SlideShare a Scribd company logo
1 of 1
Download to read offline
Alpana Chaphalkar
alpana.a.chaphalkar@outlook.com
+49 1767 706 6188
P a g e | 1
Project Implemented in the course of MSc in Applied Computer Science (Informatics)
Duration Project Details
01/09/2012 to
31/03/2013
Project :
Poly Alphabetic Approach for Data Encryption
Software/Programming Language Details :
MATLAB software version 11, MATLAB as programming language
Technical Details:
 Implementation of new Hybrid Encryption Technique which uses symmetric encryption
algorithm PASE, asymmetric encryption algorithm RSA.
 Implementation of Poly alphabetic Symmetric Encryption PASE.
 Implementation of Asymmetric Encryption Algorithm RSA for secret key handling.
 Implementation of Secure Hash Algorithm SHA256 for authentication.
 Implementation as Text Encryption and Image Encryption Technique.
Functional Details / Features:
 The proposed Encryption procedure has advantages of both symmetric and asymmetric
encryption techniques.
 The key management for the sharing of the secret key between the two parties is also
efficiently handled by this Encryption Procedure.
 This new encryption technique provides security to both the data and the secret key which
results in confidentiality and authentication.

More Related Content

What's hot

What's hot (18)

Network-Simulations-in-Qualnet
Network-Simulations-in-QualnetNetwork-Simulations-in-Qualnet
Network-Simulations-in-Qualnet
 
Matlab Projects with Source Code for Engineering Students
 Matlab Projects  with Source Code for Engineering Students Matlab Projects  with Source Code for Engineering Students
Matlab Projects with Source Code for Engineering Students
 
MATLAB Project Topics
MATLAB Project TopicsMATLAB Project Topics
MATLAB Project Topics
 
Thesis Topics in CSE Students
Thesis Topics in CSE Students Thesis Topics in CSE Students
Thesis Topics in CSE Students
 
Mobile-Cloud-Computing-Phd-Thesis
Mobile-Cloud-Computing-Phd-ThesisMobile-Cloud-Computing-Phd-Thesis
Mobile-Cloud-Computing-Phd-Thesis
 
PhD Thesis in Sdn Projects
PhD Thesis in Sdn ProjectsPhD Thesis in Sdn Projects
PhD Thesis in Sdn Projects
 
Network-Thesis-Writing-Service-Singapore
Network-Thesis-Writing-Service-SingaporeNetwork-Thesis-Writing-Service-Singapore
Network-Thesis-Writing-Service-Singapore
 
MQTT Protocol-Projects
MQTT Protocol-ProjectsMQTT Protocol-Projects
MQTT Protocol-Projects
 
Simple MATLAB Projects for Students Research Assistance
Simple MATLAB Projects for Students Research AssistanceSimple MATLAB Projects for Students Research Assistance
Simple MATLAB Projects for Students Research Assistance
 
Matlab Assignment Solutions Research Guidance
Matlab Assignment Solutions Research GuidanceMatlab Assignment Solutions Research Guidance
Matlab Assignment Solutions Research Guidance
 
MATLAB Based Research Project Topics
MATLAB Based Research Project TopicsMATLAB Based Research Project Topics
MATLAB Based Research Project Topics
 
23
2323
23
 
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile SensingJPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
 
Do My MATLAB Assignment Research Guidance
Do My MATLAB Assignment Research GuidanceDo My MATLAB Assignment Research Guidance
Do My MATLAB Assignment Research Guidance
 
Master-Thesis-Matlab-Projects
Master-Thesis-Matlab-ProjectsMaster-Thesis-Matlab-Projects
Master-Thesis-Matlab-Projects
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF...
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF...AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF...
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF...
 
Machine-to-Machine-Communication-Projects
Machine-to-Machine-Communication-ProjectsMachine-to-Machine-Communication-Projects
Machine-to-Machine-Communication-Projects
 

Viewers also liked

What does it mean to be a test engineer?
What does it mean to be a test engineer?What does it mean to be a test engineer?
What does it mean to be a test engineer?
Andrii Dzynia
 

Viewers also liked (20)

report
reportreport
report
 
Bachelor Transcript
Bachelor TranscriptBachelor Transcript
Bachelor Transcript
 
Heidelberg cement work reference
Heidelberg cement work referenceHeidelberg cement work reference
Heidelberg cement work reference
 
Regional Support for Broadband
Regional Support for BroadbandRegional Support for Broadband
Regional Support for Broadband
 
Designing Multi-Device Experiences: An Ecosystem Approach
Designing Multi-Device Experiences: An Ecosystem ApproachDesigning Multi-Device Experiences: An Ecosystem Approach
Designing Multi-Device Experiences: An Ecosystem Approach
 
CV
CVCV
CV
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
 
Becoming a Better Developer #WCA2
Becoming a Better Developer #WCA2Becoming a Better Developer #WCA2
Becoming a Better Developer #WCA2
 
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in India
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in IndiaCivil Engineering – Oldest Yet A Highly Sought After Career Choice in India
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in India
 
7 ineffective coding habits many F# programmers don't have
7 ineffective coding habits many F# programmers don't have7 ineffective coding habits many F# programmers don't have
7 ineffective coding habits many F# programmers don't have
 
Learning from a Culture of Collaboration: Engineers do it better. What can de...
Learning from a Culture of Collaboration: Engineers do it better. What can de...Learning from a Culture of Collaboration: Engineers do it better. What can de...
Learning from a Culture of Collaboration: Engineers do it better. What can de...
 
The Programmer
The ProgrammerThe Programmer
The Programmer
 
What does it mean to be a test engineer?
What does it mean to be a test engineer?What does it mean to be a test engineer?
What does it mean to be a test engineer?
 
Nine Pages You Should Optimize on Your Blog and How
Nine Pages You Should Optimize on Your Blog and HowNine Pages You Should Optimize on Your Blog and How
Nine Pages You Should Optimize on Your Blog and How
 
Enabling Autonomy
Enabling AutonomyEnabling Autonomy
Enabling Autonomy
 
Scaling LinkedIn - A Brief History
Scaling LinkedIn - A Brief HistoryScaling LinkedIn - A Brief History
Scaling LinkedIn - A Brief History
 
10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems
 
Beyond DevOps - How Netflix Bridges the Gap
Beyond DevOps - How Netflix Bridges the GapBeyond DevOps - How Netflix Bridges the Gap
Beyond DevOps - How Netflix Bridges the Gap
 
The Tester Role & Scrum
The Tester Role & ScrumThe Tester Role & Scrum
The Tester Role & Scrum
 
10 more lessons learned from building Machine Learning systems - MLConf
10 more lessons learned from building Machine Learning systems - MLConf10 more lessons learned from building Machine Learning systems - MLConf
10 more lessons learned from building Machine Learning systems - MLConf
 

Similar to Bachelor Studies Project Details

Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 

Similar to Bachelor Studies Project Details (20)

Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Enhancement in data security and integrity using minhash technique
Enhancement in data security and integrity using minhash  techniqueEnhancement in data security and integrity using minhash  technique
Enhancement in data security and integrity using minhash technique
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distribution
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
VHDL Encryption
VHDL EncryptionVHDL Encryption
VHDL Encryption
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption
 

Bachelor Studies Project Details

  • 1. Alpana Chaphalkar alpana.a.chaphalkar@outlook.com +49 1767 706 6188 P a g e | 1 Project Implemented in the course of MSc in Applied Computer Science (Informatics) Duration Project Details 01/09/2012 to 31/03/2013 Project : Poly Alphabetic Approach for Data Encryption Software/Programming Language Details : MATLAB software version 11, MATLAB as programming language Technical Details:  Implementation of new Hybrid Encryption Technique which uses symmetric encryption algorithm PASE, asymmetric encryption algorithm RSA.  Implementation of Poly alphabetic Symmetric Encryption PASE.  Implementation of Asymmetric Encryption Algorithm RSA for secret key handling.  Implementation of Secure Hash Algorithm SHA256 for authentication.  Implementation as Text Encryption and Image Encryption Technique. Functional Details / Features:  The proposed Encryption procedure has advantages of both symmetric and asymmetric encryption techniques.  The key management for the sharing of the secret key between the two parties is also efficiently handled by this Encryption Procedure.  This new encryption technique provides security to both the data and the secret key which results in confidentiality and authentication.