SlideShare a Scribd company logo
2
Most read
8
Most read
K c college of engineering & management studies
& Research ,Kopri, Thane (E)
Password Based Encryption
Decryption in Android
Jainil sharma
Aakanksha singh
Madhavi soni
Sachin tripathi
Advanced Encryption Standard (AES)
popular and widely adopted symmetric encryption
Six time faster than triple DES
Features:
1.) Symmetric key symmetric block cipher
2.)128-bit data, 128/192/256-bit keys
3.)Stronger and faster than Triple-DES
4.)Provide full specification and design details
5.)Software implementable in C and Java
Introduction
Encryption & Decryption
 Encryption Process
 Byte Substitution
 Shift rows
 Mix columns
 Add Round key
 Decryption Process
 Add round key
 Mix columns
 Shift rows
 Byte substitution
AES Operations
 An iterative rather than
Feistel cipher.
 Based on ‘substitution–
permutation network’.
 AES uses 10 rounds for 128-
bit keys, 12 rounds for 192-
bit keys and 14 rounds for
256-bit keys.
 series of linked operations:
 replacing inputs by specific
outputs (substitutions).
 involve shuffling bits around
(permutations).
Proposed System Algorithm's :
Initiate a Connection
The Key Generation Process
The XoR Encryption Process
Index Generator Table Shifting
The Index Generation Process
The Key Insertion Process
Sending Packets
The Key Extracting Process
The Decryption Process
Proposed System
Block Diagram
 Android API:
 Xml (User Interface)
 Java (Event Handling)
 Networking:
 Cryptology( Encryption & Decryption)
Technology Used
User Interface
 Voice Communications
 Network Appliances
 Virtual Private Network (VPN)
 Secure Socket Layer (SSL)
Application
 Nowadays, the networks have gone global and information
has taken the digital form of bits and bytes. Critical
information now gets stored, processed and transmitted in
digital form on computer systems and open communication
channels.
 Since information plays such a vital role, adversaries are
targeting the computer systems and open communication
channels to either steal the sensitive information or to disrupt
the critical information system.
 Modern cryptography provides a robust set of techniques to
ensure that the malevolent intentions of the adversary are
thwarted while ensuring the legitimate users get access to
information. Here in this chapter, we will discuss the benefits
that we draw from cryptography, its limitations, as well as the
future of cryptography.
Conclusion

More Related Content

PPTX
Encryption And Decryption Using AES Algorithm
DOCX
Security solutions in vlsi design
PPTX
Cryptography and network security
PDF
Implementation of-hybrid-cryptography-algorithm
PPT
fucking shit
PPTX
Aes (advance encryption standard)
PPTX
Blow fish final ppt
Encryption And Decryption Using AES Algorithm
Security solutions in vlsi design
Cryptography and network security
Implementation of-hybrid-cryptography-algorithm
fucking shit
Aes (advance encryption standard)
Blow fish final ppt

What's hot (20)

DOCX
Data encryption standard
PPTX
Network security & cryptography
ODP
Encryption Techniques
PPT
Cryptography Lecture by Sam Bowne
PPT
Cryptography
PPT
Encryption
PDF
Hybrid AES DES
PPTX
Hybrid encryption ppt
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PDF
Mini Project on Data Encryption & Decryption in JAVA
PPTX
Encryption
PPTX
Encryption ppt
PPTX
Encryption
PPTX
Cryptography and network security
PPT
Encryption
PPTX
Data encryption
PPTX
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
PPTX
Cryptographic tools
 
Data encryption standard
Network security & cryptography
Encryption Techniques
Cryptography Lecture by Sam Bowne
Cryptography
Encryption
Hybrid AES DES
Hybrid encryption ppt
Ch12 Cryptography it-slideshares.blogspot.com
Advanced Encryption Standard (AES) Implementaion using Java
Mini Project on Data Encryption & Decryption in JAVA
Encryption
Encryption ppt
Encryption
Cryptography and network security
Encryption
Data encryption
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
Cryptographic tools
 
Ad

Similar to Password based encryption (20)

PPTX
Cryptography presentation graduate level
PPTX
Crptography Electrical engineering .pptx
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PPTX
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
PPT
6. cryptography
PDF
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
PDF
Nt1310 Unit 6 Powerpoint
PDF
PDF
PPTX
A study of cryptography for satellite applications
PDF
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
PDF
The Time-Consuming Task Of Preparing A Data Set For...
PPTX
IS-cryptograpy algorithms.pptx
PDF
researchpaperfinal1
PDF
Prevention of Cheating Message based on Block Cipher using Digital Envelope
PDF
J017667582
PDF
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
PDF
IRJET- Secure File Storage on Cloud using Cryptography
PDF
A new hybrid text encryption approach over mobile ad hoc network
PPTX
Secrity project keyvan
Cryptography presentation graduate level
Crptography Electrical engineering .pptx
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
6. cryptography
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
Nt1310 Unit 6 Powerpoint
A study of cryptography for satellite applications
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
The Time-Consuming Task Of Preparing A Data Set For...
IS-cryptograpy algorithms.pptx
researchpaperfinal1
Prevention of Cheating Message based on Block Cipher using Digital Envelope
J017667582
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
IRJET- Secure File Storage on Cloud using Cryptography
A new hybrid text encryption approach over mobile ad hoc network
Secrity project keyvan
Ad

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence
The Rise and Fall of 3GPP – Time for a Sabbatical?
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
A comparative analysis of optical character recognition models for extracting...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25-Week II
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)

Password based encryption

  • 1. K c college of engineering & management studies & Research ,Kopri, Thane (E) Password Based Encryption Decryption in Android Jainil sharma Aakanksha singh Madhavi soni Sachin tripathi
  • 2. Advanced Encryption Standard (AES) popular and widely adopted symmetric encryption Six time faster than triple DES Features: 1.) Symmetric key symmetric block cipher 2.)128-bit data, 128/192/256-bit keys 3.)Stronger and faster than Triple-DES 4.)Provide full specification and design details 5.)Software implementable in C and Java Introduction
  • 3. Encryption & Decryption  Encryption Process  Byte Substitution  Shift rows  Mix columns  Add Round key  Decryption Process  Add round key  Mix columns  Shift rows  Byte substitution
  • 4. AES Operations  An iterative rather than Feistel cipher.  Based on ‘substitution– permutation network’.  AES uses 10 rounds for 128- bit keys, 12 rounds for 192- bit keys and 14 rounds for 256-bit keys.  series of linked operations:  replacing inputs by specific outputs (substitutions).  involve shuffling bits around (permutations).
  • 5. Proposed System Algorithm's : Initiate a Connection The Key Generation Process The XoR Encryption Process Index Generator Table Shifting The Index Generation Process The Key Insertion Process Sending Packets The Key Extracting Process The Decryption Process Proposed System
  • 7.  Android API:  Xml (User Interface)  Java (Event Handling)  Networking:  Cryptology( Encryption & Decryption) Technology Used
  • 9.  Voice Communications  Network Appliances  Virtual Private Network (VPN)  Secure Socket Layer (SSL) Application
  • 10.  Nowadays, the networks have gone global and information has taken the digital form of bits and bytes. Critical information now gets stored, processed and transmitted in digital form on computer systems and open communication channels.  Since information plays such a vital role, adversaries are targeting the computer systems and open communication channels to either steal the sensitive information or to disrupt the critical information system.  Modern cryptography provides a robust set of techniques to ensure that the malevolent intentions of the adversary are thwarted while ensuring the legitimate users get access to information. Here in this chapter, we will discuss the benefits that we draw from cryptography, its limitations, as well as the future of cryptography. Conclusion