OOT Project Report Sample Format
OOT Project Report Sample Format
A Report Submitted
In Partial Fulfillment
for award of Bachelor of Technology
In
CSE(Data Science)
By
DECLARATION
I hereby declare that the work presented in this report was carried out by me. I have not
submitted the matter embodied in this report for the award of any other degree or diploma of
any other University or Institute.
i
CSE (Data Science)
CERTIFICATE
Certified that Ayush Kumar (Roll No: 2301331540048), has carried out the industrial work
partial fulfillment of the requirements for the award of Bachelor of Technology, department
name from Dr. APJ Abdul Kalam Technical University, Lucknow under our supervision.
Signature Signature
(Designation) (Designation)
(Department) (Department)
NIET Greater Noida NIET Greater Noida
Date:
ii
CSE (Data Science)
ACKNOWLEDGEMENT
<Times New Roman, font size 14>
I would like to express my gratitude towards <Mr. Raviraj Singh> for their guidance, support
and constant supervision as well as for providing necessary information during my internship.
My thanks and appreciations to respected HOD, for their motivation and support throughout.
iii
CSE (Data Science)
iv
CSE (Data Science)
Abstract
Data security is a major issue which we are facing today in this digital world of communication. As
we know that today hackers are almost at every corner in search of our useful data which can be
hacked by them for their different purposes. Even the risk gets doubled when come to the data of
any country’s government. So, a system or terminology is must require to make that data safe
Data protection can be accomplished by changing the original data by any means to some other un
useful data so that if someone gets that data then also it must remain in un useful bits. This process
can be achieved by Encrypting that data by some means of algorithms which are known to the
sender and the similar Decryption algorithms to be known to only the desired receiver so that it can
convert that encrypted data back to the user understandable form. Today as it is a need to develop
such kind of applications which performs the specified task but along with it should be very much
user friendly so that no special skills need to be required to learn in order to use that application or
project.
In the application the user has to select either wants to send something by encrypting or wants to
receive by decrypting. If it wants to send then it has to select source file previously designed or type
some message which is to Encrypt and then transfer. Whereas on the receiver side again the
receiver has to select the file which is to be received from the sender along with a decryption key to
decrypt that message. Decryption key can be selected either manually if told by the sender or
selecting key sent by the sender along with the encrypted data to avoid further delay in processing
the message
v
CSE (Data Science)
TABLE OF CONTENTS
Page No.
Declaration i
Certificate from the institute ii
Certificate from the industry iii
Acknowledgement iv
Abstract v
CHAPTER 1: INTRODUCTION 1-12
1.1 INTRODUCTION
1.1.1
1.1.2
1.1.2.1
1.1.2.2
1.1.2.3
1.2 OBJECTIVE AND SCOPE
………………
CHAPTER 2: Code 13-20
1
CSE (Data Science)
CHAPTER 1
INTRODUCTION
1.1Overview:
This project is all about the Data Security. How we can secure our
data from hackers. The symmetric-key block cipher plays an
important role in data encryption. It means that the same key is used
for both encryption and decryption. The Advanced Encryption
Standard (AES) is a widely used symmetric-key encryption algorithm.
In this project, we’ll see how to implement AES encryption and
decryption using the Java Cryptography Architecture (JCA) within the
JDK.
1
CSE (Data Science)
2
CSE (Data Science)
CHAPTER 2
Code
package ecryptiondecryption;
import java.awt.Frame;
import java.awt.Toolkit;
import java.awt.datatransfer.StringSelection;
import java.io.UnsupportedEncodingException;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.Arrays;
import java.util.Base64;
import javax.crypto.Cipher;
import javax.crypto.spec.SecretKeySpec;
/**
*/
3
CSE (Data Science)
try {
key = myKey.getBytes("UTF-8");
sha = MessageDigest.getInstance("SHA-1");
key = sha.digest(key);
catch (NoSuchAlgorithmException e) {
e.printStackTrace();
catch (UnsupportedEncodingException e) {
e.printStackTrace();
public source() {
initComponents();
@SuppressWarnings("unchecked")
4
CSE (Data Science)
setDefaultCloseOperation(javax.swing.WindowConstants.EXIT_ON_CLOSE);
setAlwaysOnTop(true);
setUndecorated(true);
setResizable(false);
getContentPane().setLayout(null);
text1.setColumns(20);
text1.setRows(5);
jScrollPane1.setViewportView(text1);
getContentPane().add(jScrollPane1);
5
CSE (Data Science)
text2.setColumns(20);
text2.setRows(5);
jScrollPane2.setViewportView(text2);
getContentPane().add(jScrollPane2);
text3.setColumns(20);
text3.setRows(5);
text3.setToolTipText("");
jScrollPane3.setViewportView(text3);
getContentPane().add(jScrollPane3);
text4.setColumns(20);
text4.setRows(5);
6
CSE (Data Science)
jScrollPane4.setViewportView(text4);
getContentPane().add(jScrollPane4);
msg1.setHorizontalAlignment(javax.swing.JTextField.CENTER);
getContentPane().add(msg1);
msg2.setHorizontalAlignment(javax.swing.JTextField.CENTER);
getContentPane().add(msg2);
encrypt.setText("Encrypt");
encrypt.addActionListener(new java.awt.event.ActionListener() {
encryptActionPerformed(evt);
});
getContentPane().add(encrypt);
7
CSE (Data Science)
decrypt.setText("Decrypt");
decrypt.addActionListener(new java.awt.event.ActionListener() {
decryptActionPerformed(evt);
});
getContentPane().add(decrypt);
copyencrypt.setText("Copy Encryption");
copyencrypt.addActionListener(new java.awt.event.ActionListener() {
copyencryptActionPerformed(evt);
});
getContentPane().add(copyencrypt);
copydecrypt.setText("Copy Decryption");
copydecrypt.addActionListener(new java.awt.event.ActionListener() {
copydecryptActionPerformed(evt);
});
getContentPane().add(copydecrypt);
8
CSE (Data Science)
jLabel2.setCursor(new java.awt.Cursor(java.awt.Cursor.HAND_CURSOR));
jLabel2.addMouseListener(new java.awt.event.MouseAdapter() {
jLabel2MousePressed(evt);
});
getContentPane().add(jLabel2);
jLabel3.setCursor(new java.awt.Cursor(java.awt.Cursor.HAND_CURSOR));
jLabel3.addMouseListener(new java.awt.event.MouseAdapter() {
jLabel3MousePressed(evt);
});
getContentPane().add(jLabel3);
jLabel1.setText("Encryption Key");
jLabel1.setHorizontalAlignment(javax.swing.SwingConstants.CENTER);
getContentPane().add(jLabel1);
jLabel4.setText("Decryption Key");
jLabel4.setHorizontalAlignment(javax.swing.SwingConstants.CENTER);
9
CSE (Data Science)
getContentPane().add(jLabel4);
jLabel5.setHorizontalAlignment(javax.swing.SwingConstants.CENTER);
jLabel5.setText("Message to Decrypt");
getContentPane().add(jLabel5);
jLabel6.setHorizontalAlignment(javax.swing.SwingConstants.CENTER);
getContentPane().add(jLabel6);
message1.setHorizontalAlignment(javax.swing.SwingConstants.CENTER);
getContentPane().add(message1);
message2.setHorizontalAlignment(javax.swing.SwingConstants.CENTER);
getContentPane().add(message2);
mainsection.setIcon(new javax.swing.ImageIcon(getClass().getResource("/image/edcrypt.png")));
mainsection.setCursor(new java.awt.Cursor(java.awt.Cursor.DEFAULT_CURSOR));
10
CSE (Data Science)
getContentPane().add(mainsection);
setLocationRelativeTo(null);
System.exit(0);
this.setState(Frame.ICONIFIED);
String strToEncrypt;
String secret;
try
strToEncrypt=text1.getText();
secret=msg1.getText();
setKey(secret);
cipher.init(Cipher.ENCRYPT_MODE, secretKey);
text2.setText(Base64.getEncoder().encodeToString(cipher.doFinal(strToEncrypt.getBytes("UTF-
8"))));
11
CSE (Data Science)
catch (Exception e)
Toolkit.getDefaultToolkit().getSystemClipboard().setContents(new
StringSelection(text2.getText()),null);
message2.setText("");
String secret;
String strToDecrypt;
try
secret=msg2.getText();
strToDecrypt=text3.getText();
setKey(secret);
cipher.init(Cipher.DECRYPT_MODE, secretKey);
text4.setText(new String(cipher.doFinal(Base64.getDecoder().decode(strToDecrypt))));
catch (Exception e)
12
CSE (Data Science)
Toolkit.getDefaultToolkit().getSystemClipboard().setContents(new
StringSelection(text4.getText()),null);
message1.setText("");
try {
if ("Nimbus".equals(info.getName())) {
javax.swing.UIManager.setLookAndFeel(info.getClassName());
break;
java.util.logging.Logger.getLogger(source.class.getName()).log(java.util.logging.Level.SEVERE,
null, ex);
java.util.logging.Logger.getLogger(source.class.getName()).log(java.util.logging.Level.SEVERE,
null, ex);
java.util.logging.Logger.getLogger(source.class.getName()).log(java.util.logging.Level.SEVERE,
null, ex);
java.util.logging.Logger.getLogger(source.class.getName()).log(java.util.logging.Level.SEVERE,
null, ex);
java.awt.EventQueue.invokeLater(new Runnable() {
new source().setVisible(true);
13
CSE (Data Science)
});
14
CSE (Data Science)
CHAPTER 3
Output
15
CSE (Data Science)
16
CSE (Data Science)
17
CSE (Data Science)
18
CSE (Data Science)
REFERENCES
Yenuguvanilanka. J., & Elkeelany, O. (2008. April). Performance
evaluation of hardware
models of Advanced Encryption Standard (AES) algorithm. In
Southeastcon, 2008. IEEE
(pp. 222-225).
“AES Website”,
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
“Java Website”,
http://www.en.wikipedia.org/wiki/Java_(programming_language)
Lu. C. C.. & Tseng, S. Y. (2002). Integrated design of AES (Advanced
Encryption
Standard) encrypter and decrypter. In Application-Specific Systems.
Architectures and
Processors. 2002. Proceedings. The IEEE International Conference on (pp.
277-285).
Mohamed. A. A., & Madian, A. H. (2010. December). A Modified
Rijndael Algorithm and
its Implementation using FPGA. In Electronics. Circuits, and Systems
(ICECS), 2010 17th
IEEE International Conference on (pp. 335-338).
Deshpande. H. S., Karande, K. J., & Mulani, A. 0. (2014. April). Efficient
implementation
of AES algorithm on FPGA. In Communications and Signal Processing
(ICCSP), 2014
IEEE International Conference on (pp. 1895-1899).
Nadeem, H (2006). A performance comparison of data encryption
algorithms," IEEE
Information and Communication Technologies, (pp. 84-89).
19
CSE (Data Science)
20
CSE (Data Science)
21
CSE (Data Science)
22