0% found this document useful (0 votes)
28 views

Encryption and Decryption

CBSE Class XI project on Encryption and Decryption

Uploaded by

cupcakesfinding
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Encryption and Decryption

CBSE Class XI project on Encryption and Decryption

Uploaded by

cupcakesfinding
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

NAME: SHUBHANGANA NATH CLASS: XI-I ROLL NO.

30

COMPUTER SCIENCE PROJECT

TITLE: ENCRYPTION AND DECRYPTION

OBJECTIVE OF PROPOSED SYSTEM:


 This system converts “plaintext” into “ciphertext,” using cryptographic
mathematical models known as algorithms.
 In simple words, an algorithm is used to scramble the entered data by changing
each character
 To decode the data back to plaintext requires the use of a decryption key, a string of
numbers or a password also created by an algorithm.
 this is done in such a way that only the parties who have the key to unscramble the
scrambled data can access it.
 Hence, information and data that consumers and businesses rely on every day is
protected.

INPUT AND OUTPUT OF PROPOSED SYSTEM:


First the user has to specify whether he/she wants to encrypt or decrypt data.

For Encryption:
 Input: The “plaintext” or the raw data that is to be encrypted is entered.
 Output: the encrypted data coded according to the shared key comes out as output.

For Decryption:
 Input: the encrypted data which is to be decoded is entered.
 Output: The “plaintext” or the original data comes out as output.

FUNCTIONS AND FEATURES OF PROPOSED SYSTEM:


Features of the project:
 In this project Symmetric encryption also known as a shared key or private key
algorithm has been applied. Here, the same key is used for encryption and
decryption.
 Symmetric keys are considered less expensive to produce and do not take as much
computing power to encrypt and decrypt
 Hence there is less of delay in decoding the data.
NAME: SHUBHANGANA NATH CLASS: XI-I ROLL NO. 30

Encryption and Decryption performs four important functions:


 Confidentiality: keeps the contents of the data secret
 Integrity: verifies the origin of the message or data
 Authentication: validates that the content of the message or data has not been altered
since it was sent
 Nonrepudiation: prevents the sender of the data or message from denying they were
the origin

HARDWARE AND SOFTWARE TO BE USED:


 Hardware: HP Laptop 15s-du1xxx
 Software: Python 3.11.4

SCOPE AND LIMITATIONS OF THE PROJECT:


SCOPE:
 Ways to improve:
 Asymmetric encryption, also known as public-key cryptography can be
used in this project.
 It uses two separate keys to encrypt and decrypt data.
 One is a public key shared among all parties for encryption. Anyone with the
public key can then send an encrypted message, but only the holders of the
second, private key can decrypt the message.
 Hence, this type of encryption is better and more secure than symmetric
encryption as it is harder to decrypt the coded text.

 Applications of this project:


 Protects data across devices:
Data is constantly on the move. Encryption like authentication can help keep data
safe when it moves between devices or servers such as in:
 healthcare data with the Health Insurance Portability and Accountability Act
(HIPAA),
 credit and debit card transactions with Payment Card Industry Data Security
Standard (PCI DSS),
 General Data Protection Regulations (GDPR),
 Retail transaction data with the Fair Credit Practices Act (FCPA).
NAME: SHUBHANGANA NATH CLASS: XI-I ROLL NO. 30

 Ensures data integrity:


encryption safeguards the data so that malicious actors cannot use it to commit
fraud or extortion, or change important documents.
 Protects digital transformations:
In cloud storage, encryption plays a key role in protecting that data while it is in-
transit to the cloud, once it is at rest on the server, and while it’s being processed by
workloads.

LIMITATIONS:

 Losing encryption keys (such as during a natural disaster that compromises servers)
can lock organizations out of important data.
 Malicious actors often concentrate their attacks (brute force attacks) on obtaining an
organization’s encryption keys. The drawback is that if an unauthorized person gets
their hands on the key, they will be able to decrypt any messages and data sent
between the parties. (Specially in symmetric encryption)
 Quantum computing poses an existential threat to modern encryption techniques.
When it is ready, it will be able to find the decryption key trying every potential
combination. Hence, it has the potential to break existing encryption.

PSUEDOCODE:
NAME: SHUBHANGANA NATH CLASS: XI-I ROLL NO. 30

FLOWCHART:

You might also like