Professional Reort Ofencryptn and Decryption
Professional Reort Ofencryptn and Decryption
1
Table of content
1. Abstract………………………………………..3
2. Objective………………………………………3
3. What is mean by Encryption?……………….3
4. Encyprion of computer drive……………….5
5. What is mean by Decryption?……………….8
6. Decryption of computer drive……………….10
7. Summary……………………………………….11
2
1.ABSTRACT:
The title of our project is Encrypt and Decrypt the computer drive.This
project is done by Bitlocker.First step is to Encrypted the computer drive
and the Second step is to decrypted using Bitlocker.Encryption and
Decryption is a strong text and file encryption software for personal and
professional security.It protects privacy of our email messages,
documents and sensitive files.
2.Objectives:
The main objective of our project is to encrypt and decrypt of computer
drive .For this I used Bitlocker for encyption and decryption.This project
is simple and make an report is mandatory for this.
3
Encryption Algorithm: A mathematical formula used to convert
plaintext into ciphertext. Examples include AES (Advanced Encryption
Standard), RSA, and DES (Data Encryption Standard).
Decryption: The process of converting ciphertext back into plaintext
using a decryption key.
Encryption Key: A piece of information used by the encryption
algorithm to convert plaintext into ciphertext. In symmetric encryption,
the same key is used for both encryption and decryption. In asymmetric
encryption, a pair of keys (public and private) are used.
Types of Encryption
Symmetric Encryption: Uses the same key for both encryption and
decryption. It is fast and efficient for large amounts of data but requires
secure key management to ensure the key is not compromised. Example:
AES.
Asymmetric Encryption: Uses a pair of keys – a public key for
encryption and a private key for decryption. It is more secure for
transmitting data over insecure channels because the private key never
needs to be shared. Example: RSA.
Uses of Encryption
Data Security: Protecting sensitive information such as personal data,
financial information, and confidential communications.
Secure Communication: Ensuring that messages or data sent over the
internet or other networks remain private and are not intercepted or
tampered with.
Authentication: Verifying the identity of users and devices to ensure that
only authorized entities can access certain data or services.
4
Integrity: Ensuring that data has not been altered or tampered with
during transmission or storage.
Examples of Encryption in Use
5
Then
then
6
then
Then
7
Then
Then
8
counterpart to encryption and is essential for accessing and understanding
data that has been securely encoded to protect it from unauthorized access.
Types of Decryption
Symmetric Decryption: Uses the same key for both encryption and
decryption. This means the key must be securely shared and kept secret
between the communicating parties.
1.
Uses of Decryption
9
Examples of Decryption in Use
10
Then
Then
Summary
In this project I am explain how we encrypt and decrypt computer drive.I am
encrypt the drive E using Bitlockers.I am first encrypt and after decrypt all
step I mention in pics.
11
12