SlideShare a Scribd company logo
1 of 3
SMT K.G. MITTAL COLLEGE OF ARTS & COMMERCE
Project Synopsis
Title: Sendingasecure Message overNetworkUsinganyEncryptionAlgorithm.
Team:
Team Member: AvadheshGupta (13)
MukeshYadav (50)
Introduction
Data communicationisan importance aspectof our living. A cryptosystemdefinesapairof data
transformcalled encryptionanddecryption.Encryptionisappliedtothe plaintexti.e.the datatobe
communicatedtoproduce cipher texti.e.encrypteddatausingencryption key.Decryption usesthe
decryptionkeytoconvertciphertexttoplain texttoplaintexti.e.the original data. Now,if the
encryptionkeyandthe decryptionkeyisthe same orone can be derivedfromthe otherthenitissaidto
be SymmetricCryptography.Itusesa pairof relatedkeysone forencryptionandotherfordecryption.
One keywhichiscalledthe private key,iskeptsecretandotherone know as publickeyisdisclosed.The
message isencryptedwithpublickeyandcan onlybe decryptedbyusingthe private key. Here, we are
analysesthe frequencyof sendingandreceivingof the massage fromboth side.
Objective/Aim
Thisprojectaimsto developinghighlysimple andsecretwaytosenda message overa internet. Many
timesusersendthe message overthe network, there are manyhackerare active onthe internetin
eavesdroppingg. Inthistime hackercan create trafficandtheycan anonymously observemessage
type. Thisinformation mightbe useful inguessingthe nature of the communicationthatwastaking
place.If we had encryptionprotection place, anopponentmightstillbe able toobserve the patternof
these message. We cansay itcan be a Passive Attack. Because the passive attacksare verydifficultto
detectbecause theydonotinvolve anyalterationof the data. To preventthe successof theirattacks,
usually bymeansof encryption.
YOur mainreasonto make thisprojectisto preventthe data they are travel overthe internetis tobe
secure andpreventthe accessof Hacker.Here,we are encryptingthe message usingthe verypopular
and powerful algorithm“Mono-Alphabetic“.
Module
1. Here, userina senderandanotheruserisan receiver.
2. The exchangesof message orchat are done overa LAN (Local AreaNetwork).
3. Here,we are using“Mono-Alphabetic”algorithmforencryptionanddecryption both.
4. Algorithmsare basedonJavalanguage.
Technical Details
Windows7
1 GB RAM
50 GB ROM(HDD)
Innovativeness&Usefulness
Helpto choose betterCryptographyalgorithm. Dependuponrequirementsandneedof the enduser
and customerisbetteroptiontochoose.
CurrentStatusof Development
DesigningGUI
ChoosingAlgorithmforEncryptionandDecryption
ConfiguringOperation System..OS
LAN NetworkConfiguring
Anything elsewhich onemay wantto add on ……
Project Synopsis (Creaptography Algorithm Analysis)

More Related Content

What's hot

PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
saniacorreya
 
Computer network
Computer networkComputer network
Computer network
snegacmr
 

What's hot (20)

Crypto
CryptoCrypto
Crypto
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Hk07
Hk07Hk07
Hk07
 
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
 
Criptography
CriptographyCriptography
Criptography
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Unchained - BeeBryte (White Paper)
Cryptography Unchained - BeeBryte (White Paper) Cryptography Unchained - BeeBryte (White Paper)
Cryptography Unchained - BeeBryte (White Paper)
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Crytography
CrytographyCrytography
Crytography
 
Computer network
Computer networkComputer network
Computer network
 

Similar to Project Synopsis (Creaptography Algorithm Analysis)

PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 

Similar to Project Synopsis (Creaptography Algorithm Analysis) (20)

Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 

Recently uploaded

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Recently uploaded (20)

WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million PeopleWSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
 
WSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration Tooling
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 

Project Synopsis (Creaptography Algorithm Analysis)

  • 1. SMT K.G. MITTAL COLLEGE OF ARTS & COMMERCE Project Synopsis Title: Sendingasecure Message overNetworkUsinganyEncryptionAlgorithm. Team: Team Member: AvadheshGupta (13) MukeshYadav (50) Introduction Data communicationisan importance aspectof our living. A cryptosystemdefinesapairof data transformcalled encryptionanddecryption.Encryptionisappliedtothe plaintexti.e.the datatobe communicatedtoproduce cipher texti.e.encrypteddatausingencryption key.Decryption usesthe decryptionkeytoconvertciphertexttoplain texttoplaintexti.e.the original data. Now,if the encryptionkeyandthe decryptionkeyisthe same orone can be derivedfromthe otherthenitissaidto be SymmetricCryptography.Itusesa pairof relatedkeysone forencryptionandotherfordecryption. One keywhichiscalledthe private key,iskeptsecretandotherone know as publickeyisdisclosed.The message isencryptedwithpublickeyandcan onlybe decryptedbyusingthe private key. Here, we are analysesthe frequencyof sendingandreceivingof the massage fromboth side. Objective/Aim Thisprojectaimsto developinghighlysimple andsecretwaytosenda message overa internet. Many timesusersendthe message overthe network, there are manyhackerare active onthe internetin eavesdroppingg. Inthistime hackercan create trafficandtheycan anonymously observemessage type. Thisinformation mightbe useful inguessingthe nature of the communicationthatwastaking place.If we had encryptionprotection place, anopponentmightstillbe able toobserve the patternof these message. We cansay itcan be a Passive Attack. Because the passive attacksare verydifficultto detectbecause theydonotinvolve anyalterationof the data. To preventthe successof theirattacks, usually bymeansof encryption. YOur mainreasonto make thisprojectisto preventthe data they are travel overthe internetis tobe secure andpreventthe accessof Hacker.Here,we are encryptingthe message usingthe verypopular and powerful algorithm“Mono-Alphabetic“.
  • 2. Module 1. Here, userina senderandanotheruserisan receiver. 2. The exchangesof message orchat are done overa LAN (Local AreaNetwork). 3. Here,we are using“Mono-Alphabetic”algorithmforencryptionanddecryption both. 4. Algorithmsare basedonJavalanguage. Technical Details Windows7 1 GB RAM 50 GB ROM(HDD) Innovativeness&Usefulness Helpto choose betterCryptographyalgorithm. Dependuponrequirementsandneedof the enduser and customerisbetteroptiontochoose. CurrentStatusof Development DesigningGUI ChoosingAlgorithmforEncryptionandDecryption ConfiguringOperation System..OS LAN NetworkConfiguring Anything elsewhich onemay wantto add on ……