Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
encryption decryption full report
Post: #1



Submitted By :
Chandan Gautam
(CSE ËœAâ„¢)

Guided By:
L Ramalingam ,Sr. Lecturer
Department of Computer Science Engineering

Cryptography is the science of writing messages in secret codes .
Cryptography, a word with Greek origins ,means SECRET WRITING.
Cryptography components :

Plaintext : It is original message ,before being transformed .The data are not encrypted.
Ciphertext : After the message is transformed . The data are encrypted.
Alice : Alice is the person who needs to send secure data.
Bob : Bob is the recipient of the data.
Eve : Eve is the person who somehow disturbs the communication between Alice and Bob.

Information is often stored and transmitted in a file.
Encryption algorithm transforms the plain text into cipher text.
A plain text file uses a common encoding format such as ASCII or UNICODE to represent the character of file.
Encryption is a translation of a file into a format that hides the content from EVE ;secret code;ciphertext.

After sending the information by ALICE , BOB receive the information and decrypt the data.
A decryption algorithm transforms the ciphertext back into plaintext.
For decrypting the data receiver uses three types of key :
Secret key
Public key
Private key

Two categories :

Symmetric key cryptography
Asymmetric key cryptography

In symmetric key cryptography,the same key is used by the sender(for Encryption) and the receiver(for Decryption) .
In case of symmetric key,the key is shared.

In asymmetric key cryptography,two types of key is used :


DES encrypts and decrypts at the bit level.
The plaintext are broken into segments of 64 bits.
Each section is encrypted using a 56-bit key. (Fig. 16.3)
Every bit of ciphertext depends on every bit of plaintext and the key.
It is very difficult to guess the bits of plaintext from the bits of ciphertext.
Uses of Encryption & Decryption :
Privacy & Secruty : E-mail message,Wireless network
Confidentiality :Personal records,Transaction records .
Authentication : Digital signatures,Login.
Intellectual Property : Copy protection
Advantage & Disadvantage
Individuals can post their public key on their Web site.
The number of the keys is only twice of the number of user.
The complexity of the algorithm: calculating the ciphertext from plaintext using the long keys takes a lot of time
Post: #2
plz send me encryption decryption full report.
Post: #3
Thanks for this. please i'll need a seminars on xml encryption. The one on the other thread refused to open on my system after i completed the downloads.
Please can you be kind to send a new copy of it to my e-mail. centjay4real[at]

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: algorithm for encryption decryption for rf projects, idea decryption, encryption decryption uml diagrams, encryption decryption methods, m tech thesis report pdf encryption and decryption, seminar report on encryption and decryption, axiomatic eve sedgwick,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 3,647 01-10-2016 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 39,875 03-09-2016 11:20 AM
Last Post: jaseela123
  Employee Cubicle Management System full report computer science technology 4 3,748 07-04-2016 11:37 AM
Last Post: dhanyavp
  e-Post Office System full report computer science technology 27 22,255 30-03-2016 02:56 PM
Last Post: dhanyavp
  college website project full report project report tiger 28 62,706 29-11-2015 02:37 PM
Last Post: Guest
  steganography full report project report tiger 31 29,742 07-07-2015 02:57 PM
Last Post: seminar report asees
  TEA ENCRYPTION (ALGORITHM) computer science technology 1 1,961 11-11-2014 10:45 AM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 1,358 10-11-2014 09:15 PM
Last Post: Guest
  data mining full report project report tiger 35 164,115 07-10-2014 09:10 PM
Last Post: ToPWA
  Visa Processing System full report and asp source code project topics 2 4,496 19-06-2014 06:54 PM
Last Post: seminar report asees