0% found this document useful (0 votes)
14 views

Encryption

Uploaded by

Ajay Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Encryption

Uploaded by

Ajay Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

ENCRYPTION AND DECRYPTION

Submitted by

LOGANATHAN.M

920322104025

In partial fulfillment for the award of the degree

BACHELOR OF ENGINEERING IN

COMPUTER SCIENCE AND ENGINEERING

SB8026 - ROBOTIC PROCESS AUTOMATION DEVELOPMENT


NAAN MUDHALVAN

CHRISTIAN COLLEGE OF ENGINEERING AND


TECHNOLOGY

ODDANCHATRAM - 624619

NOVEMBER 2024

Supervised by

V. KEERTHIKA , M.E
BONAFIDE CERTIFICATE

This is to certify that the project report titled " Encryption and Decryption" is the
bonafide work of LOGANATHAN.M(920322104025)who carried out the
project work under my supervision in the Naan Mudhalvan Lab.

SIGNATURE SIGNATURE
HEAD OF THE DEPARTMENT FACULTY
Department of Computer Science and Engineering,
CHRISTIAN COLLEGE OF ENGINEERING AND TECHNOLGY
ODDANCHATRAM-624619
INTERNAL EXAMINAR EXTERNAL EXAMINAR

ACKNOWLEDGEMENT

I extend my heartfelt gratitude to V.KEERTHIKA, M.E. Co-ordinated of


Robotic Process Automation Development Naan Mudhalvan, for her guidance
and support throughout this project. I also thank my peers and family for their
encouragement, without which this project would not have been possible.
I extend my sincere thanks to all teaching and non-teaching staff of the
Department of Computer Science and Engineering and my peers for their support
and encouragement.
I am deeply grateful to Dr.C.SUNDAR, M.E., Ph.D., Head of the Department,
for her constant support and guidance.
Finally, I thank my family and friends, whose encouragement and patience
motivated me to complete this project successfully.
LOGANATHAN.M(920322104025)

ABSTRACT

The Encryption and Decryption automation using UiPath is designed to


streamline the process of entering spreadsheet data into a web form. The system
dynamically adapts to changing field positions on the form after each
submission, ensuring accuracy and reliability. The automation leverages UiPath’s
advanced features like dynamic selectors, Excel integration, and retry
mechanisms to handle the challenges posed by real-time changes in the web form
layout. The solution improves productivity and reduces manual intervention.
TABLE OF CONTENTS

1. Introduction

o 1.1 Problem Statement

o 1.2 Objectives

o 1.3 Challenges

2. System Requirements

o 2.1 Hardware Requirements

o 2.2 Software Requirements

3. System Design

o 3.1 System Architecture

o 3.2 Workflow Design

4. Implementation

o 4.1 Setup Environment

o 4.2 Workflow Creation

o 4.3 Dynamic Selectors

5. Features of the System

6. Testing and Results

7. Future Enhancements
8. Conclusion

Introduction:

1.1 Problem Statement:


 Highlight the challenges associated with securing sensitive data,
such as unauthorized access, data breaches, or lack of encryption
protocols in existing systems.

1.2 Objectives:

1.Ensure secure data transmission using encryption and


decryption mechanisms.

2.Provide a scalable API for seamless integration of encryption


services into applications.

3.Guarantee confidentiality and integrity of user data.

1.3 Challenge:
 Explain how APIs facilitate standardized, scalable, and
interoperable encryption/decryption services, enabling applications
to implement security without developing algorithms from scratch.

2. System Requirements

2.1 Software Requirements:


 Programming language (e.g., Python, Java).
Libraries/Frameworks:
 Cryptography libraries (e.g., PyCryptodome, OpenSSL).
Tools: Postman for API testing, Docker for deployment (optional).

2.2 Hardware Requirements:

Minimum specifications:
 4 GB RAM, dual-core processor for development.
Server/Cloud infrastructure for production:
 Secure storage and fast processing.

3. System Design
3.1 System Architecture:
 Include encryption and decryption modules as core
components.

 A flow diagram illustrating how input data is encrypted and


decrypted through API endpoints.

 Interaction with a database (if applicable) to store encrypted


data securely.

3.2 Workflow Design:


 User sends a request to encrypt or decrypt data through the
API.
 API processes the request, applies encryption/decryption
algorithms, and returns the result.

Optional: Add logging or auditing features for tracking usage.

4. Implementation
4.1 Setup Environment:
 Install required software (Python, Flask, etc.).

 Configure cryptography libraries and initialize API


framework.

4.2 Create the Workflow:


 Define encryption/decryption algorithms (e.g., AES, RSA).
 Set up API endpoints for encrypting and decrypting data.

4.3 Configure API Call:


 Define request payloads for encryption (e.g., plaintext and
encryption key).

 Provide response formats (e.g., encrypted data in Base64 or


Hex format).

 Secure API with HTTPS and token-based authentication.


5. Features of the System

5.1 Mock User Data Generation:


 Simulate input data (e.g., plain text, sensitive information)
for testing encryption and decryption.

5.2 Free and Accessible:


 Open-source implementation.

 Easy-to-use endpoints with comprehensive documentation


for developers.

6. Testing and Results

6.1 Test Cases:


 Validate encryption by comparing the output for the same
plaintext and key.

 Test decryption to ensure accurate retrieval of the original data.

 Check for edge cases like invalid keys or corrupted data.


6.2 Response Structure:

Encryption API: { "encrypted_data": "<Base64 String>" }

Decryption API: { "decrypted_data": "<Original Text>" }

7. Future Enhancements

7.1 Advanced Filtering:


 Introduce options to encrypt only specific parts of data (e.g.,
sensitive fields in JSON).
7.2 Batch Data Processing:
 Support batch encryption/decryption for large datasets to
improve performance.

8. Conclusion

Summarize the success of implementing a secure, efficient


encryption/decryption API. Discuss its benefits in ensuring data
privacy and suggest further improvements to adapt to evolving
security standards.
REFERENCES:

1. UiPath Official Documentation

 Comprehensive guide to activities like Read Range, For Each Row,


Dynamic Selectors, and Retry Scope.

 Link: UiPath Documentation

2. RPA Challenge Official Website

 The dynamic web form used in this project, designed to test RPA
capabilities in handling changing field positions.

 Link: RPA Challenge

You might also like