0% found this document useful (0 votes)
15 views12 pages

Professional Reort Ofencryptn and Decryption

This report details the process of encrypting and decrypting a computer drive using BitLocker. It explains the concepts of encryption and decryption, including their definitions, types, and uses, while providing a step-by-step guide for both processes. The project aims to enhance data security by protecting sensitive information through encryption and ensuring accessibility through decryption.

Uploaded by

Salman Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views12 pages

Professional Reort Ofencryptn and Decryption

This report details the process of encrypting and decrypting a computer drive using BitLocker. It explains the concepts of encryption and decryption, including their definitions, types, and uses, while providing a step-by-step guide for both processes. The project aims to enhance data security by protecting sensitive information through encryption and ensuring accessibility through decryption.

Uploaded by

Salman Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Professional Report of Encryption

and Decryption of Computer Drive

1
Table of content

1. Abstract………………………………………..3
2. Objective………………………………………3
3. What is mean by Encryption?……………….3
4. Encyprion of computer drive……………….5
5. What is mean by Decryption?……………….8
6. Decryption of computer drive……………….10
7. Summary……………………………………….11

2
1.ABSTRACT:
The title of our project is Encrypt and Decrypt the computer drive.This
project is done by Bitlocker.First step is to Encrypted the computer drive
and the Second step is to decrypted using Bitlocker.Encryption and
Decryption is a strong text and file encryption software for personal and
professional security.It protects privacy of our email messages,
documents and sensitive files.

2.Objectives:
The main objective of our project is to encrypt and decrypt of computer
drive .For this I used Bitlocker for encyption and decryption.This project
is simple and make an report is mandatory for this.

3.What is mean by Encryption


Encryption is a process used to secure data by converting it into a format
that is unreadable to unauthorized users. This is achieved by using
algorithms that transform the original information, known as plaintext,
into an encoded version, called ciphertext. The primary goal of
encryption is to protect the confidentiality of data, ensuring that only
authorized parties who possess the appropriate decryption key can access
and understand the information.

Key Concepts in Encryption


Plaintext: The original, readable data or message that needs to be
protected.
Ciphertext: The encoded version of the plaintext, which is unreadable
without the decryption key.

3
Encryption Algorithm: A mathematical formula used to convert
plaintext into ciphertext. Examples include AES (Advanced Encryption
Standard), RSA, and DES (Data Encryption Standard).
Decryption: The process of converting ciphertext back into plaintext
using a decryption key.
Encryption Key: A piece of information used by the encryption
algorithm to convert plaintext into ciphertext. In symmetric encryption,
the same key is used for both encryption and decryption. In asymmetric
encryption, a pair of keys (public and private) are used.

Types of Encryption
Symmetric Encryption: Uses the same key for both encryption and
decryption. It is fast and efficient for large amounts of data but requires
secure key management to ensure the key is not compromised. Example:
AES.
Asymmetric Encryption: Uses a pair of keys – a public key for
encryption and a private key for decryption. It is more secure for
transmitting data over insecure channels because the private key never
needs to be shared. Example: RSA.
Uses of Encryption
Data Security: Protecting sensitive information such as personal data,
financial information, and confidential communications.
Secure Communication: Ensuring that messages or data sent over the
internet or other networks remain private and are not intercepted or
tampered with.
Authentication: Verifying the identity of users and devices to ensure that
only authorized entities can access certain data or services.

4
Integrity: Ensuring that data has not been altered or tampered with
during transmission or storage.
Examples of Encryption in Use

HTTPS: Encrypts data transmitted between a web browser and a website


to protect against eavesdropping and man-in-the-middle attacks.
Email Encryption: Tools like PGP (Pretty Good Privacy) encrypt email
content to secure communications.
File Encryption: Software like BitLocker and VeraCrypt encrypt files
and entire drives to protect data on storage devices.

4.Encyprion of computer drive:


The First step chose drive .I chose drive E.

5
Then

then

6
then

Then

7
Then

Then

After completion the next step is decryption.

5.What is mean by Decryption?


Decryption is the process of converting encrypted data, known as
ciphertext, back into its original, readable format, called plaintext. This
process requires a decryption key, which is used to reverse the encryption
algorithm and restore the original information. Decryption is the

8
counterpart to encryption and is essential for accessing and understanding
data that has been securely encoded to protect it from unauthorized access.

Key Concepts in Decryption

1. Ciphertext: The encrypted, unreadable data that needs to be


decrypted.
2. Plaintext: The original, readable data that results from the
decryption process.
3. Decryption Algorithm: A mathematical process that reverses the
encryption algorithm, using the decryption key to transform ciphertext
back into plaintext.
4. Decryption Key: A piece of information used by the decryption
algorithm to convert ciphertext into plaintext. In symmetric encryption,
the same key used for encryption is used for decryption. In asymmetric
encryption, the private key is used for decryption.

Types of Decryption

Symmetric Decryption: Uses the same key for both encryption and
decryption. This means the key must be securely shared and kept secret
between the communicating parties.

Asymmetric Decryption: Uses a pair of keys – a public key for


encryption and a private key for decryption. Only the private key holder
can decrypt the ciphertext that was encrypted with the corresponding
public key.

1.

Uses of Decryption

 Data Retrieval: Accessing and understanding information that has


been encrypted to protect its confidentiality.
 Secure Communication: Ensuring that messages received over an
insecure network can be read only by the intended recipient.
 Authentication: Verifying the identity of the sender or the
integrity of the message by decrypting a digital signature or encrypted
hash.
 Data Integrity: Confirming that data has not been altered by
decrypting and comparing it to the original data or its hash.

9
Examples of Decryption in Use

 Secure Websites (HTTPS): When accessing a secure website, the


data sent from the server to the browser is encrypted using HTTPS. The
browser decrypts the data using a session key.
 Encrypted Emails: When an email is sent using encryption tools
like PGP, the recipient uses their private key to decrypt the email and
read its contents.
 Encrypted Files: Software like VeraCrypt allows users to encrypt
files or entire disks. The files can only be accessed by decrypting them
with the correct key or password.
6.Decryption of computer drive:
After encryption the next step is decrypt of our computer drive.

10
Then

Then

Summary
In this project I am explain how we encrypt and decrypt computer drive.I am
encrypt the drive E using Bitlockers.I am first encrypt and after decrypt all
step I mention in pics.

11
12

You might also like