0% found this document useful (0 votes)
13 views3 pages

New Microsoft Word Document

The document presents a micro-project proposal and report on symmetric key cryptography, focusing on the use of a single secret key for both encryption and decryption of data. It outlines the aims, intended outcomes, and methodologies for implementing a demonstration of the Data Encryption Standard (DES) algorithm, highlighting its importance in securing sensitive information. The report also discusses the vulnerabilities of DES and the need for secure key generation to maintain data confidentiality and integrity.

Uploaded by

sanskaralave40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views3 pages

New Microsoft Word Document

The document presents a micro-project proposal and report on symmetric key cryptography, focusing on the use of a single secret key for both encryption and decryption of data. It outlines the aims, intended outcomes, and methodologies for implementing a demonstration of the Data Encryption Standard (DES) algorithm, highlighting its importance in securing sensitive information. The report also discusses the vulnerabilities of DES and the need for secure key generation to maintain data confidentiality and integrity.

Uploaded by

sanskaralave40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

PART A - MICRO-PROJECT PROPOSAL ''Case Study Of Symmetric Key

Cryptography'' 1.0 Brief Introduction Symmetric encryption is a type of


encryption where only one key (a secret key)is used to both encrypt and
decrypt electronic data. The entities communicating via symmetric
encryption must exchange the key so that it can be used in the decryption
process. Both sender and receiver uses a common key to encrypt and
decrypt the message. This secret key is known only to the sender and to the
receiver. It is also called as secret key cryptography. The success of this
approach depends on the strength of the random number generator that is
used to create the secret key. Symmetric Key Cryptography is widely used in
today's Internet and primarily consists of two types of algorithms, Block and
Stream. Some common encryption algorithms include the Advanced
Encryption Standard (AES) and the Data Encryption Standard (DES). This
form of encryption is traditionally faster than Asymmetric however it requires
both the sender and the recipient of the data to have the secret key.
Asymmetric cryptography does not rely on sharing a secret key and forms
the basis of the FIDO authentication framework. 2.0 Aim of the Micro-project
•To secure our sensitive information. • To improve confidentiality, Integrity,
Availability. •To encrypt and decrypt the information. 3.0 Intended Course
Outcome • Apply cryptographic algorithms and protocol to maintain
computer security. •Apply the encrypt and decrypt algorithm to protect our
sensitive data. • Apply user identification and authentication methods.
•Maintain secured network
ication. Classical cryptanalysis involves an interesting combination of
analytical reasoning, application of mathematical tools, pattern finding,
patience, determination, and luck. Cryptanalysts are also called attackers.
Cryptology embraces both cryptography and cryptanalysis. By using
symmetric encryption algorithms, data is "scrambled" so that it can't be
understood by anyone who does not possess the secret key to decrypt it.
Once the intended recipient who possesses the key has the message, the
algorithm reverses its action so that the message is returned to its original
readable form. The secret key that the sender and recipient both use could
be a specific password or code or it can be random string of letters or
numbers that have been generated by a secure random number generator
(RNG). For banking-grade encryption, the symmetric keys must be created
using an RNG that is certified according to industry standards, such as FIPS
140-2. 5.0 Proposed Methodology • Understand the topic to given us. •
Discuss about the topic with group members. • Divided the topic throughout
each member of group. •Collected information from members and verify
from our mentor. 6.0 Resources Required S.No Name of Resources
required/material Specifications Qty Remarks 1Computer/laptop Core i5 -
3750 3.20 GHz 8 GB Ram 64- bit operating system 1-------- 2Software
Microsoft word, Python IDLE
PART B - MICRO-PROJECT REPORT ''CaseStudy Of Symmetric Key
Cryptography'' 1.0 Rational : In this project we implement small demo of a
DES algorithm to secure sensitive data. Symmetric encryption is a type of
encryption where only one key (a secret key) is used to both encrypt and
decrypt electronic data. The entities communicating via symmetric
encryption must exchange the key so that it can be used in the decryption
process. Due to the better performance and faster speed of symmetric
encryption, symmetric cryptography is typically used for bulk encryption of
large amounts of data. 2.0 Course Outcomes Addressed : •Apply
cryptographic algorithms and protocol to maintain computer security. • Apply
encrypt and decrypt algorithm to protect our sensitive data. • Apply user
identification and authentication methods. • Maintain secured network. 3.0
Literature Review : DES is a block cipher and encrypts data in blocks of size
of 64 bits each, whichmeans 64 bits of plain text goes as the input to DES,
which produces 64 bits of cipher text. The same algorithm and key are used
for encryption and decryption, with minor differences. The key length is 56
bits. During this time when the Internet provides essential communication
between tens of millions of people and is being increasingly used as a tool
for commerce, security becomes a tremendously important issue to deal
with. There are many aspects to security and many applications, ranging
from secure commerce and payments to private communications and
protecting passwords. DES uses the same key to encrypt and decrypt a
message, so both the sender and the receiver must know and use the same
private key. DES was once the go-to, symmetric key algorithm for the
encryption of electronic data. 4.0 Actual Methodology Followed : •
Understand the topic to given us. • Discuss about the topic with group
members. •Divided the topic throughout each member of group. •Collected
information from members and verify from our mentor 5.0 Actual Resources
Used : S. No Name of Resources required/material Specifications Qty
Remarks 1Computer/laptop Core i5 -3750 3.20 GHz 8 GB Ram 64- bit
operating system 1-------- 2Software Microsoft word, python IDLE ---------
6.0Introduction Data encryption standard (DES) has been found vulnerable
against very powerful attacks and therefore, the popularity of DES has been
found slightly on the decline.DES is a block cipher and encrypts data in
blocks of size of 64 bits each, which means 64 bits of plain text goes as the
input to DES, which produces 64 bits of cipher text. The same algorithm and
key are used for encryption and decryption, with minor differences. The key
length is 56 bits. The basic idea is shown in the figure.

https://www.collegesidekick.com/study-docs/5014000

You might also like