0% found this document useful (0 votes)
868 views

Cryptography: A Project Report On

This project report discusses cryptography and its applications. It describes cryptography as the basis for security in computer networking and data communication. It outlines the key components of cryptography including the sender, encryption, decryption, plaintext and ciphertext. It also categorizes cryptography into symmetric and asymmetric key cryptography. Symmetric cryptography uses the same key for encryption and decryption while asymmetric cryptography uses two separate keys: a private key and a public key. The report highlights advantages like preventing illegal data access and ensuring only intended receivers can access transmitted data. It concludes by noting cryptography's most common applications in fields like information technology, computer science, banking and for some national purposes.

Uploaded by

Mayank Kumar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
868 views

Cryptography: A Project Report On

This project report discusses cryptography and its applications. It describes cryptography as the basis for security in computer networking and data communication. It outlines the key components of cryptography including the sender, encryption, decryption, plaintext and ciphertext. It also categorizes cryptography into symmetric and asymmetric key cryptography. Symmetric cryptography uses the same key for encryption and decryption while asymmetric cryptography uses two separate keys: a private key and a public key. The report highlights advantages like preventing illegal data access and ensuring only intended receivers can access transmitted data. It concludes by noting cryptography's most common applications in fields like information technology, computer science, banking and for some national purposes.

Uploaded by

Mayank Kumar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10

A project report on

Cryptography

Guided by Submitted by
Ms. Shikha gupta Mr. Rahul patel
Mr. Akalesh nayak
Contents
 Security in computer networking
 Cryptography and its components
 Categories of cryptography
 Symmetric cryptography
 Asymmetric cryptography
 Advantages
 Application
Security in data communication and
computer networking is based on

Cryptography
Cryptography components
 Sender
 Encryption
 Decryption
 plaintext
 Ciphertext
 Receiver
Categories of cryptography
Symmetric key cryptography
 In symmetric key cryptography ,the same
key is used by both parties .
 The sender uses this key to encrypt data
and receiver uses decrypt data.
Asymmetric key cryptography

 In asymmetric key cryptography, there are two


keys ..
1. Private key
2. Public key
Advantages

 No chance of illegal uses of our private


data after hacking by another person.
 After transmitting data by the sender ,it
can be read or listen or watched by main
receiver.
 This technique is very special in
commercial field.
Application
 It is mostly used in IT and CS field
due to their secret writing .
 In banking and some national
purposes.
 It is also used in other commercial
fields.
Thank You

You might also like