You are on page 1of 18

Report on

CRPTOGRAPHY
Submitted in partial fulfillment of the
requirements for the

Diploma in Information

Technology Diksha gupta


Vaibhavi pawar
Mohit patil
Aditya kalal

Under the guidance of


Miss. Apurva mam

Department of INFORMATION TECHNOLOGY

Shivajirao.S.Jondhale Polytechnic, Ambernath

(Maharashtra)

Maharashtra State Board of Technical


Education
(2023-2024)

MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION

Certificate
This is to certify that Mr./Ms. of 6th Semester of Diploma in
INFORMATION TECHNOLOGY of Institute,
SHIVAJIRAO SAMARTH JONDHALE
POLYTECHNIC (Code:0147) has completed the Micro Project
satisfactorily
Sr. No in Name
Subject:
of NIS
groupfor the academic
Rollyear
No (2023- 2024) as prescribed
Enrollment No in the
curriculum. members

1. Diksha Gupta 1503


2. Vaibhavi pawar 1516
3.
Mohit patil 1513
4.
Aditya kalal 1507
Place: AMBERNATH.

Date:

Subject Teacher Head of the Department Principal


Group Details:

Sr.N o Name of group Roll No Enrollment No


members

1. Diksha gupta 1503 2101470140

2. Vaibhavi pawar 1516 2101470145

3. Mohit patil 1513 2101470143

4. Aditya kalal 1507 2101470155


Name of Guide
Mrs. Jagruti Patil
WEEKLY PROGRESS REPORT

SR.NO. WEEK ACTIVITY SIGN OF GUIDE DATE


PERFORMED
1
Discussion and
finalization of topic
2 Preparation and
submission
of Abstract
3 Literature Review

4 Collection of Data

5 Collection of Data

6 Discussion and
outline of
Content
7 Formulation of Content

8 Editing and proof


Reading of
Content
9 Compilation of Report
And
Presentation
10 Seminar

11 Viva voce

12 Final submission of
Micro
Project

Sign of the student Sign


Index:-

Sr.no Topic

1. Introduction

2. Methodoly

3. Abstract

4. Key techniques of crptography

5. Literature Review

6. Advantages and Disadvavtages

7. Conclusion

8. Reference
Introduction

Cryptography, a field at the intersection of mathematics, computer


science, and information security, is the art and science of securing
communication and data through the use of mathematical techniques
and algorithms. It involves the transformation of plaintext into
ciphertext in such a way that it becomes unintelligible to
unauthorized parties, ensuring confidentiality. This transformation is
achieved through encryption, where a cryptographic algorithm and a
secret key are used to scramble the plaintext into ciphertext.
Decryption, the reverse process, allows authorized parties to convert
the ciphertext back into plaintext using the same algorithm and the
corresponding key. Beyond confidentiality, cryptography also
addresses other security goals such as integrity, ensuring that the
data remains unchanged during transit or storage, and authenticity,
verifying the identity of communicating parties. Techniques like
digital signatures provide non-repudiation, meaning that the sender
of a message cannot deny having sent it.
Methodology
Definition:-Cryptography is the practice and study of secure
communication techniques that enable the transformation of
information in order to make it unreadable to anyone except
those who are authorized to access it. It involves techniques
such as encryption, decryption, and key management to
ensure the confidentiality, integrity, authentication, and non-
repudiation of data. Types of cryptography :-Cryptography
can be broadly categorized into two main types:Symmetric
Cryptography: Also known as secret-key cryptography,
symmetric cryptography involves the use of a single secret
key for both encryption and decryption of data. Both the
sender and the receiver share the same key, which must be
kept confidential. Symmetric algorithms are typically faster
and more efficient than their asymmetric counterparts,
making them suitable for encrypting large volumes of data.
Examples include AES (Advanced Encryption Standard), DES
(Data Encryption Standard), and 3DES (Triple
DES).Asymmetric Cryptography: Asymmetric cryptography,
also referred to as public-key cryptography, employs a pair of
keys: a public key and a private key. The public key is widely
distributed and used for encryption, while the private key is
kept secret and used for decryption. This allows for secure
communication between parties without the need to exchange
secret keys beforehand. Asymmetric cryptography enables
functionalities such as digital signatures and key exchange
protocols. Common asymmetric algorithms include RSA
(Rivest- Shamir-Adleman), ECC (Elliptic Curve Cryptography),
and DSA (Digital Signature Algorithm).
Abstract :
.

Cryptography, a fundamental aspect of modern


communication and information security, is the science and
practice of securing sensitive data through encryption and
decryption techniques. This paper provides an overview of
cryptography, exploring its historical roots, core principles,
and contemporary applications. It delves into the basic
concepts of encryption, decryption, and key management,
elucidating their roles in ensuring confidentiality, integrity,
authenticity, and non-repudiation of data. Additionally, the
paper discusses various cryptographic algorithms and
protocols commonly used in real-world scenarios,
highlighting their strengths, weaknesses, and suitability for
different use cases. Moreover, it examines emerging trends
and challenges in cryptography, such as quantum computing
threats and post-quantum cryptography solutions.
Understanding cryptography is imperative for individuals
and organizations seeking to protect their digital assets and
maintain trust in the increasingly interconnected world of
cyberspace.
Key techniques of cryptography:-

Cryptography employs several techniques to secure


communication and data. Here are some key techniques:
1,Encryption: Encryption transforms plaintext into ciphertext
using cryptographic algorithms and keys. There are two
main types of encryption techniques: symmetric encryption,
where the same key is used for both encryption and
decryption, and asymmetric encryption, where different keys
are used for encryption and decryption.
2.Decryption: Decryption is the process of converting
ciphertext back into plaintext using the appropriate
cryptographic keys and algorithms. It reverses the
encryption process to recover the original message or data.
3.Hashing: Hashing converts data into a fixed-size string
of characters, called a hash value or digest, using a hash
function. Hashing is commonly used to verify data integrity,
authenticate messages, and securely store passwords.
4.Digital Signatures: Digital signatures provide a way to
verify the authenticity and integrity of digital documents or
messages. They involve the use of asymmetric encryption to
create a unique digital signature that can only be produced
by the sender's private key and verified using the sender's
public key.
5. Key Management: Key management encompasses the
generation, distribution, storage, and revocation of
cryptographic keys. It ensures that keys are securely
managed throughout their lifecycle to maintain the
confidentiality and integrity of encrypted data.
6. Steganography: Steganography is the practice of concealing
secret information within non-secret data, such as images,
audio files, or text. It aims to hide the existence of the secret
message rather than encrypting it, providing an additional
layer of security
.7. Cryptographic Protocols: Cryptographic protocols define
rules and procedures for secure communication and data
exchange over networks. Examples include SSL/TLS for
secure web browsing, SSH for secure remote login, and
IPsec for securing IP communications.These techniques
work together to provide various security services, such as
confidentiality, integrity, authentication, and non-repudiation,
to protect sensitive information and communication channels
from unauthorized access and manipulation
What problems does cryptography solve?

A secure system should provide several assurances such as


confidentiality, integrity, and availability of data as well as
authenticity and non-repudiation. When used correctly, crypto
helps to provide these assurances. Cryptography can ensure the
confidentiality and integrity of both data in transit as well as data at
rest. It can also authenticate senders and recipients to one another
and protect against repudiation.

It can protect communications that traverse untrusted networks.


There are two main types of attacks that an adversary may attempt
to carry out on a network. Passive attacks involve an attacker
simply listening on a network segment and attempting to read
sensitive information as it travels. Passive attacks may be online
(in which an attacker reads traffic in real-time) or offline (in which
an attacker simply captures traffic in real-time and views it later—
perhaps after spending some time decrypting it). Active attacks
involve an attacker impersonating a client or server, intercepting
communications in transit, and viewing and/or modifying the
contents before passing them on to their intended destination (or
dropping them entirely).

It can also be used to protect data at rest. Data on a removable


disk or in a database can be encrypted to prevent disclosure of
sensitive data should the physical media be lost or stolen. In
addition, it can also provide integrity protection of data at rest to
detect malicious tampering.
Literature review

The literature on cryptography spans various


dimensions, from its historical origins to
contemporary advancements. Scholars like Kahn
and Singh have meticulously documented its
evolution, tracing techniques from ancient
civilizations to modern-day cryptographic
algorithms. Core principles, elucidated by Stinson,
Katz, and Paar, encompass symmetric and
asymmetric encryption, hash functions, digital
signatures, and key management, forming the
bedrock of cryptographic theory.In response to
emerging challenges, recent literature explores
quantum implications and post-quantum
cryptography. Works by Biham, Shor, and Grover
shed light on cryptanalysis in the quantum realm,
while Boneh and Gentry's research advances
homomorphic encryption, ensuring secure
computation in cloud environments. Despite its rich
history, cryptography continues to evolve, driven by
emerging technologies and the imperative to secure
digital communication in an interconnected world.
How does cryptography work?

Cryptography works by taking plaintext (or cleartext) and


scrambling it into ciphertext, so that the encoded output can be
understood only by the intended recipient. As ciphertext, the
information should be unreadable to all except the intended
recipient.

In cybersecurity, encryption is most often used to scramble


plaintext into ciphertext — while decryption reverses the
process. The best encryption software uses complicated
cryptographic algorithms that are incredibly difficult to crack.

Cryptography uses encryption to encode and decode data.In


asymmetric encryption, a public key is used to encrypt a
message and a private key is used to decrypt it.

The exact technique used to scramble plaintext into ciphertext


defines how cryptography works. Symmetric encryption,
asymmetric encryption, blockchain, and digital signatures are
some prominent encryption techniques. Hashing, another
cryptographic process, is not technically encryption, since it
doesn’t use keys.
Advantages and disadvantages :
Advantages of Cryptography:

1. Privacy: It keeps sensitive information safe by turning it


into unreadable code.
2.Data Integrity: It ensures that data hasn't been
tampered with by creating unique signatures for files.
3. Authentication: It confirms the identity of people or
systems, making sure messages come from trusted
sources.
4.Accountability: It prevents denial of actions by
providing proof of who sent or received a message
5.Secure Communication: It allows for safe
communication online, protecting data from being stolen.

Disadvantages of Cryptography:

1. Key Management Complexity: Handling encryption keys


can be complicated, requiring careful management
2.Slower Performance: Encrypting and decrypting data
can slow down systems, especially on older devices.
3.Vulnerabilities: Some encryption methods may
have weaknesses that attackers can exploit.
4.Compatibility Issues: Different systems may use
incompatible encryption methods, causing problems when
trying to share data
.5. Overreliance: Relying solely on encryption can lead to
overlooking other security measures needed to fully protect
systems and data.
Conclusion :
In conclusion, cryptography plays a crucial role in
safeguarding information and communication in today's
digital world. By employing encryption, decryption, and other
techniques, cryptography ensures the confidentiality,
integrity, authenticity, and non-repudiation of data. Despite
its advantages in protecting sensitive information and
enabling secure communication, cryptography also faces
challenges such as key management complexity,
performance overhead, and vulnerabilities. However,
ongoing research and advancements continue to address
these challenges and enhance the effectiveness of
cryptographic techniques. Overall, cryptography remains a
cornerstone of modern information security, enabling
individuals and organizations to communicate, collaborate,
and transact securely in an increasingly interconnected
environment.
Reference :-

• https://www.nationalgeographic.org/encyclopedia/noise-
pollution/
• https://www.eea.europa.eu/articles/noise-pollution-is-a-
major
• https://www.iberdrola.com/sustainability/what-is-noise-
pollution-causes-effects-solutions
• https://www.iberdrola.com/sustainability/what-is-noise-
pollution-causes-effects-solutions
Shivajirao S. Jondhale Polytechnic, Ambernath
(E)

Teacher Evaluation Sheet

Academic Year 2023-2024

Program Title: crptography


Course Title & Code: N.I,S.
Semester: Sixth Semester.

Course Outcomes
Achieved:
a) Interpret features of
Android operating
system.

b) Configure Android
environment and
development tools.

c) Develop rich user


Interface by using
layout and controls.

d) Use User Interface


components for android
application
development.
Skill Developed / Learning
outcomes of this Micro-
Project:
Marks
Marks Marks obtained Total
for by Marks(A+
group the individual B)
Roll no. Name of student work A based n Viva
(out of B (out of 6)
4)

1. Diksha gupta

2. Vaibhavi pawar

3. Mohit patil

4. Aditya kalal
Name and signature of faculty:

You might also like