-Hellman exchange method
SYMMETRIC ENCRYPTION USING AES

 The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect
classified information.
 AES is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for
government computer security, cybersecurity and electronic data protection.
 AES encryption refers to the process of concealing electronic data using an approved 128-bit, 192-bit, or 256-bit
symmetric encryption algorithm from the Advanced Encryption Standard (AES)
 Microsoft Windows’ BitLocker encryption technology uses 128-bit and 256-bit AES encryption by default.
 All data at the storage level of Google Cloud is encrypted using 256-bit AES encryption by default. 
 WhatsApp messages, are encrypted using 256-bit AES encryption.
OVERVIEW OF AES

 The AES algorithm uses a substitution-permutation,


with multiple rounds to produce ciphertext.
 There are 10 rounds for 128-bit keys, 12 rounds for
192-bit keys and 14 rounds for 256-bit keys. A round
consists of several processing steps that include
substitution, transposition and mixing of the
input plaintext to transform it into the final output
of ciphertext.
 Each of these rounds requires a round key, but since
only one key is inputted into the algorithm, this key
needs to be expanded to get keys for each round.
STEPS IN EACH ROUND OF AES

Generation of round keys: At first a round key is generated through a process called key expansion where the
original secret key is used to derive round keys using Rijndael’s key schedule algorithm.
1. Add Round key: This involves combining each round key that has been generated above with the plain message
being encrypted. This is done using the Additive XOR algorithm.
2. Substitute bytes: This involves substituting the resultant data from step 1 using a predetermined table.
3. Shift rows: First row is not moved. The second row is moved one space to the left, the third row is moved two
spaces to the left, and the fourth row is moved three spaces to the left.
4. Mix columns: An algorithm( Hill cipher ) is used to mix the contents of each column.
This process continues multiple times depending on the bits. Decryption is done by performing the above steps in a
reverse order.
How to Overcome Vulnerability of Symmetric Encryption

Usually RSA encryption is used in combination with other encryption.


A file will generally be encrypted with a symmetric-key algorithm, and then the symmetric key will be encrypted
with RSA encryption. Under this process, only a person that has access to the RSA private key will be able to decrypt
the symmetric key.
Without being able to access the symmetric key, the original file can’t be decrypted. This method can be used to keep
messages and files secure, without taking too long or consuming too many computational resources.
How RSA Works ?

 For two person to communicate securely, First, they need to set up their own key pairs and share the public key
with one another. The two person need to keep their private keys secret in order to keep their communications
secure.
 Once it has been encrypted with a public key, it can only be decrypted by the private key from the same key pair.
Even the same public key can’t be used to decrypt the data.
PICTORIAL REPRESENTATION OF RSA ENCRYPTION
THANK YOU
WEB APPLICATION

 Click on the link to access the website

You might also like