SlideShare a Scribd company logo
1 of 19
RSA Encryption Software
Image and Text Encryption and
Decryption Software
Presented By
Piyush A. Patill
(BCA)
Guided By
Prof…….
RSA Encryption Software 2
Introduction
You are a consultant working on a highly secure program for the government. As
you work on your project you also need to attach files that contain privileged
information and communicate by email with specialists from different parts of the
world. What would you need to do to make sure that your email communications
are secure?
One way you can keep your data secure is by using software known as encryption
software. The encryption software will allow you to encrypt data that contain
important information that you do not want to be seen by prying eyes. When you
encrypt the data, the software will prompt you for a key or a password. You would
then send the encrypted files to the other person. Those who need to open and
read the files should have access to the same software and the key that was used,
so that the files can be decrypted and made readable.
3
Need of Project
 Encryption software has become important when it comes to protecting your Data. Hack attempts
and privacy intrusions mean that it's become easier than ever for complete strangers to access your
most personal details stored on your computer.
 Encryption enhances the security of a message or file by scrambling the content. To encrypt a
message, you need the right key, and you need the right key to decrypt it as well . It is the most
effective way to hide communication via encoded information where the sender and the recipient
hold the key to decipher data.
4
RSA Encryption Software
System
Existing System
There may exist many applications of
encryption and decryption of varies type
of file formats .this software are paid
software and mainly available as web
applications so they required high speed
internet connection.
There Use Same Key to decrypt Data
New System
The proposed system suggest a new concept that is
free desktop application. It means user can use this
application free of cost .whale in existed system user
has to pay some amount to use the services.
 The new system will work in offline mode. Manse
user can use it any time without any problem. The
proposed system uses RSA (Rivest–Shamir–Adleman)
algorithm. RSA is known to be the strongest publicly
available encryption method. This algorithm works
with both private key and public key. The only way
of decrypting the files which are encrypted with the
public key is to use the private key. Users’ file will be
encrypted and saved to desktop .Then, user has to
enter the private key to decrypt the file.
RSA Encryption Software 5
Hardware/Software Hardware/Software
Element
Specification/version
Hardware Processor Intel core to duo
RAM 4 GB
Hard Disk 100 GB
Software OS Windows
Java and Net beans IDE
Hardware/Software Details
RSA Encryption Software 6
RSA Algorithm
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir,
and Leonard Adleman.
The RSA algorithm is the most commonly
used public key encryption algorithm.
RSA Encryption Software 7
Flow Chart for
Encryption and
Decryption
The above flow chart shows
how the project in this article
works. The flow chart explains
in a step by step manner the
processing of the encryption
and decryption, using JAVA.
Images are encrypted, and
create the *.txt file, the same file
is used for decryption.
RSA Encryption Software 8
Screen Layout
 After Starting application we
can see the home page.
 After Click on Get Started
Button Next window is open
where there are two options.
RSA Encryption Software 9
Here User will select text or
Images
RSA Encryption Software 10
After User will Select text
or Image for Safety
Application Ask Password
RSA Encryption Software 11
On text Selection user Will
navigate to for text
Encryption.
RSA Encryption Software 12
On Image Selection user Will
Navigate to for Image Encryption.
 Here are two options one for
Image Encryption and other for
Image Decryption.
RSA Encryption Software 13
After Encryption
In this image we can see
there is a button to select
image. After encryption
image will be automatically
saved to Desktop.
RSA Encryption Software 14
After Decryption
In this image user will select
the encrypted image and will
get decrypted image as
output. Decrypted image will
automatically save to
Desktop.
RSA Encryption Software 15
RSA Encryption Software 16
Strength
 When user receives the message, it decrypts the message using its private
key No one else can decrypt the message because only user knows its private
key.
 To this day the RSA together with the AES algorithm is the mostly used
algorithm in commercial systems. It is used to protect web traffic.
 Very fast, very simple encryption and verification.
 Easier to implement than Elliptical curve cryptography(ECC).
 Easier to understand.
 Widely deployed, better industry support
Future Scope
At present encryption software only encrypts plan text. In the future it will encrypt various
PDF, word files.
In future software, JPG type file will be encrypted along with other photos like PNG, JPEG
will also be encrypted.
In the future, different types of security panels will be used to keep the user's data safe
The software will be given a database connection. And complete user information will be
saved in database
In future this will be changed to web application
RSA Encryption Software 17
Conclusion
 RSA is the most popular public-key cryptosystem available today. It can be
used for both encryption and authentication.
 Today’s world data or file security is most important thing and encryption is
the best way to secure our important data .With the help of encryption
Software we can protect the information from disclosure to unauthorized
parties.
 RSA Maintain the Confidentiality about information.
 RSA Provide authentication or proof of origin like digital signatures etc.
RSA Encryption Software 18
References
 https://www.thecrazyprogrammer.com/2017/03/rsa-
algorithm.htmlhttps://www.theinsanetechie.in/2013/08/java-encryption-and-decryption-of-image.html
 https://www.devglan.com/java8/rsa-encryption-decryption-java
 https://www.helpnetsecurity.com/2008/02/18/the-future-of-encryption/
 https://www.tutorialspoint.com/cryptography/public_key_encryption.htm
 https://www.c-sharpcorner.com/UploadFile/75a48f/rsa-algorithm-with-C-Sharp2/
 https://www.codeproject.com/Articles/723175/Image-Cryptography-using-RSA-Algorithm-in-Csharp
RSA Encryption Software 19

More Related Content

What's hot

Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DESHemant Sharma
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
методи за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниметоди за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниkgospodinova89
 
Camera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IICamera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IIYu Huang
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor reportLove Kothari
 

What's hot (20)

Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Steganography
SteganographySteganography
Steganography
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Steganography
SteganographySteganography
Steganography
 
Rsa
RsaRsa
Rsa
 
Activity playfair cipher.pptx
Activity playfair cipher.pptxActivity playfair cipher.pptx
Activity playfair cipher.pptx
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Pgp
PgpPgp
Pgp
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
методи за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниметоди за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данни
 
Camera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IICamera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning II
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 

Similar to Rsa Encryption in java

Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
6G7V0033 Cryptography And Applications.docx
6G7V0033 Cryptography And Applications.docx6G7V0033 Cryptography And Applications.docx
6G7V0033 Cryptography And Applications.docxsdfghj21
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 

Similar to Rsa Encryption in java (20)

Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Cryptography
CryptographyCryptography
Cryptography
 
6G7V0033 Cryptography And Applications.docx
6G7V0033 Cryptography And Applications.docx6G7V0033 Cryptography And Applications.docx
6G7V0033 Cryptography And Applications.docx
 
finl.docx
finl.docxfinl.docx
finl.docx
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

Rsa Encryption in java

  • 1. RSA Encryption Software Image and Text Encryption and Decryption Software
  • 2. Presented By Piyush A. Patill (BCA) Guided By Prof……. RSA Encryption Software 2
  • 3. Introduction You are a consultant working on a highly secure program for the government. As you work on your project you also need to attach files that contain privileged information and communicate by email with specialists from different parts of the world. What would you need to do to make sure that your email communications are secure? One way you can keep your data secure is by using software known as encryption software. The encryption software will allow you to encrypt data that contain important information that you do not want to be seen by prying eyes. When you encrypt the data, the software will prompt you for a key or a password. You would then send the encrypted files to the other person. Those who need to open and read the files should have access to the same software and the key that was used, so that the files can be decrypted and made readable. 3
  • 4. Need of Project  Encryption software has become important when it comes to protecting your Data. Hack attempts and privacy intrusions mean that it's become easier than ever for complete strangers to access your most personal details stored on your computer.  Encryption enhances the security of a message or file by scrambling the content. To encrypt a message, you need the right key, and you need the right key to decrypt it as well . It is the most effective way to hide communication via encoded information where the sender and the recipient hold the key to decipher data. 4 RSA Encryption Software
  • 5. System Existing System There may exist many applications of encryption and decryption of varies type of file formats .this software are paid software and mainly available as web applications so they required high speed internet connection. There Use Same Key to decrypt Data New System The proposed system suggest a new concept that is free desktop application. It means user can use this application free of cost .whale in existed system user has to pay some amount to use the services.  The new system will work in offline mode. Manse user can use it any time without any problem. The proposed system uses RSA (Rivest–Shamir–Adleman) algorithm. RSA is known to be the strongest publicly available encryption method. This algorithm works with both private key and public key. The only way of decrypting the files which are encrypted with the public key is to use the private key. Users’ file will be encrypted and saved to desktop .Then, user has to enter the private key to decrypt the file. RSA Encryption Software 5
  • 6. Hardware/Software Hardware/Software Element Specification/version Hardware Processor Intel core to duo RAM 4 GB Hard Disk 100 GB Software OS Windows Java and Net beans IDE Hardware/Software Details RSA Encryption Software 6
  • 7. RSA Algorithm RSA is an encryption algorithm. Developed in: 1977. Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly used public key encryption algorithm. RSA Encryption Software 7
  • 8. Flow Chart for Encryption and Decryption The above flow chart shows how the project in this article works. The flow chart explains in a step by step manner the processing of the encryption and decryption, using JAVA. Images are encrypted, and create the *.txt file, the same file is used for decryption. RSA Encryption Software 8
  • 9. Screen Layout  After Starting application we can see the home page.  After Click on Get Started Button Next window is open where there are two options. RSA Encryption Software 9
  • 10. Here User will select text or Images RSA Encryption Software 10
  • 11. After User will Select text or Image for Safety Application Ask Password RSA Encryption Software 11
  • 12. On text Selection user Will navigate to for text Encryption. RSA Encryption Software 12
  • 13. On Image Selection user Will Navigate to for Image Encryption.  Here are two options one for Image Encryption and other for Image Decryption. RSA Encryption Software 13
  • 14. After Encryption In this image we can see there is a button to select image. After encryption image will be automatically saved to Desktop. RSA Encryption Software 14
  • 15. After Decryption In this image user will select the encrypted image and will get decrypted image as output. Decrypted image will automatically save to Desktop. RSA Encryption Software 15
  • 16. RSA Encryption Software 16 Strength  When user receives the message, it decrypts the message using its private key No one else can decrypt the message because only user knows its private key.  To this day the RSA together with the AES algorithm is the mostly used algorithm in commercial systems. It is used to protect web traffic.  Very fast, very simple encryption and verification.  Easier to implement than Elliptical curve cryptography(ECC).  Easier to understand.  Widely deployed, better industry support
  • 17. Future Scope At present encryption software only encrypts plan text. In the future it will encrypt various PDF, word files. In future software, JPG type file will be encrypted along with other photos like PNG, JPEG will also be encrypted. In the future, different types of security panels will be used to keep the user's data safe The software will be given a database connection. And complete user information will be saved in database In future this will be changed to web application RSA Encryption Software 17
  • 18. Conclusion  RSA is the most popular public-key cryptosystem available today. It can be used for both encryption and authentication.  Today’s world data or file security is most important thing and encryption is the best way to secure our important data .With the help of encryption Software we can protect the information from disclosure to unauthorized parties.  RSA Maintain the Confidentiality about information.  RSA Provide authentication or proof of origin like digital signatures etc. RSA Encryption Software 18
  • 19. References  https://www.thecrazyprogrammer.com/2017/03/rsa- algorithm.htmlhttps://www.theinsanetechie.in/2013/08/java-encryption-and-decryption-of-image.html  https://www.devglan.com/java8/rsa-encryption-decryption-java  https://www.helpnetsecurity.com/2008/02/18/the-future-of-encryption/  https://www.tutorialspoint.com/cryptography/public_key_encryption.htm  https://www.c-sharpcorner.com/UploadFile/75a48f/rsa-algorithm-with-C-Sharp2/  https://www.codeproject.com/Articles/723175/Image-Cryptography-using-RSA-Algorithm-in-Csharp RSA Encryption Software 19