Sei sulla pagina 1di 3

Annexure-V- Cover Page for Academic Tasks

Course Code: CSE403 Course Title: Network Security and Cryptography

Course Instructor: Harpreet Kaur

Academic Task No.: 01 Academic Task Title: Project

Date of Allotment: 03-09-2019 Date of submission: 21-10-2019

Student’s Roll no: A09 Student’s Reg. no: 11602353

Learning Outcomes: In this Project, I have learned the process of Encryption and Decryption for any
String. We also implemented this Encryption and Decryption by using the Key generation.

Declaration:

I declare that this Assignment is my individual work. I have not copied it from any other student’s work
or from any other source except where due acknowledgement is made explicitly in the text, nor has any
part been written for me by any other person.

Student’s
Signature:

Evaluator’s Comments (For Instructor’s use only)

General Observations Suggestions for Improvement Best part of assignment

Evaluator’s Signature and Date:

Marks Obtained: Max. Marks:___________________


ENCRYPTION AND DECRYPTION USING KEY GENERATION

Introduction-:
What is encryption?
In cryptography, encryption is the process of encoding a message or information in such a way that
only authorized parties can access it and those who are not authorized cannot access this particular
information.

Encryption is the process of using an algorithm to transform information to make it unreadable for
unauthorized users. This cryptographic method protects sensitive data such as credit card numbers by
encoding and transforming information into unreadable cipher text.

What is Decryption?
Decryption is generally the reverse process of encryption. It is the process of decoding the data which
has been encrypted into a secret format. An authorized user can only decrypt data
because decryption requires a secret key or password.
To decrypt the message, the user should have the key for decryption of the message.

What is Key Generation?


In this algorithm, we are implementing Encryption and Decryption by using a Key. We have separate
process for this Key Generation too. This key is generated before the process of encryption and
decryption itself.

This acts as a security for the exchange of information between the users. Every key generated for
every exchange of information is different. If this key is leaked or theft by the attackers, then users
might face a severe loss of important information.

KEY GENERATION IN MY ALGORITHM-:


For key generation, the user can enter any string of any length. This length of the string also would be
taken before. Every key word will have its own unique number starting with A-0, B-1 to Z-25. After
entering the key words, this key words would be assigned default with unique numbers.

These numbers would be added altogether. If we get the even number as output we will let it remain
the same. If we get odd number as output, we will add it back to that keyword length. This way key is
generated in our algorithm.

ENCRYPTION PROCESS IN MY ALGORITHM-:


In encryption, the given key word is converted into numbers.
Step 1-Every keyword is subtracted with 25. Now we will consider the new value of every key word
after subtraction.
Step 2- This new value is multiplied with the key value we got in the beginning. Now we will again get
the new value. Now we have to reverse the numbers by doing absolute mod of 26 with each number.
With this encryption process is completed and would be sent to user for further decryption.
DECRYPTION PROCESS IN MY ALGORITHM-:
In decryption process, the given string or the key word is reversed. After this we will take the
multiplicative inverse of every number and then decrypt it. After this, the output value is subtracted
with 26.
In this way, total decryption is done using the key that is generated in the beginning in my algorithm.

Potrebbero piacerti anche