SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Text 
Encryption and Decryption 
Developed By: 
Shashi Kr. Singh (1150986) 
Sandeep Prasad (1150980) 
Sumit Kumar (1150994) 
Rishabh Anand (1150967) 
Submitted To: 
Rupinder Kaur Gurm 
Department of Computer Science 
RIMT-Institute of Engineering & Technology 
Punjab ( India.)
Table of Content 
1. Introduction 
2. Text Encryption 
3. Text Decryption 
4. Feasibility-Study 
5. Methodology 
6. Purpose of Project 
7. System Requirements
Introduction 
Encryption 
 The process of converting plaintext into 
ciphertext 
 The process of converting ciphertext into 
plaintext 
plaintext 
message 
ciphertext 
message 
Encryption 
Decryption 
Decryption
Text Encryption 
• Encryption is a process whereby 
plaintext is converted into or ciphertext. 
Key K 
Plaintext X Encryption Ciphertext Y 
 The original unaltered contents of the 
message or text is called plaintext.
Text Decryption 
• Decryption is the reverse process of 
encryption or encipherment, which is to 
convert ciphertext back to its original form of 
plaintext. 
Key K 
Ciphertext Y Decryption Plaintext X 
The altered text after encryption is called as 
enciphered text or ciphertext.
Text Decryption 
• Decryption process needs to use the same key 
that is used in the encryption process to obtain 
the original plaintext. 
• Although one may obtain a copy of the 
encrypted message, one must use the correct 
key to successfully decrypt the message.
Feasibility-Study
Methodology
Purpose of Project 
• Provides security 
• File encryption 
• Communication encryption 
• Network traffic encryption 
• Password manager 
• Single sign-on
System Requirements 
Software Requirements 
• Turbo C & C++ and Dev-C 
• Works on Windows 7, XP, Vista and 8 
• Works on 64 bit Windows & 32 bit Windows 
• Mac OS X 10.3 and above 
Hardware Requirements 
• Intel Pentium 4 or above 
• Floppy-Drive 
• CD-ROM drive 
• 10 GB of free hard-disk 
• keyboard and mouse 
• RAM(minimum 512 MB)
Friends…. 
Any Question ?
Encryption And Decryption

More Related Content

PPTX
Encryption and Decryption
PPTX
Encryption & Decryption
ODP
Encryption presentation final
PPTX
Data encryption
PDF
Introduction to Cryptography
PPTX
Cryptography
PPT
Classical cryptography
Encryption and Decryption
Encryption & Decryption
Encryption presentation final
Data encryption
Introduction to Cryptography
Cryptography
Classical cryptography

What's hot (20)

PPTX
Cryptography
PPTX
Introduction to Cryptography
PPTX
Symmetric and asymmetric key
PPTX
Cryptography and network security
PPT
Network Security and Cryptography
PPTX
Cryptography.ppt
PPTX
Cryptography
PPT
Digital Signature
PPTX
Public Key Cryptography
PPTX
Cryptography
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PDF
Network security - OSI Security Architecture
PPTX
Cryptography
PPTX
Cryptography
PPTX
Encryption ppt
PDF
Classical encryption techniques
PPTX
Topic1 substitution transposition-techniques
PPT
Cryptography
PPTX
Cryptography
Cryptography
Introduction to Cryptography
Symmetric and asymmetric key
Cryptography and network security
Network Security and Cryptography
Cryptography.ppt
Cryptography
Digital Signature
Public Key Cryptography
Cryptography
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Network security - OSI Security Architecture
Cryptography
Cryptography
Encryption ppt
Classical encryption techniques
Topic1 substitution transposition-techniques
Cryptography
Cryptography
Ad

Viewers also liked (20)

PDF
basic encryption and decryption
PPT
Basic Encryption Decryption Chapter 2
PPTX
Cryptography.ppt
PPTX
Encryption
PPTX
cryptography
PPTX
Image encryption and decryption
PPT
Data encryption, Description, DES
PPTX
Cryptography
PPTX
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
PPTX
Tiny encryption algorithm
DOC
Cryptography full report
PPTX
Image Encryption in java ppt.
PPTX
Data encryption standard
PDF
AES-Advanced Encryption Standard
PPT
PUBLIC KEY ENCRYPTION
PPT
Cryptography
PPTX
Seminar ppt on digital signature
PPT
Digital certificates
PPT
Digital Signature
basic encryption and decryption
Basic Encryption Decryption Chapter 2
Cryptography.ppt
Encryption
cryptography
Image encryption and decryption
Data encryption, Description, DES
Cryptography
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Tiny encryption algorithm
Cryptography full report
Image Encryption in java ppt.
Data encryption standard
AES-Advanced Encryption Standard
PUBLIC KEY ENCRYPTION
Cryptography
Seminar ppt on digital signature
Digital certificates
Digital Signature
Ad

Similar to Encryption And Decryption (20)

PDF
Encryption and decryption of data using cryptography
PPT
Day5
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPTX
IANSunit 1_cryptography_2.pptxv xvxvxvxv
PPT
Chapter 2 part 1.ppt
PPTX
[email protected]........................
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PDF
Encryption is a process of converting a message, image, or any other .pdf
PPTX
Cryptography cryptography CryptographyCryptography
PDF
Unit-2-IS (1).pdf
PPT
02 Information System Security
PPTX
Encryption
PPTX
Chapter-Three Part One.pptxghgjhhjghjhjhhj
PPT
Computer systems security 7-cryptography.ppt
PPT
Computer security communication networking cryptography .ppt
PPT
introduction to cryptography and its basic techniques
PPT
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
PPT
Chaos based cryprography - encryption & hash function
PPT
computer literacy works papers and pencil ew 9-crypt.ppt
PPT
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
Encryption and decryption of data using cryptography
Day5
Fundamentals of Cryptography: Securing Data in the Digital Age
IANSunit 1_cryptography_2.pptxv xvxvxvxv
Chapter 2 part 1.ppt
[email protected]........................
Detailed description about the concept of E Commerce UNIT IV.pptx
Encryption is a process of converting a message, image, or any other .pdf
Cryptography cryptography CryptographyCryptography
Unit-2-IS (1).pdf
02 Information System Security
Encryption
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Computer systems security 7-cryptography.ppt
Computer security communication networking cryptography .ppt
introduction to cryptography and its basic techniques
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
Chaos based cryprography - encryption & hash function
computer literacy works papers and pencil ew 9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt

More from NA (7)

PPTX
Transportation portal
 
PPTX
Indian wildlife
 
PPTX
Medical Stock Management System
 
PPTX
E resource technology
 
PPT
Advanced java
 
PPTX
Core Java
 
PPTX
Job Portal
 
Transportation portal
 
Indian wildlife
 
Medical Stock Management System
 
E resource technology
 
Advanced java
 
Core Java
 
Job Portal
 

Recently uploaded (20)

PDF
Dominate Her Mind – Make Women Chase, Lust, & Submit
PDF
Why is mindset more important than motivation.pdf
PPTX
Identity Development in Adolescence.pptx
PPTX
show1- motivational ispiring positive thinking
PPTX
How to Deal with Imposter Syndrome for Personality Development?
PPTX
Learn how to prevent Workplace Incidents?
PPTX
Arabic Grammar with related Qurani ayat .pptx
PPTX
A portfolio Template for Interior Designer
PPTX
THEORIES-PSYCH-3.pptx theory of Abraham Maslow
PDF
Want to Fly Like an Eagle - Leave the Chickens Behind.pdf
PPTX
UNIVERSAL HUMAN VALUES for NEP student .pptx
PPTX
SELF ASSESSMENT -SNAPSHOT.pptx an index of yourself by Dr NIKITA SHARMA
PPTX
Travel mania in india needs to change the world
DOCX
Boost your energy levels and Shred Weight
PPTX
Emotional Intelligence- Importance and Applicability
PPTX
Commmunication in Todays world- Principles and Barriers
PDF
⚡ Prepping for grid failure_ 6 Must-Haves to Survive Blackout!.pdf
PPTX
The Hidden Link Between Self-Talk and Self-Worth.pptx
PPTX
Learn how to use Portable Grinders Safely
PDF
Quiet Wins: Why the Silent Fish Survives.pdf
Dominate Her Mind – Make Women Chase, Lust, & Submit
Why is mindset more important than motivation.pdf
Identity Development in Adolescence.pptx
show1- motivational ispiring positive thinking
How to Deal with Imposter Syndrome for Personality Development?
Learn how to prevent Workplace Incidents?
Arabic Grammar with related Qurani ayat .pptx
A portfolio Template for Interior Designer
THEORIES-PSYCH-3.pptx theory of Abraham Maslow
Want to Fly Like an Eagle - Leave the Chickens Behind.pdf
UNIVERSAL HUMAN VALUES for NEP student .pptx
SELF ASSESSMENT -SNAPSHOT.pptx an index of yourself by Dr NIKITA SHARMA
Travel mania in india needs to change the world
Boost your energy levels and Shred Weight
Emotional Intelligence- Importance and Applicability
Commmunication in Todays world- Principles and Barriers
⚡ Prepping for grid failure_ 6 Must-Haves to Survive Blackout!.pdf
The Hidden Link Between Self-Talk and Self-Worth.pptx
Learn how to use Portable Grinders Safely
Quiet Wins: Why the Silent Fish Survives.pdf

Encryption And Decryption

  • 1. Text Encryption and Decryption Developed By: Shashi Kr. Singh (1150986) Sandeep Prasad (1150980) Sumit Kumar (1150994) Rishabh Anand (1150967) Submitted To: Rupinder Kaur Gurm Department of Computer Science RIMT-Institute of Engineering & Technology Punjab ( India.)
  • 2. Table of Content 1. Introduction 2. Text Encryption 3. Text Decryption 4. Feasibility-Study 5. Methodology 6. Purpose of Project 7. System Requirements
  • 3. Introduction Encryption  The process of converting plaintext into ciphertext  The process of converting ciphertext into plaintext plaintext message ciphertext message Encryption Decryption Decryption
  • 4. Text Encryption • Encryption is a process whereby plaintext is converted into or ciphertext. Key K Plaintext X Encryption Ciphertext Y  The original unaltered contents of the message or text is called plaintext.
  • 5. Text Decryption • Decryption is the reverse process of encryption or encipherment, which is to convert ciphertext back to its original form of plaintext. Key K Ciphertext Y Decryption Plaintext X The altered text after encryption is called as enciphered text or ciphertext.
  • 6. Text Decryption • Decryption process needs to use the same key that is used in the encryption process to obtain the original plaintext. • Although one may obtain a copy of the encrypted message, one must use the correct key to successfully decrypt the message.
  • 9. Purpose of Project • Provides security • File encryption • Communication encryption • Network traffic encryption • Password manager • Single sign-on
  • 10. System Requirements Software Requirements • Turbo C & C++ and Dev-C • Works on Windows 7, XP, Vista and 8 • Works on 64 bit Windows & 32 bit Windows • Mac OS X 10.3 and above Hardware Requirements • Intel Pentium 4 or above • Floppy-Drive • CD-ROM drive • 10 GB of free hard-disk • keyboard and mouse • RAM(minimum 512 MB)