0% found this document useful (0 votes)
25 views2 pages

INS Proposal

The proposal outlines a micro-project aimed at developing a Java-based encryption and decryption system using various cipher techniques to enhance data security. It includes a detailed action plan with specific activities, timelines, and responsible team members, as well as resources required for the project. The course outcomes emphasize the application of multifactor authentication, encryption techniques, and security measures against internet threats.

Uploaded by

adityapandji1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views2 pages

INS Proposal

The proposal outlines a micro-project aimed at developing a Java-based encryption and decryption system using various cipher techniques to enhance data security. It includes a detailed action plan with specific activities, timelines, and responsible team members, as well as resources required for the project. The course outcomes emphasize the application of multifactor authentication, encryption techniques, and security measures against internet threats.

Uploaded by

adityapandji1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Micro-Project Proposal

Information Security
(314319)
Cipher Text: Encryption and Decryption
1. Aim:
To develop a Java-based encryption and decryption system using various cipher
techniques to enhance data security and confidentiality.

2. Course Outcome:
 C02: Apply Multifactor user Authentication and access control mechanisms on file,
folder, device and applications.
 CO3: Apply basic encryption and decryption techniques for given text.
 CO5: Implement security techniques to prevent internet threats.

3. Proposed Methodology:
 Research and Concept Understanding – Studying various cipher algorithms and
their applications in security.
 Designing the System – Developing a Java-based encryption-decryption tool with
GUI functionality.
 Implementation – Writing Java code for different cipher techniques (Caesar,
Playfair, Vernam, Vigenere).
 Testing and Debugging – Evaluating the accuracy and efficiency of encryption-
decryption processes.
 Documentation and Report Preparation – Compiling project findings,
implementation details, and conclusions.

4. Action Plan:
Sr. Activity Start Date Finish Team Members
No. Date Responsible
1 Research encryption, decryption, and
03/03/2025 06/03/2025 Aditya Pandji
cipher techniques Chinmay Borse
2 Study Intellij IDEA software for 07/03/2025 10/03/2025 Aditya Pandji
implementation
3 Develop Java code for encryption and 10/03/2025 14/03/2025 Chinmay Borse
decryption
4 Design and implement GUI for user 15/03/2025 16/03/2025 Aditya Pandji
interaction
5 Integrate different cipher techniques 17/03/2025 18/03/2025 Aditya Pandji
(Caesar, Vigenere, Vernam, Playfair)
6 Test encryption and decryption 19/03/2025 19/03/2025 Chinmay Borse
functions for accuracy
7 Debug and optimize code for 20/03/2025 21/03/2025 Aditya Pandji
performance
8 Prepare documentation and report 22/03/2025 23/03/2025 Chinmay Borse
writing
9 Submission of Micro-Project 24/03/2025 24/03/2025 Aditya Pandji
Chinmay Borse

5. Resources Required:

Sr. No Name of the Specification Quantity


Resources

1. Laptop Windows 10 2
2. Java Software JDK 1.8.321 1
3. Notes Manuals 1

6. Team Members:
Roll no. Name
1 Chinmay Borse
4 Aditya Pandji

You might also like