SlideShare a Scribd company logo
“Cryptography”
Why Cryptography ?
We all know that now a day this is the world of information technology and
almost everyone have to communicate with each other. Most of the time this
communication occurs on the network. During the communication of data it
may be possible that the data we are sending or receiving can be hacked or
edited by someone. The data we are communicating may be bank a/c number,
passwords or some important files etc. To protect the data from this type of
unwanted things “Cryptography” is very useful.
 This project is all about providing security while communicating any data on
the network between two or many user. We are going to discuss about the main
ciphers used in Cryptography in this project.
 There are various techniques of encryption and decryption which are used in
this project such as
 Shift or Substitution cipher
 Monoalphabetic cipher
 Playfair cipher
 Vegenere cipher
 Within the context of application-to-application communication, there are some
specific security requirements, including:
 Authentication
 Privacy/Confidentiality
 Integrity
 Non-repudiation
 Cryptography, then not only protect data from theft or alteration, but
can also be used for user authentication.
 There are, in general two types of Cryptographic schemes typically
used to accomplish these goal:
(1) Private–key ( or symmetric ) cryptography
(2) Public-Key ( or asymmetric ) cryptography
 In all the cases,
 The initial unencrypted data is referred to as “plaintext”.
 The encrypted data is referred to as “cipher text”.
(which will in turn (usually) be decrypted into usable plaintext)
1. Introduction
1.1 Introduction to Cryptography
1.2 Types of Cryptographic Algorithm
1.2.1 Secret key Cryptography
1.2.2 Public Key Cryptography
1.2.3 Hash Function
2. Purpose
3. Objective
4. System Specification
 Hardware
 Software
5. Future Scope
6. Conclusion
Introduction
 The word cryptography or cryptology comes from an Ancient Greek. The word
cryptology is made of two components ”crypto”, which means hidden or secret
and “logos” which means word. It is a Science of writing in secret code.
Cryptography is the study of techniques for secure communication.
 There are two important concepts of cryptography, first one is Encryption &
the second one is Decryption. Encryption is the process in which the plain text
is changed into cipher Text & decryption is just reverse process of encryption
that means cipher text is changed into plain text. There are various techniques
of Encryption & Decryption which are used in this project such as Shift Cipher,
Playfair Cipher, Monoalphabetic Cipher, Vanier Cipher.
 We use the term cryptography to refer to the science and art for transforming
message to make them secure from attacks.
 The original message before being transformed is called ”Plaintext”. After the message
is transformed is called ”Ciphertext”. An encryption algorithm transform the Plaintext
into Ciphertext & a decryption algorithm transforms the Ciphertext back into Plaintext.
Encryption Decryption
#%GIUYRWKMN,S:{?
Hello World! Hello World!
( ciphertext )
( Plaintext ) ( Plaintext )
( Shared Secret Key )
Objective
1 . To d e v e l o p a s o f t w a r e i n w h i c h w e w i l l i n p u t :
i ) F i l e s
i i ) M e s s a g e s
a n d w e w i l l g e t e n c r y p t e d f i l e s o r m e s s a g e s .
2 . T h e e n c r y p t e d i n f o r m a t i o n c a n b e u s e d i n t h e n e t w o r k
( l o c a l o r i n t e r n e t ) i n a s a f e a n d s e c u r e d w a y
3 . T h e s o f t w a r e c a n a l s o b e u s e d t o d e c r y p t t h e e n c r y p t e d d a t a
i n t h e o r i g i n a l f o r m
4 . U s e r w i l l b e a b l e t o u s e t h e i r o w n k e y s t o e n c r y p t t h e d a t a .
SYSTEM SPECIFICATION
SOFTWARE REQUIREMENTS :
 OPERATING SYSTEM : WINDOWS XP / 7
 FRONT END : C#.net
 BACK END : SQL Server
HARDWARE REQUIREMENTS :
 Processor : Pentium IV & above
 Processor Speed : 1 G Hz
 RAM : 2 GB
 Hard Disc : 10 GB
TABLES
COLUMNS DATA TYPE SIZE
Member_id int
Password char 20
Security Question char 30
Security Answer char 20
L O G I N T A B L E :
(FOREIGN KEY)
MEMBER DETAIL TABLE
COLUMNS Data Type Size
Member_id int
Name char 20
Mobile char 10
Email_id char 30
Address Char 50
(Primary Key)
LOG TABLE
Columns Data Type Size
Member_id int
File name char 20
Data datetime
Type char 10
(FOREIGN KEY)
Encryption & Decryption
MEMBER
LOGS
IN LOGIN
History
Record
LOG
MEMBER
id
Name
Mob
no.
Email
id Password
Security
Question
Security
AnswerAddress
MEMBER
id
Member
id
File
Name
Data
Type
TYPES OF CRYPTOGRAPHIC ALGORITHMS
 There are several ways of classifying cryptographic algorithm.
 Defined by their application and use. The three types of algorithms that will be
discussed are as follows.
1. Secret key Cryptography(SKC)
2. Public Key cryptography(PKC)
3. Hash Function
SECRET KEY (SKC)
Single key used to encrypt and decrypt .
Key must be known by both parties.
Encrypt Decrypt
S a m e K e y i s u s e d t o
E n c r y p t a n d D e c r y p t d a t a
Sender
Recipient
Shared Secret
Key
Plaintext Ciphertext Plaintext
PUBLIC KEY (PKC)
Two different keys are used in this cryptography
One key is used for encryption & other for decryption
Encrypt Decrypt
D i f f e r e n t K e y s a r e u s e d t o
E n c r y p t a n d D e c r y p t d a t a
Sender
Recipient
Recipient Public
Key
Recipient Private
Key
Plaintext Ciphertext Plaintext
HASH FUNCTION
 Hash is a function which is used to compress the string.
 The input in the hash function is known as “Message” and
output is called “Digest”.
 Hash functions have four main properties :
 It is easy to compute the hash value for any given message.
 It is infeasible to generate a message from its hash.
 It is infeasible to modify a message without changing the hash.
 It is infeasible to find two different message with the same hash.
Message
( variable size )
H
A
S
H
Digest
( fixed size )
Our project(system) can do the cryptography by
encrypting and decrypting data. We are dependent
on other mailing systems Like – gmail, yahoo etc for
information transfer.
In future we can add the information transfer
module so that after encryption users can transfer
informationbythesamesoftware.
Future scope
Finally, we can say that in this
project development we have
learnt a lot and during the process
we will get the chance to explore
cryptography and the concepts
involved.
CONCLUSION

More Related Content

PPTX
Mobile Computing (Part-2)
PPTX
Product Cipher
PPT
Introduction to SSH
PPTX
Key Management and Distribution
PDF
Network Security Fundamentals
PPTX
Firewall presentation
PDF
Wi-Fi security – WEP, WPA and WPA2
PPTX
MAC & IP addresses
Mobile Computing (Part-2)
Product Cipher
Introduction to SSH
Key Management and Distribution
Network Security Fundamentals
Firewall presentation
Wi-Fi security – WEP, WPA and WPA2
MAC & IP addresses

What's hot (20)

PDF
Network protocols
PPTX
Data security in cloud computing
PPTX
what is data security full ppt
PPT
Network security cryptographic hash function
PDF
Network Security Presentation
PPTX
Public Key Cryptosystem
PPT
X.509 Certificates
PDF
SYMMETRIC CRYPTOGRAPHY
PPTX
Idea(international data encryption algorithm)
PDF
SSH - Secure Shell
PDF
TCP over wireless slides
PPT
Email security
PPTX
kerberos
PPT
IoT Coap
PPTX
ip security
PPTX
PPTX
Diffie hellman key exchange algorithm
PDF
Presentation On Steganography
PPT
PGP S/MIME
PPT
Classless addressing
Network protocols
Data security in cloud computing
what is data security full ppt
Network security cryptographic hash function
Network Security Presentation
Public Key Cryptosystem
X.509 Certificates
SYMMETRIC CRYPTOGRAPHY
Idea(international data encryption algorithm)
SSH - Secure Shell
TCP over wireless slides
Email security
kerberos
IoT Coap
ip security
Diffie hellman key exchange algorithm
Presentation On Steganography
PGP S/MIME
Classless addressing
Ad

Viewers also liked (8)

PPTX
Operating System Security
PPTX
Operating system security
PPTX
Operating system security
PPTX
Security & protection in operating system
PPSX
File system security
PPTX
File Security System_2
PPTX
Operating system security
PPT
File system
Operating System Security
Operating system security
Operating system security
Security & protection in operating system
File system security
File Security System_2
Operating system security
File system
Ad

Similar to File security system (20)

PPTX
Network security
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPTX
Computer network
PPT
Computer and Network Security
PPTX
Data encryption
PPT
Fundamentals of cryptography
PPTX
Cryptography
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
DOCX
Cryptography and security
PPTX
PPTX
Introduction to cryptography part1-final
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Basic cryptography
PPTX
groupWork.pptx
PDF
Cryptography
PPTX
Cryptography
PPTX
CISSP - Chapter 3 - Cryptography
PPT
Cryptography - An Overview
Network security
Fundamentals of Cryptography: Securing Data in the Digital Age
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Computer network
Computer and Network Security
Data encryption
Fundamentals of cryptography
Cryptography
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Cryptography and security
Introduction to cryptography part1-final
Detailed description about the concept of E Commerce UNIT IV.pptx
Basic cryptography
groupWork.pptx
Cryptography
Cryptography
CISSP - Chapter 3 - Cryptography
Cryptography - An Overview

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Introduction to Artificial Intelligence
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
top salesforce developer skills in 2025.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Essential Infomation Tech presentation.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Digital Strategies for Manufacturing Companies
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Introduction to Artificial Intelligence
Design an Analysis of Algorithms II-SECS-1021-03
2025 Textile ERP Trends: SAP, Odoo & Oracle
Softaken Excel to vCard Converter Software.pdf
top salesforce developer skills in 2025.pdf
Design an Analysis of Algorithms I-SECS-1021-03
Reimagine Home Health with the Power of Agentic AI​
Odoo POS Development Services by CandidRoot Solutions
Internet Downloader Manager (IDM) Crack 6.42 Build 41
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PTS Company Brochure 2025 (1).pdf.......
Essential Infomation Tech presentation.pptx
Understanding Forklifts - TECH EHS Solution
Which alternative to Crystal Reports is best for small or large businesses.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Digital Strategies for Manufacturing Companies
Operating system designcfffgfgggggggvggggggggg
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus

File security system

  • 2. Why Cryptography ? We all know that now a day this is the world of information technology and almost everyone have to communicate with each other. Most of the time this communication occurs on the network. During the communication of data it may be possible that the data we are sending or receiving can be hacked or edited by someone. The data we are communicating may be bank a/c number, passwords or some important files etc. To protect the data from this type of unwanted things “Cryptography” is very useful.
  • 3.  This project is all about providing security while communicating any data on the network between two or many user. We are going to discuss about the main ciphers used in Cryptography in this project.  There are various techniques of encryption and decryption which are used in this project such as  Shift or Substitution cipher  Monoalphabetic cipher  Playfair cipher  Vegenere cipher  Within the context of application-to-application communication, there are some specific security requirements, including:  Authentication  Privacy/Confidentiality  Integrity  Non-repudiation
  • 4.  Cryptography, then not only protect data from theft or alteration, but can also be used for user authentication.  There are, in general two types of Cryptographic schemes typically used to accomplish these goal: (1) Private–key ( or symmetric ) cryptography (2) Public-Key ( or asymmetric ) cryptography  In all the cases,  The initial unencrypted data is referred to as “plaintext”.  The encrypted data is referred to as “cipher text”. (which will in turn (usually) be decrypted into usable plaintext)
  • 5. 1. Introduction 1.1 Introduction to Cryptography 1.2 Types of Cryptographic Algorithm 1.2.1 Secret key Cryptography 1.2.2 Public Key Cryptography 1.2.3 Hash Function 2. Purpose 3. Objective 4. System Specification  Hardware  Software 5. Future Scope 6. Conclusion
  • 6. Introduction  The word cryptography or cryptology comes from an Ancient Greek. The word cryptology is made of two components ”crypto”, which means hidden or secret and “logos” which means word. It is a Science of writing in secret code. Cryptography is the study of techniques for secure communication.  There are two important concepts of cryptography, first one is Encryption & the second one is Decryption. Encryption is the process in which the plain text is changed into cipher Text & decryption is just reverse process of encryption that means cipher text is changed into plain text. There are various techniques of Encryption & Decryption which are used in this project such as Shift Cipher, Playfair Cipher, Monoalphabetic Cipher, Vanier Cipher.  We use the term cryptography to refer to the science and art for transforming message to make them secure from attacks.
  • 7.  The original message before being transformed is called ”Plaintext”. After the message is transformed is called ”Ciphertext”. An encryption algorithm transform the Plaintext into Ciphertext & a decryption algorithm transforms the Ciphertext back into Plaintext. Encryption Decryption #%GIUYRWKMN,S:{? Hello World! Hello World! ( ciphertext ) ( Plaintext ) ( Plaintext ) ( Shared Secret Key )
  • 8. Objective 1 . To d e v e l o p a s o f t w a r e i n w h i c h w e w i l l i n p u t : i ) F i l e s i i ) M e s s a g e s a n d w e w i l l g e t e n c r y p t e d f i l e s o r m e s s a g e s . 2 . T h e e n c r y p t e d i n f o r m a t i o n c a n b e u s e d i n t h e n e t w o r k ( l o c a l o r i n t e r n e t ) i n a s a f e a n d s e c u r e d w a y 3 . T h e s o f t w a r e c a n a l s o b e u s e d t o d e c r y p t t h e e n c r y p t e d d a t a i n t h e o r i g i n a l f o r m 4 . U s e r w i l l b e a b l e t o u s e t h e i r o w n k e y s t o e n c r y p t t h e d a t a .
  • 9. SYSTEM SPECIFICATION SOFTWARE REQUIREMENTS :  OPERATING SYSTEM : WINDOWS XP / 7  FRONT END : C#.net  BACK END : SQL Server HARDWARE REQUIREMENTS :  Processor : Pentium IV & above  Processor Speed : 1 G Hz  RAM : 2 GB  Hard Disc : 10 GB
  • 11. COLUMNS DATA TYPE SIZE Member_id int Password char 20 Security Question char 30 Security Answer char 20 L O G I N T A B L E : (FOREIGN KEY)
  • 12. MEMBER DETAIL TABLE COLUMNS Data Type Size Member_id int Name char 20 Mobile char 10 Email_id char 30 Address Char 50 (Primary Key)
  • 13. LOG TABLE Columns Data Type Size Member_id int File name char 20 Data datetime Type char 10 (FOREIGN KEY) Encryption & Decryption
  • 15. TYPES OF CRYPTOGRAPHIC ALGORITHMS  There are several ways of classifying cryptographic algorithm.  Defined by their application and use. The three types of algorithms that will be discussed are as follows. 1. Secret key Cryptography(SKC) 2. Public Key cryptography(PKC) 3. Hash Function
  • 16. SECRET KEY (SKC) Single key used to encrypt and decrypt . Key must be known by both parties. Encrypt Decrypt S a m e K e y i s u s e d t o E n c r y p t a n d D e c r y p t d a t a Sender Recipient Shared Secret Key Plaintext Ciphertext Plaintext
  • 17. PUBLIC KEY (PKC) Two different keys are used in this cryptography One key is used for encryption & other for decryption Encrypt Decrypt D i f f e r e n t K e y s a r e u s e d t o E n c r y p t a n d D e c r y p t d a t a Sender Recipient Recipient Public Key Recipient Private Key Plaintext Ciphertext Plaintext
  • 18. HASH FUNCTION  Hash is a function which is used to compress the string.  The input in the hash function is known as “Message” and output is called “Digest”.  Hash functions have four main properties :  It is easy to compute the hash value for any given message.  It is infeasible to generate a message from its hash.  It is infeasible to modify a message without changing the hash.  It is infeasible to find two different message with the same hash. Message ( variable size ) H A S H Digest ( fixed size )
  • 19. Our project(system) can do the cryptography by encrypting and decrypting data. We are dependent on other mailing systems Like – gmail, yahoo etc for information transfer. In future we can add the information transfer module so that after encryption users can transfer informationbythesamesoftware. Future scope
  • 20. Finally, we can say that in this project development we have learnt a lot and during the process we will get the chance to explore cryptography and the concepts involved. CONCLUSION