SlideShare a Scribd company logo
2
Most read
3
Most read
13
Most read
Encryption And Decryption
Using AES
By Ankita Singh
Prachi Sangli
Asmita Shinde
What is Encryption And Decryption ?
Encryption is the process of
translating plain text data (plaintext)
into something that appears to be
random and meaningless (ciphertext).
Decryption is the process of
converting ciphertext back to
plaintext.
Why Use Encryption ?
Encryption is important because it allows you to
securely protect data that you don't want anyone else to
have access to.
1
What is AES (Advanced Encryption Standard) ?
◈ It is a symmetric block cipher chosen by the U.S.
government to protect classified information and is
implemented in software and hardware throughout the
world to encrypt sensitive data.
◈ It was intended to be easy to implement in hardware and
software, as well as in restricted environments
Design Of AES
◈ AES comprises three block ciphers: AES-128,
AES-192 and AES-256.
◈ Each cipher encrypts and decrypts data in
blocks of 128 bits using cryptographic keys of
128-, 192- and 256-bits, respectively.
◈ Symmetric ciphers use the same key for
encrypting and decrypting, so the sender
and the receiver must both know and use
the same secret key.
Design Of AES
◈ All key lengths are deemed
sufficient to protect classified
information up to the "Secret"
level with "Top Secret" information
requiring either 192- or 256-bit
key lengths.
Encryption
The Code In Our Project,
Converts A Text File Into An
Encrypted File Using Java Code
And AES Algorithm
Using AES For Encrypting And Decrypting Text
Decryption
Later, That Encrypted File Can be
Taken To Any Receiving System
And Decrypted To View The
Original Intended Text Using The
Java Code.
Proposed System
ScreenShot
Original text.txt File Encrypted File After Code Execution
ScreenShot
Decrypted File After Code Execution
What Does It Do ?
◈ It Makes The Communication Between Two Individuals
Or Parties Very Secure.
◈ Due To Which the Enemy Or The Middle Person Cannot
Understand What Message Is Sent.
“
Cryptography is the ultimate form
of non-violent direct action.
- Julian Assange
Thanks!
Any questions?
Ad

Recommended

Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Block Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
SYMMETRIC CRYPTOGRAPHY
SYMMETRIC CRYPTOGRAPHY
Santosh Naidu
 
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
2. Stream Ciphers
2. Stream Ciphers
Sam Bowne
 
Rsa Crptosystem
Rsa Crptosystem
Amlan Patel
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Cryptography.ppt
Cryptography.ppt
kusum sharma
 
Cryptography
Cryptography
Rutuja Solkar
 
cryptography
cryptography
Abhijeet Singh
 
Cryptography
Cryptography
gueste4c97e
 
Fundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography
Cryptography
subodh pawar
 
Transposition cipher
Transposition cipher
Antony Alex
 
Cryptography
Cryptography
Darshini Parikh
 
RSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
DES
DES
Naga Srimanyu Timmaraju
 
Cryptography
Cryptography
Deepak Kumar
 
Hash Function
Hash Function
ssuserdfb2da
 
6. cryptography
6. cryptography
7wounders
 
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Steganography
Steganography
Uttam Jain
 
Cryptography
Cryptography
jayashri kolekar
 
Introduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
 
Steganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Advanced Encryption Standard Algorithm
Advanced Encryption Standard Algorithm
Komal Singh
 
Cryptography
Cryptography
Shankar Ghorpade
 

More Related Content

What's hot (20)

DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Cryptography.ppt
Cryptography.ppt
kusum sharma
 
Cryptography
Cryptography
Rutuja Solkar
 
cryptography
cryptography
Abhijeet Singh
 
Cryptography
Cryptography
gueste4c97e
 
Fundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography
Cryptography
subodh pawar
 
Transposition cipher
Transposition cipher
Antony Alex
 
Cryptography
Cryptography
Darshini Parikh
 
RSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
DES
DES
Naga Srimanyu Timmaraju
 
Cryptography
Cryptography
Deepak Kumar
 
Hash Function
Hash Function
ssuserdfb2da
 
6. cryptography
6. cryptography
7wounders
 
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Steganography
Steganography
Uttam Jain
 
Cryptography
Cryptography
jayashri kolekar
 
Introduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
 
Steganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 

Similar to Encryption And Decryption Using AES Algorithm (20)

Advanced Encryption Standard Algorithm
Advanced Encryption Standard Algorithm
Komal Singh
 
Cryptography
Cryptography
Shankar Ghorpade
 
Cryptography
Cryptography
Shankar Ghorpade
 
Encryption
Encryption
Jasleen Khalsa
 
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
nyasarajan23
 
Cryptography ppt
Cryptography ppt
Gowarthini
 
DOC-20230414-WA0026hsagdfhgsdgjfsdaspptx
DOC-20230414-WA0026hsagdfhgsdgjfsdaspptx
nileshdewangan042
 
Cryptography
Cryptography
Bijaya Khadka
 
Cryptography
Cryptography
Shivanand Arur
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Introduction to Network Security presentation
Introduction to Network Security presentation
krishkiran2408
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Encryption33.pptx
Encryption33.pptx
KennedyLakayana1
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdf
SJDalore1
 
Cryptography
Cryptography
S.M. Towhidul Islam
 
Encryption
Encryption
Adnan Malak
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
V.V.Vanniaperumal College for Women
 
Advanced Encryption Standard Algorithm
Advanced Encryption Standard Algorithm
Komal Singh
 
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
nyasarajan23
 
Cryptography ppt
Cryptography ppt
Gowarthini
 
DOC-20230414-WA0026hsagdfhgsdgjfsdaspptx
DOC-20230414-WA0026hsagdfhgsdgjfsdaspptx
nileshdewangan042
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Introduction to Network Security presentation
Introduction to Network Security presentation
krishkiran2408
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdf
SJDalore1
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
Ad

Recently uploaded (20)

Stay Safe Women Security Android App Project Report.pdf
Stay Safe Women Security Android App Project Report.pdf
Kamal Acharya
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Learning – Types of Machine Learning – Supervised Learning – Unsupervised UNI...
Learning – Types of Machine Learning – Supervised Learning – Unsupervised UNI...
23Q95A6706
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
NEW Strengthened Senior High School Gen Math.pptx
NEW Strengthened Senior High School Gen Math.pptx
DaryllWhere
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
(Continuous Integration and Continuous Deployment/Delivery) is a fundamental ...
(Continuous Integration and Continuous Deployment/Delivery) is a fundamental ...
ketan09101
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Stay Safe Women Security Android App Project Report.pdf
Stay Safe Women Security Android App Project Report.pdf
Kamal Acharya
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Learning – Types of Machine Learning – Supervised Learning – Unsupervised UNI...
Learning – Types of Machine Learning – Supervised Learning – Unsupervised UNI...
23Q95A6706
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
NEW Strengthened Senior High School Gen Math.pptx
NEW Strengthened Senior High School Gen Math.pptx
DaryllWhere
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
(Continuous Integration and Continuous Deployment/Delivery) is a fundamental ...
(Continuous Integration and Continuous Deployment/Delivery) is a fundamental ...
ketan09101
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Ad

Encryption And Decryption Using AES Algorithm

  • 1. Encryption And Decryption Using AES By Ankita Singh Prachi Sangli Asmita Shinde
  • 2. What is Encryption And Decryption ? Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext.
  • 3. Why Use Encryption ? Encryption is important because it allows you to securely protect data that you don't want anyone else to have access to. 1
  • 4. What is AES (Advanced Encryption Standard) ? ◈ It is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. ◈ It was intended to be easy to implement in hardware and software, as well as in restricted environments
  • 5. Design Of AES ◈ AES comprises three block ciphers: AES-128, AES-192 and AES-256. ◈ Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and 256-bits, respectively. ◈ Symmetric ciphers use the same key for encrypting and decrypting, so the sender and the receiver must both know and use the same secret key.
  • 6. Design Of AES ◈ All key lengths are deemed sufficient to protect classified information up to the "Secret" level with "Top Secret" information requiring either 192- or 256-bit key lengths.
  • 7. Encryption The Code In Our Project, Converts A Text File Into An Encrypted File Using Java Code And AES Algorithm Using AES For Encrypting And Decrypting Text Decryption Later, That Encrypted File Can be Taken To Any Receiving System And Decrypted To View The Original Intended Text Using The Java Code.
  • 9. ScreenShot Original text.txt File Encrypted File After Code Execution
  • 11. What Does It Do ? ◈ It Makes The Communication Between Two Individuals Or Parties Very Secure. ◈ Due To Which the Enemy Or The Middle Person Cannot Understand What Message Is Sent.
  • 12. “ Cryptography is the ultimate form of non-violent direct action. - Julian Assange