0% found this document useful (0 votes)
7 views61 pages

114CS22018 Internship

The internship report by Ms. Neha Naik focuses on solving cyber crime within an organization, specifically through the use of Advanced Encryption Standard (AES) and blockchain technology to secure sensitive data. The report outlines the importance of cybersecurity in the digital landscape, detailing the intern's responsibilities and the organizational structure of GKV Global Technology. It emphasizes the need for robust security measures against increasing cyber threats and provides insights into the application of cryptographic techniques and secure data management.

Uploaded by

sahiltamseyrr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views61 pages

114CS22018 Internship

The internship report by Ms. Neha Naik focuses on solving cyber crime within an organization, specifically through the use of Advanced Encryption Standard (AES) and blockchain technology to secure sensitive data. The report outlines the importance of cybersecurity in the digital landscape, detailing the intern's responsibilities and the organizational structure of GKV Global Technology. It emphasizes the need for robust security measures against increasing cyber threats and provides insights into the application of cryptographic techniques and secure data management.

Uploaded by

sahiltamseyrr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

AN INTERNSHIP REPORT

ON

“A Study on solving Cyber Crime held in an organization”


Submitted by

Ms. NEHA NAIK

114CS22018
In partial fulfilment for the award of
DIPLOMA IN COMPUTER SCIENCE AND ENGINEERING

Under the guidance of


Mr. PRAKASH M, B.E, M TECH
Cohort Owner
Computer Science & Engineering
Government Polytechnic, Karwar
AND
Mr. Vijayan G
MD & Technical Head
GKV Global Technology
Mandya

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


GOVERNMENT POLYTECHNIC, KARWAR-581301
MARCH 2024-25
GOVERNMENT OF KARNATAKA
DEPARTMENT OF COLLEGIATE AND TECHNICAL EDUCATION
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
GOVERNMENT POLYTECHNIC, KARWAR – 581301

CERTIFICATE

This is to certify that the Internship work entitled “A study on solving Cyber Crime
held in an organization” is a bonafide work carried out by Ms. NEHA ANANT
NAIK (114CS22018), in partial fulfillment for the award of Diploma in Computer
Science & Engineering of Department of Collegiate and Technical Education,
Bangalore, during the year 2024-2025. It is certified that all corrections/suggestions
indicated for internal assessment have been incorporated in the report and deposited
in the department library. The internship report has been approved as it satisfies the
academic requirements in respect of internship work prescribed for the said
Diploma.

SATHISH S, B.E, M TECH PRAKASH M, B.E, M TECH


Head of the Department Cohort Owner
Computer Science & engineering Computer Science & engineering
Govt. Polytechnic, Karwar Govt. Polytechnic, Karwar

Name of the Examiners Signature of Date


1.

2.
ACKNOWLEDGEMENT

Heartfelt gratitude to our esteemed Principal, Mr. Vasudev K. Gouda, Government


Polytechnic, Karwar, for providing the valuable opportunity to undertake an
internship.

Sincere appreciation to our dynamic Head of the Department, Mr. Sathish S,


Computer Science Department, Government Polytechnic, Karwar, for continuous
motivation and encouragement throughout the training period.

Deep gratitude to lecturer Mr. Prakash M, Computer Science Department,


Government Polytechnic, Karwar, for his valuable guidance and unwavering
support during the internship.

Sincere thanks to all faculty members of the Computer Science Department for
their direct and indirect contributions in ensuring the successful completion of
training.

Heartfelt appreciation to the Manager, Mr. Vijayan G, whose guidance and


cooperation made every stage of the training process smoother.

Gratitude to all employees of GKV Global Technology., Mandya, for their


generous support throughout the training.

Lastly, deepest thanks to parents and friends for their constant encouragement and
support, which played a crucial role in successfully completing the training.
Executive Summary

In today’s digital landscape, cybersecurity is a critical priority for organizations and


individuals alike. The increasing frequency and sophistication of cyber threats—
ranging from data breaches and ransomware attacks to phishing scams and insider
threats—highlight the need for robust security measures. Effective cybersecurity
strategies involve a combination of advanced technologies, employee awareness,
regulatory compliance, and proactive risk management.

With the rise of cyber threats, organizations must implement advanced


cryptographic techniques to secure sensitive data files. AES encryption and
blockchain technology are two powerful security mechanisms that ensure
confidentiality, integrity, and protection against unauthorized access.

AES encryption is a symmetric key algorithm widely used to secure sensitive data.
It encrypts files, including image data, using 128-bit, 192-bit, or 256-bit keys,
making it nearly impossible for attackers to break without the correct key. AES
ensures that data remains protected both at rest and during transmission, reducing
the risk of breaches.

Blockchain technology enhances security by creating an immutable,


decentralized ledger for data storage and verification. Each data transaction is
recorded in a cryptographic block, linked to previous blocks, preventing
unauthorized modifications. This decentralized approach eliminates single points
of failure and ensures data integrity.

The primary objective of this approach is to enhance the security of image data and
sensitive files using Advanced Encryption Standard (AES) for encryption and
blockchain technology for secure, tamper-proof storage. By combining these two
technologies, organizations can ensure confidentiality, integrity, and authenticity of
digital assets, preventing unauthorized access, data breaches, and manipulation.
TABLE OF CONTENT

CHAPTER 1-ORANIZATIONAL PROFILE.

1. Overview of the Organization ........................................................ 01

1.2 Vision and Mission of Organization… ............................................ 02

1.3 Organization Structure..................................................................... 02

1.4 Role and Responsibilities of Personnel in the Organization ........... 04

1.5 Products and Market Performance ................................................... 05

CHAPTER 2-ON JOB TRAINING-1.

2.1 Intern’s Role and Responsibilities While on OJT-1 ........................ 07

2.2 Interns’ technical knowledge can be applied at the site of the ......... 08

Internship

2.3 Create value to the organization through internship ......................... 24

CHAPTER 3-ON JOB TRAINING-2.

3.1 Intern’s role and responsibilities while on OJT-2 ............................ 28

3.2 Interns’ technical knowledge can be applied at the site of the ......... 30

Internship

3.3 Create value to the organization through internship .......................... 38

CHAPTER 4-USE CASE.

4.1 Cyber Secure Data Communication using AES Algorithm ................ 41

4.2 Secure Image Encryption and Decryption using Block Chain ............... 47
List of Figures
Fig. No Figure Names Page No
1.1 GKV Global Technology Logo 01
1.2 Organization Structure 03
2.1 Block Diagram of AES Image Encryption 07
2.2 Block Diagram of AES Image Decryption 07
2.3 AES Image Encryption and Decryption Basic 09
Diagram
2.4 Cryptography 10
2.5 AES Algorithm Working Diagram 18
2.6 AES- Add Round Key 18
2.7 AES-Sub-Bytes 19
2.8 AES- Shift Rows 19
2.9 AES- Mix Columns 20
2.10 AES- Add Round Key 20
2.11 Ciphertext data 22
2.12 The Applications of AES 24
2.13 Notepad++ 25
2.14 Main Webpage of AES Image Encryption System 26
2.15 Uploading Image and Encryption Key Stage 26
2.16 Encryption key Error Stage and Transmit Image only 27
uploaded
2.17 File Error Stage and only Encryption key entered 27
2.18 Encrypted Image Stage and ciphertext Image will be 27
used for transmission
2.19 Main Webpage of AES Image Decryption System 27
2.20 Decryption key Error Stage and Received Image 28
Only Uploaded
2.21 Upload Image Error Stage and only Decryption key 28
entered
2.22 Decrypted Image Stage -Original Image will be 28
filtered from Ciphertext Encryption
3.1 Block Chain Image Encryption 29
3.2 Block Chain Image Decryption 29
3.3 Blockchain Metadata 32
3.4 Application of Block Chain 33
3.5 Genesis Block Chain 34
3.6 Main Webpage of Block Chain Encryption System 35
3.7 Uploading Original Image and Add Encryption Key 40
Stage
3.8 Encryption key Error Stage and Transmit Image only 40
uploaded
3.9 Image upload Error Stage and only Encryption key 41
entered
3.10 Encrypted Image Stage and Genesis Hash text Image 41
will be used for transmission
3.11 Main Webpage of Block Chain File Decryption 42
System
3.12 Decryption key Error Stage and Received File Only 42
Uploaded
3.13 Upload Image Error Stage and only Decryption key 43
entered
3.14 Decrypted Image Stage -Original Image will be 40
filtered from Genesis Block Chain Encryption
4.1 Use cases of AES Image Encryption System 44

4.2 Use cases AES Image Decryption System 45

4.3 Use cases of Block Chain Image Encryption System 46

4.4 Use cases Block Chain Image Decryption System 47


Abbreviations

S.NO Short Form Abbreviation

1 AES Advanced Encryption Standard

2 HTML HyperText Markup Language

3 CSS Cascading Style Sheets

4 DES Data Encryption Standard

5 RC Rivest Cipher

6 PKI Public Key Infrastructure

7 USB Universal Serial Bus

8 SSL Secure Sockets Layer

9 TLS Transport Layer Security

10 CPU Central Processing Unit

11 PHP Hypertext Preprocessor

12 IOT Internet of things

13 RSA Rivest-Shamir-Adleman

14 SHA Secure Hash Algorithm

15 HTTPS HyperText Transfer Protocol Secure


INTERNSHIP – CYBER SECURITY

Chapter – 01

1.1 Overview of the Organization:

GKVG Fig: 1.1 GKV Global Technology Logo


GKV GLOBAL TECHNOLOGY is Research Development (R&D), Real time
Products Development, Software Development, Outsourcing Technical Team and
Consultancy. GKV GLOBAL TECHNOLOGY is registered at MSME & also
register at AICTE internship started in 2024. GKV Global Technology is a leading
provider of comprehensive technology solutions and services, empowering
businesses to thrive in a rapidly evolving digital landscape.

The Main Focus area Automation & Robotics, Industrial Internet of Things (IIOT),
Drone Technologies, E-Mobility, Industrial Automation, Power Systems,
Renewable Energy, Electrical Utility, Structural Engineering, Town Panning &
Green Building, Transportation Engineering, Built Environment, Artificial
Intelligent(AI), Machine Learning, Full Stack Development, Cyber Security,
Advanced Manufacturing Technology, Heating Ventilation Air
Conditioning(HVAC), Cloud Computing, Amazon Web Services, Vehicular
Automation, Power Electronics, and Web app development. Depending on Client
Requirements we developing real time products.

We developing all kinds of college lab kits like Analog Electronics kits, Digital
electronics kits, Power Supply, Power electronic lab kits, Bio-medical kits, Medical
Electronics Kits, Robotics kits, PLC based kits, Wireless Communication Kits,

Dept. of CSE, GPT- Karwar Page 1


INTERNSHIP – CYBER SECURITY

Arduino Lab Kits and Habby Kits for schools ...etc. GKV GLOBAL
TECHNOLOGY offers an internship training programs / Technical workshop for
Diploma/ BE /MTech Engineering students both in online or off-line at Mandya
Location. GKV Global Technology is a leading provider of comprehensive
technology solutions and services, empowering businesses to thrive in a rapidly
evolving digital landscape.

1.2 Vision and Mission of Organization:


1.2.1 Vision:

We will be the partner of choice for customers worldwide by delivering


innovative Embedded products development services, Software development
services, IT Services, Consultancy and Outsourcing technical staffs that
provide outstanding business value. We are dedicated to being the employer
of choice and a good corporate citizen.

1.2.2 Mission:

Clients: Deliver innovative and agile IT solutions for our clients, across
industries

Partners: Build strong, mutually benefitting partnerships that ensure value


for clients across technologies

Employees: Provide a growth-oriented learning environment for employees


worldwide enabling individual excellence

Society: Commit to being a good corporate citizen dedicated to building


better communities through social initiatives that make a difference.

1.3 Organization Structure:

Development Section:

Dept. of CSE, GPT- Karwar Page 2


INTERNSHIP – CYBER SECURITY

Fig: 1.2 Organization Structure


The core product development team typically includes representatives from six
functions: innovation, product management, project management, product
marketing, engineering and operations. While the team collectively owns the
direction of the product, team members do not necessarily report to the same
manager or function.

Innovation:

A technological innovation is a new or improved product or process whose


technological characteristics are significantly different from before. Implemented
technological product innovations are new products (product innovations) or
processes in application (process innovations) that have been brought to market.

Project Management:

Project management is the process of planning, executing, and monitoring a project


to achieve its goals. It involves managing resources, tasks, and budgets to ensure a
project is completed on time and within budget. Project management in
manufacturing helps to reduce errors by providing a standardized system for
tracking and managing processes and tasks to ensure all steps are completed
correctly and on time.

Product Management:

Product management is the process of planning, organizing, and executing the


development and success of a product or service. Product management in
production involves overseeing the production of a product, from the initial idea to

Dept. of CSE, GPT- Karwar Page 3


INTERNSHIP – CYBER SECURITY

its launch. Product managers work with cross-functional teams to ensure that the
product meets customer needs and business goals.

Product Marketing:

Product marketing is the process of communicating a product's unique value to


customers and internal teams alike. This means articulating what customers are
struggling with, how the product or service can solve their problems, and what sets
the product apart in the market. Product marketing is the process of communicating
a product's unique value to customers and internal teams alike.

Engineering:

Production engineering involves the design, development, and management of the


manufacturing process for a product. Production engineers work to ensure that
products are made efficiently, safely, and to high standards.

Operations:

Production is the process of combining various inputs, both material (such as pcb
boards, electronics components, sensors, drivers, software & other materials ) and
immaterial (such as plans, or knowledge) in order to create output. Operations refer
to the activities and tasks that organizations use to produce goods and services.

1.4 Role and Responsibilities of Personnel in the


Organization:
1.4.1 My Role:
As a Trainee in junior engineer section at GKV Global Technology.

1.4.2 My responsibilities:

1. Cryptography Responsibilities

• Learning and implementing encryption & decryption techniques.


• Understanding symmetric (AES, DES) and asymmetric (RSA,
ECC) encryption.
• Studying hash functions (SHA-256, MD5) and digital signatures.

Dept. of CSE, GPT- Karwar Page 4


INTERNSHIP – CYBER SECURITY

• Ensuring secure key management and Public Key Infrastructure


(PKI)

2. Image Protection Responsibilities

• Applying watermarking, steganography, and encryption


techniques for secure image storage and transmission.
• Implementing AES encryption for image security.
• Preventing unauthorized access, modifications, and theft of image
data.
• Learning about forensic techniques to detect image tampering.

3. AES (Advanced Encryption Standard) Responsibilities

• Implementing AES in different modes (ECB, CBC, CFB, GCM).


• Securing data transmission using AES encryption.
• Testing AES vulnerabilities and ensuring secure key exchange.
• Optimizing AES implementation for speed and security.

4. Blockchain Responsibilities

• Understanding blockchain fundamentals (distributed ledger,


consensus mechanisms, smart contracts).
• Studying cryptographic techniques used in blockchain (hashing,
digital signatures).
• Exploring security threats in blockchain, such as 51% attacks,
Sybil attacks, and double-spending.
• Implementing smart contracts on Ethereum/Solana.
• Assisting in developing and auditing blockchain-based security
solutions.

5. General Cybersecurity Responsibilities

• Monitoring cyber threats and vulnerabilities.

Dept. of CSE, GPT- Karwar Page 5


INTERNSHIP – CYBER SECURITY

• Performing penetration testing & risk assessments.


• Learning about network security, firewalls, and intrusion detection
systems (IDS/IPS)
• 4.Assisting in incident response and forensic analysis.

1.5 Products and Market Performance:


Products & Market Performance

Dept. of CSE, GPT- Karwar Page 6


INTERNSHIP – CYBER SECURITY

Chapter – 02

2.1 Intern’s Role and Responsibilities While on OJT-1:


2.1.1 Secure Image Encryption and Decryption using AES
Algorithm:
AES Image Encryption:

AES
Raw Image Secrete Key Encryption

Ciphertext
Output

Fig: 2.1 Block Diagram of AES Image Encryption

AES File Decryption:

Ciphertext Secrete Key AES


Decryption

Original Image

Fig: 2.2 Block Diagram of AES File Decryption


Basic design flow diagram of Secure Image Encryption and Decryption using AES
Algorithm is shown in the figure. At cyber security data communication to avoid
important Image attack and hack AES algorithm is implemented. It consists of two
module section that is AES Image Encryption section and AES Image Decryption
Section.

AES Encryption section consist of Raw Image which is to be transmitted, Secrete


Key, AES Encryption unit and ciphertext output section and AES Decryption

Dept. of CSE, GPT- Karwar Page 7


INTERNSHIP – CYBER SECURITY

consist of Ciphertext input section, Secrete Key, AES Decryption unit and
plaintext that is Original Image output section.

2.1.2 Following modules are designed in this OJT-1 Section:

• Image Encryption Module: It is used to AES encrypt Image and create the
ciphertext data as output which will be transmitted to receiver.
• Image Decryption Module: it is used to AES Decrypt Image to get original
Image from ciphertext data.

2.1.3 Hardware and Software Requirements:


2.1.3.1 Hardware Requirements:
SI.NO HARDWARE QUANTITY

1 Laptop or PC 1

2 Intel I3 or I5 Processor or Higher Version 1

3 RAM 4GB to 8GB 1

4 SSD or HDD 100 GB 1

5 Keyboard 1`

6 Mouse 1

2.1.3.2 Software Requirements:


SI.NO Software
1 Notepad++
2 HTML, CSS
3 Web Browser
4 Windows 7 or 8 or Higher Version

2.2 Interns’ technical knowledge can be applied at the


site of the internship:
2.2.1 AES Image Encryption and Decryption:

Dept. of CSE, GPT- Karwar Page 8


INTERNSHIP – CYBER SECURITY

Fig: 2.3 AES File Encryption and Decryption Basic Diagram

AES image encryption and decryption refers to the process of using the Advanced
Encryption Standard (AES) algorithm to scramble an image into an unreadable
format (encryption) and then reversing that process to retrieve the original image
(decryption), using a shared secret key that only authorized parties possess,
effectively protecting the image data from unauthorized access.
Key points about AES image encryption/decryption:

• How it works:
The image is divided into blocks of data (usually 128 bits), which are then
individually encrypted using the AES algorithm with a secret key.
• Key components:
• Key: The secret key used to encrypt and decrypt the image data.
• Ciphertext: The encrypted image data.
• Plaintext: The original image data.
• Steps involved in encryption:
• Image conversion: The image is converted into a format suitable
for encryption (e.g., pixel values).
• Block division: The image data is split into blocks of a fixed size.
• AES encryption: Each block is encrypted using the AES algorithm
with the secret key.
• Steps involved in decryption:
• AES decryption: The encrypted blocks are decrypted using the
same secret key.

Dept. of CSE, GPT- Karwar Page 9


INTERNSHIP – CYBER SECURITY

• Image reconstruction: The decrypted blocks are reassembled to


form the original image.
Benefits of using AES for image encryption:
• Strong security:
AES is considered a highly secure encryption standard, offering robust protection
against unauthorized access.
• Efficiency:
AES is computationally efficient, making it suitable for real-time image encryption
and decryption.
• Flexibility:
AES can be used with different key lengths (128, 192, 256 bits) depending on the
security requirements.
Important considerations:
• Key management:
Securely managing the secret key is crucial for the overall security of the system.
• Image format:
The image format may need to be considered when choosing an encryption
method.
• Performance optimization:
Depending on the application, optimizing the encryption process for speed may be
necessary.
2.2.2 Cryptography:

Fig: 2.4 Cryptography


Cryptography is the practice and study of techniques for secure communication in
the presence of third parties. It is also used to set up a secure connection between

Dept. of CSE, GPT- Karwar Page 10


INTERNSHIP – CYBER SECURITY

two systems. Cryptography uses mathematics (primarily arithmetic and number


theory) to provide confidentiality, integrity, and authenticity for messages under
certain conditions.

Cryptography allows the following 3 goals to be achieved:

1. Confidentiality

Cryptography protects the secrecy of information. Even if the transmission or


storage medium has been compromised, the encrypted information will be render
useless to unauthorized person.

2. Integrity

Cryptography ensures the information has not been tampered with using hashing
method.

3. Authenticity

Cryptography ensures the information sent is from intended and not fake sender.
This done using digital certificate, digital signature and Public Key Infrastructure
(PKI).

2.2.3 Overview of Cryptography Techniques:

The study of cryptography has been active since the invention of electronic digital
communications. Today, cryptography has become indispensable in almost all areas
of life. From banking and government to transportation, telecommunications, and
even shopping malls, cryptography helps keep our data secure against spying and
hacking.

2.2.4 Cryptography can be further divided into:

• Symmetric (or Secret Key) Cryptography

• Asymmetric (or Public Key) Cryptography

Dept. of CSE, GPT- Karwar Page 11


INTERNSHIP – CYBER SECURITY

2.2.4.1 Symmetric cryptography:

In symmetric cryptography, both sender and receiver uses the same secret key to
encrypt and decrypt a message. Some of the algorithms includes Blowfish, AES,
RC4, DES, RC5, and RC6. The most widely used symmetric algorithm is AES-128,
AES-192, and AES-256.

2.2.4.2 Asymmetric Cryptography:

Asymmetric cryptography uses a key pairs — public and private key. It works in a
way, message encrypted with either public or private key can only be decrypted
using the other key of the pair. That is public key to encrypt, private key to decrypt
and private key to encrypt, public key to decrypt. Some of the algortihms includes
RSA, ELC, Diffie-Helman key exchange, etc.

2.2.5 Data Encryption

For data encryption, a sender encryptes an information with receiver’s public key.
The message can only be decrypted using receiver’s private key which is only known
to the receiver.

Encrypting a Message

1. Sender encrypts a document with one time symmetric key. This is typically
AES or DES Session Key.
2. Sender encrypts the symmetric key with receiver’s public key
3. Sender sends both encrypted document and key.

Decrypting a Message

1. Receiver decrypts the session key using own private key.


2. Receiver uses decrypted session key to decrypt the message.

2.2.6 Digital Signature

Digital Signature is simply encryption of hash of a message using private key

Dept. of CSE, GPT- Karwar Page 12


INTERNSHIP – CYBER SECURITY

Performing a Digital Signature

• Sender hashes the original message.


• Sender ciphers the hashed message with own private key to produce a
signature.
• Sender sends the original message together with signature.

Verifying a Digital Signature

• Receiver uses the sender public key to decrypt the signature. The outcome is
the hashed message.
• Receiver hashes the original message.
• Receiver compares the hashes from step 1 and 2.

2.2.7 Data hashing:

Hashing converts input data to output random data of fixed size (digest). This is a
one way function, hence the original input data cannot be derived from the output.
Some of the commonly used hashing algorithms include MD5, SHA-1, SHA-2 and
SHA-3.

2.2.8 Public Key Infrastructure (PKI):

PKI is a framework that uses public key cryptography to provide authentication and
confidentiality. It has 2 cores concepts which are data encryption and digital
signature which has been covered previously. This certificate is issued, distributed
and revoked by Certificate Authority (CA). These are often trusted third party
organization such as DigiCert and VeriSign

So here is the overall flow:

1. Sender requests for receiver’s digital certificate from CA.


2. Sender extracts the public key from receiver’s digital certificate and
uses it to encrypt the message and sends it.
3. Receiver decrypts the message using own private key.

Dept. of CSE, GPT- Karwar Page 13


INTERNSHIP – CYBER SECURITY

PKI is used in Hypertext Transfer Protocol Secure (HTTPS). HTTPS uses Transport
Layer Security (TLS) or Secure Socket Layer (SSL) to ensure secure communication
between client-server or server-server.

So imagine you are going to checkout your cart at ecommerce website.

1. Before you key in sensitive information such as credit card details, your web
browser requests a SSL certificate from ecommerce website (server).

1. The browser receives the SSL certificate and checks if it was issued
any trusted CA. It also extracts the server public key from certificate.
2. Once the browser determines the certificate is trustable, it sends a
message to server.
3. The server digitally signed acknowledgement to start SSL encrypted
session.
4. You proceed to send your information which is then encrypted with
ecommerce’s (server) public key.
5. Server then decrypts the message with its own private key and
complete the purchase

2.2.8.1 Applications Of Cryptography

The following applications are more crucial one,

• Electronic Commerce: Cryptography is used in e-commerce to protect


data from theft and misuse. Digital signatures, encryption, and
authentication protocols secure online transactions.
• Secure Storage: Encryption is used to store data securely on storage
devices like external hard drives, USBs, memory cards, etc.

2.2.8.2 Advantages and Disadvantages of Cryptography

Advantages

Dept. of CSE, GPT- Karwar Page 14


INTERNSHIP – CYBER SECURITY

• Security: Encryption provides privacy and protection from unauthorized


access to data.

• Authentication: Digital signatures can provide authentication, ensuring the


sender is who they say they are.

• Integrity: Data integrity ensures that the message has not been changed in
transit.

Disadvantages

• Speed: Encryption can slow down during the data transmission, taking
longer than unencrypted messages.

• Require a large amount of power: Cryptography is computationally


intensive, requiring large amounts of computing power to encrypt and
decrypt data.

• Vulnerable: It is also susceptible to cryptographic attacks, such as brute-


force attacks, that can compromise the security of encrypted data.

2.2.8.3 Cryptography Concerns

Cryptography is a powerful technique for securing data and communication.


However, it has several security concerns that must be addressed.

• Key Management: Key management securely controls and distributes the


cryptographic keys used to encrypt and decrypt data. Poor key management
can lead to crucial leakage, which can compromise the security of the data.

• Attacks: Cryptographic systems are vulnerable to attacks from an adversary.


Various episodes, such as brute-force, man-in-the-middle, and side-channel
attacks, can try to break the encryption and gain access to sensitive data.

• Security Protocols: Security protocols are the rules that govern how
encryption and decryption work. Weak protocols can lead to inadequate
security, so it is vital to use secure protocols.

2.2.8.4 Types of Attacks in Cryptography:

Dept. of CSE, GPT- Karwar Page 15


INTERNSHIP – CYBER SECURITY

• Brute Force Attack: In a brute force attack, an attacker attempts to gain


access to a system or decrypt a message by guessing the correct password
or key.

• Man-in-the-Middle Attack: This attack occurs when an attacker intercepts


communication between two parties, allowing them to observe and modify
the communication.

• Dictionary Attack: A dictionary attack uses a list of common words or


phrases to guess a user’s password.

2.2.8.5 Tried and Tested Cryptographic Methods for Consistent Data Security:

• Symmetric Key Cryptography: This cryptography uses the same key for
encryption and decryption. Examples include AES, DES, and Blowfish.

• Asymmetric Key Cryptography: This type of cryptography uses two keys


for encryption and decryption. Examples include RSA and Elliptic Curve
Cryptography.

• Hashing: This type of cryptography uses one-way functions to transform


plaintext into a unique and irreversible ciphertext. Examples include SHA-
256, SHA-512, and MD5.

• Digital Signatures: This type of cryptography allows the sender of a message


to sign the message with their private key and the recipient to verify the
signature with the sender's public key. Examples include RSA and DSA.

2.2.9 Advanced Encryption Standard (AES):

• The AES Encryption algorithm (also known as the Rijndael algorithm) is


a symmetric block cipher algorithm with a block/chunk size of 128
bits. It converts these individual blocks using keys of 128, 192, and
256 bits.
• It is based on a substitution-permutation network, also known as an network.
It consists of a series of linked operations, including replacing inputs

Dept. of CSE, GPT- Karwar Page 16


INTERNSHIP – CYBER SECURITY

with specific outputs (substitutions) and others involving bit shuffling


(permutations).

2.2.9.1 The Features of AES:

• SP Network: It works on an SP network structure rather than a Feistel cipher


structure, as seen in the case of the DES algorithm.
• Key Expansion: It takes a single key up during the first stage, which is later
expanded to multiple keys used in individual rounds.
• Byte Data: The AES encryption algorithm does operations on byte data
instead of bit data. So it treats the 128-bit block size as 16 bytes during the
encryption procedure.

2.2.9.2 How Does AES Work?

To understand the way AES works, you first need to learn how it transmits
information between multiple steps. Since a single block is 16 bytes, a 4x4 matrix
holds the data in a single block, with each cell holding a single byte of information.

The matrix shown in the image above is known as a state array. Similarly, the key
being used initially is expanded into (n+1) keys, with n being the number of rounds
to be followed in the encryption process. So for a 128-bit key, the number of rounds
is 16, with no. of keys to be generated being 10+1, which is a total of 11 keys.

Dept. of CSE, GPT- Karwar Page 17


INTERNSHIP – CYBER SECURITY

Steps to be followed in AES

Fig: 2.5 AES Algorithm Working

The mentioned steps are to be followed for every block sequentially. Upon
successfully encrypting the individual blocks, it joins them together to form the
final ciphertext. The steps are as follows:

1. Add Round Key: You pass the block data stored in the state array
through an XOR function with the first key generated (K0). It passes
the resultant state array on as input to the next step.

Fig: 2.6 AES- Add Round Key

2. Sub-Bytes: In this step, it converts each byte of the state array into
hexadecimal, divided into two equal parts. These parts are the rows
and columns, mapped with a substitution box (S-Box) to generate new
values for the final state array.

Dept. of CSE, GPT- Karwar Page 18


INTERNSHIP – CYBER SECURITY

Fig: 2.7 AES-Sub-Bytes

3. Shift Rows: It swaps the row elements among each other. It skips the
first row. It shifts the elements in the second row, one position to the
left. It also shifts the elements from the third row two consecutive
positions to the left, and it shifts the last row three positions to the left.

Fig: 2.8 AES- Shift Rows

4. Mix Columns: It multiplies a constant matrix with each column in the


state array to get a new column for the subsequent state array. Once
all the columns are multiplied with the same constant matrix, you get
your state array for the next step. This particular step is not to be done
in the last round.

Fig: 2.9 AES- Mix Columns

Dept. of CSE, GPT- Karwar Page 19


INTERNSHIP – CYBER SECURITY

5. Add Round Key: The respective key for the round is XOR’d with the
state array is obtained in the previous step. If this is the last round, the
resultant state array becomes the ciphertext for the specific block; else,
it passes as the new state array input for the next round.

Fig: 2.10 AES- Add Round Key

Now that you understand the basic steps needed to go through the encryption
procedure, understand this example to follow along.

Fig: 2.11 Ciphertext data

Dept. of CSE, GPT- Karwar Page 20


INTERNSHIP – CYBER SECURITY

As you can see in the image above, the plaintext and encryption convert keys to hex
format before the operations begin. Accordingly, you can generate the keys for the
next ten rounds, as you can see below.

You need to follow the same steps explained above, sequentially extracting the state
array and passing it off as input to the next round. The steps are as follows:

6. Add Round Key:

7. Sub-Bytes: It passes the elements through a 16x16 S-Box to get a


completely new state array.

Dept. of CSE, GPT- Karwar Page 21


INTERNSHIP – CYBER SECURITY

8. Shift Rows:

9. Mix Columns:

10. Add Round Key:

This state array is now the final ciphertext for this particular round. This becomes
the input for the next round.

Now that you understand how AES works, go through some of the applications of
this encryption algorithm.

Dept. of CSE, GPT- Karwar Page 22


INTERNSHIP – CYBER SECURITY
2.2.9.3 The Applications of AES:

Fig: 2.12 The Applications of AES

The applications of the AES Encryption algorithm are as follows:


• Wireless Security: Wireless networks are secured using the Advanced
Encryption Standard to authenticate routers and clients. WiFi networks have
firmware software and complete security systems based on this algorithm
and are now in everyday use.
• Encrypted Browsing: AES plays a huge role in securing website server
authentication from both client and server end. With
both symmetric and asymmetric encryption being used, this algorithm helps
in SSL/TLS encryption protocols to always browse with the utmost security
and privacy.
• General File Encryption: Apart from corporate necessities, AES is also used
to transfer files between associates in an encrypted format. The encrypted
information can extend to chat messages, family pictures, legal documents,
etc.
• Processor Security: Many processor manufacturers enable hardware-level
encryption using the likes of AES encryption to bolster security and prevent
meltdown failures, among other low-profile risks.
2.2.10 Front-end Development

It is the visible part of website or web application which is responsible for user
experience. The user directly interacts with the front end portion of the web
application or website.

Dept. of CSE, GPT- Karwar Page 23


INTERNSHIP – CYBER SECURITY

Front-end Technologies

The front end portion is built by using some languages which are discussed
below:

2.2.10.1 HTML:

HTML stands for Hyper Text Markup Language. It is used to design the
front end portion of web pages using markup language. HTML is the
combination of Hypertext and Markup language. Hypertext defines the link
between the web pages. The markup language is used to define the text
documentation within tag which defines the structure of web pages.

2.2.10.2 CASCADING STYLE SHEETS (CSS):

A style sheet language used for describing the look and formatting of a
document written in a markup language. While most often used to style web
pages and interfaces written in HTML and XHTML, the language can be
applied to any kind of XML document, including plain XML, SVG and
XUL.

2.2.10.3 JAVASCRIPT:

JavaScript is a famous scripting language used to create the magic on the


sites to make the site interactive for the user. It is used to enhancing the
functionality of a website to running cool games and web-based software.
Javascript can be used for server side scripting(backend) in conjunction
with Html and CSS (front end) etc.

2.2.10.4 Notepad++:

Fig: 2.13 Notepad++

Dept. of CSE, GPT- Karwar Page 24


INTERNSHIP – CYBER SECURITY
• Notepad++ is a free (as in “free speech” and also as in “free beer”) source
code editor and Notepad replacement that supports several languages.
Running in the MS Windows environment, its use is governed by GNU
General Public License. When using less CPU power, the PC can throttle
down and reduce power consumption, resulting in a greener environment

Create value to the organization through internship:

Image Encryption and Decryption using AES Algorithm has been designed and
demonstrated successfully. Frontend webpage is implemented using HTML
(Hypertext Markup Language) and CSS (Cascading Style Sheets). AES encryption
crypto function is called form cdnjs.cloudflare.com to execute data encryption.
Notepad++ software is used for programming the all modules. All system testing
are done successfully and finally all module executed in the lab. This software
product will be used for transferring important medical images, satellite images,
military information images at secure manner like defense, military, navy, public
sector networks, research center etc..

Fig: 2.13 Main Webpage of AES Image Encryption System

Dept. of CSE, GPT- Karwar Page 25


INTERNSHIP – CYBER SECURITY

Fig: 2.14 Main Webpage of AES Image Encryption System

Fig: 2.15 Uploading Original Image and Add Encryption Key Stage

Fig: 2.16 Encryption key Error Stage and Transmit Image only uploaded

Dept. of CSE, GPT- Karwar Page 26


INTERNSHIP – CYBER SECURITY

Fig: 2.17 Image upload Error Stage and only Encryption key entered

Fig: 2.18 Encrypted Image Stage and ciphertext Image will be used
for transmission

Fig: 2.19 Main Webpage of AES Image Decryption System

Dept. of CSE, GPT- Karwar Page 27


INTERNSHIP – CYBER SECURITY

Fig: 2.20 Decryption key Error Stage and Received File Only Uploaded

Fig: 2.21 Upload File Error Stage and only Decryption key entered

Dept. of CSE, GPT- Karwar Page 28


INTERNSHIP – CYBER SECURITY

Fig: 2.22 Decrypted File Stage -Original File will be filtered from
Ciphertext Encryption

Dept. of CSE, GPT- Karwar Page 29


INTERNSHIP – CYBER SECURITY

Chapter – 03

3.1 Intern’s role and responsibilities while on OJT-

Secure File Encryption and Decryption using Block Chain:

Block Chain File Encryption:

AES Metadata
Raw Image
ENCRYPTION Generation

Key Distribution Blockchain


Interaction

Fig: 3.1 Block Chain File Encryption

Block Chain File Decryption:

Encrypted Image Metadata Image


Key Retrieval Retrieval

AES
Image Access Decryption

Fig: 3.2 Block Chain Image Decryption


Basic design flow diagram of Secure Image Encryption and Decryption using Block
chain Algorithm is shown in the figure. At cyber security data communication to
avoid important File attack and hack Block chain algorithm is implemented. It

Dept. of CSE, GPT- Karwar Page 30


INTERNSHIP – CYBER SECURITY

consists of two module section that is Block chain Image Encryption section and
Block chain Image Decryption Section.

Block chain Encryption section consist of Raw Image which is to be transmitted,


AES Encryption unit and Metadata generation, Blockchain interaction and Key
distribution. Block chain Decryption consist of Encrypted File with Key input
section, Metadata Retrieval, File Retrieval, AES Decryption and Image access that
is Original Image output section.

File Sender:

• Image Upload: The sender uploads the image.

• AES Encryption: The image is encrypted using AES with a secret


key.

• Metadata Generation: Metadata (e.g., file name, hash) is


generated.

• Blockchain Interaction: The metadata and a pointer to the


encrypted file location are stored on the blockchain.

• Key Distribution: The AES key is securely distributed to the


recipient (e.g., using a secure channel or blockchain-based key
exchange).

File Receiver:

• Metadata Retrieval: The recipient retrieves the metadata from the


blockchain.

• File Retrieval: The recipient uses the metadata to locate the


encrypted file.

• AES Decryption: The recipient decrypts the file using the received
AES key.

• Image Access: The recipient can now access the original Image.

Dept. of CSE, GPT- Karwar Page 31


INTERNSHIP – CYBER SECURITY

3.1.1 Following modules are designed in this OJT-2 Section:

• Block Chain Encryption Module: A Blockchain Encryption Module leverages


cryptography to secure data and transactions on a distributed ledger, using
symmetric encryption, and hashing for integrity and authenticity.

• Block Chain Decryption Module: A "Blockchain Decryption Module" refers to


a tool or software component that facilitates the decryption of data stored on a
blockchain, allowing users to access and view encrypted File.

3.1.2 Hardware and Software Requirements:


3.1.2.1 Hardware Requirements:
SI.NO HARDWARE QUANTITY

1 Laptop or PC 1

2 Intel I3 or I5 Processor or Higher 1


Version

3 RAM 4GB to 8GB 1

4 SSD or HDD 100 GB 1

5 Keyboard 1`

6 Mouse 1

3.1.2.2 Software Requirements:


SI.NO Software

1 Notepad++

3 HTML, CSS

4 Web Browser

5 Windows 7 or 8 or Higher Version

Dept. of CSE, GPT- Karwar Page 32


INTERNSHIP – CYBER SECURITY

3.2 Interns’ technical knowledge can be applied at the


site of the internship:
Blockchain Metadata:

Fig: 3.3 Blockchain Metadata


In blockchain technology, metadata generation involves creating and storing data
about blockchain transactions and assets, including timestamps, transaction details,
and smart contract data, which are then embedded into the blockchain for
verification and accessibility. Metadata refers to data about data. In the context of
blockchain, it's the information that describes the transactions and assets stored on
the blockchain, rather than the transactions or assets themselves.

3.2.10 Metadata in Blockchain:

Metadata in blockchain transactions refers to additional data or information that can


be appended to transaction recorded on a blockchain. The main functions of a
blockchain are to record and verify the transactions of end users such as transferring
digital assets like cryptocurrencies. However, metadata enables users to add
supplementary information or context to their transactions beyond just the core
transaction details.

3.2.10.1 Application of Block Chain:

Dept. of CSE, GPT- Karwar Page 33


INTERNSHIP – CYBER SECURITY

Fig: 3.4 Application of Block Chain


Blockchain Applications in Banking:
Banks are basically ameliorating their services by utilizing new blockchain
protocols. One example is Ripple Blockchain. Thanks to Ripple’s properties
of decentralization, immutability, efficiency, cost-effectiveness, and security,
today’s banks can transact directly with each other at low costs of settlements.

Blockchain Applications in Healthcare:


The technology will essentially streamline and transform everything from medical
records and payments to processing and analytics, thereby, benefitting all its
stakeholders from patients and customers to providers, administrators, and
healthcare institutions. By implementing blockchains, healthcare systems will
achieve:
Interoperability: Data will be stored in a single format and can be shared seamlessly.
Decentralized data storage: A single technology that would handle every data of
patients.

Blockchain Applications in Real Estate:


Blockchain has the potential to entirely disrupt the real estate vertical. Stakeholders
are developing smart contracts, which will enable real estate contracts,
escrows, and property records without title companies or attorneys. In the future, it
may be possible for a buyer to buy a home and complete the sale by

Dept. of CSE, GPT- Karwar Page 34


INTERNSHIP – CYBER SECURITY

clicking on a shopping cart on a website. The blockchain will ensure that the buyer
gets the title and the seller is paid via cryptos.

Blockchain Applications in IoT:

Blockchain empowers all IoT devices to enhance security and bring transparency
in their interconnected ecosystems. Although IoT enables home security systems to
be managed remotely from smartphones, the traditional centralized approach to
exchanging information generated by IoT devices lacks the security standards and
ownership of information.

Blockchain Applications in Supply Chain:

In a world where supply chains have become complicated owing to the nascent
demands of end customers and other stakeholders, companies are in pursuit of
technologies that would not only simplify the management of supply chains but also
make them automate various business processes that constitute supply chains.

Blockchain Applications in Government:

While blockchains are gradually eliminating the need for centralized government
institutions, it is most likely that the competition between governments and
cryptocurrencies will reach its epitome in the years to come.

Blockchain Technology Applications in Cyber Security:

Blockchain platforms can prevent fraudulent activities via consensus mechanisms


and detect data tampering depending on the underlying characteristics of
operational resilience, data encryption, auditability, transparency,
and immutability.

Blockchain Technology Applications in Social Media:

Blockchain can be used to move foundational social media to an entirely different


level. Technology has the power to reinvent the very nature of how content and
information are privately distributed and managed in a monetized manner.

Dept. of CSE, GPT- Karwar Page 35


INTERNSHIP – CYBER SECURITY

Blockchain Technology Applications in AI:

Together blockchains and AI, or what we can denote as a ‘decentralized AI’, can
drive new possibilities in the realms of data protection, data monetization,
and smart algorithms.
3.2.11 Genesis Block in Blockchain:

A blockchain is a decentralized digital tally of deals distributed across different


computer networks. Each block in the chain contains a list of deals and a reference
to the former block, creating a chain of blocks that can be vindicated and traced
back to the veritably first block in the chain, known as the Genesis Block.

The Genesis Block is the first block in the block chain and contains unique
characteristics that distinguish it from its posterior blocks. It’s the only block that
doesn’t source a former block, as there are no blocks before it. Rather, the Genesis
Block is hard coded into the blockchain’s protocol as the starting point.

• The creation of the Genesis Block is a pivotal step in the creation of a


blockchain, as it establishes the original state of the network and sets the
parameters for posterior blocks in the chain.

• The creation of the Genesis Block is generally done by the blockchain’s


creator or by the network’s agreement algorithm.

• The Genesis Block frequently contains a special communication or sale that


serves as a timestamp for the creation of the blockchain.

For illustration, the Genesis Block of the Bitcoin blockchain contains the
communication” The Times 03/ Jan/ 2009 Chancellor on point of an alternate
bailout for banks,” which references a caption from a UK review and serves as a
timestamp for the creation of the blockchain.

Fig: 3.5 Genesis Block Chain

Dept. of CSE, GPT- Karwar Page 36


INTERNSHIP – CYBER SECURITY

3.2.11.1 Components of Genesis Block:

Here are the key components typically found in the Genesis Block:

• Block Header: Like every block in a blockchain, the Genesis Block has a
block header that includes metadata such as version, previous block hash,
Merkle root, timestamp, and nonce.

• Coinbase Transaction: The Genesis Block includes a special transaction


called the coinbase transaction, which is the first transaction in the
blockchain.

• Network Parameters: The Genesis Block sets initial network parameters,


including difficulty target, maximum block size, and genesis timestamp.

• Embedded Messages: Some Genesis Blocks include embedded messages


that serve as historical markers from the blockchain’s creator or developers.

• Genesis Block Hash: The Genesis Block’s hash serves as its unique
identifier and is computed based on the block header’s contents.

• Genesis Allocation: Depending on the blockchain’s design, the Genesis


Block may allocate initial tokens or assets to specific addresses or
stakeholders, setting the initial distribution of value within the network.

3.2.11.2 Creation and Mining of Genesis Block:

Here is an overview of how genesis block is created and mined:

1. Development and Configuration

Before launching a blockchain network, developers define the Genesis Block’s


structure and parameters. Developers may embed specific data or messages into the
Genesis Block, reflecting the blockchain’s purpose, ethos, or other relevant
information.

2. Genesis Block Creation

Dept. of CSE, GPT- Karwar Page 37


INTERNSHIP – CYBER SECURITY

The data and parameters of the Genesis Block are hardcoded into the blockchain’s
genesis file or configuration file. A cryptographic hash is computed for the entire
Genesis Block, including its header and embedded data.

3. Mining Process

In Proof of Work (PoW) blockchains like Bitcoin, miners prepare to mine the
Genesis Block by downloading the blockchain’s software and configuration files.
Miners start the mining process by attempting to find a valid hash for the Genesis
Block. Once a miner finds a valid hash that satisfies the difficulty target, they
broadcast the completed Genesis Block to the network.

4. Network Launch

Upon verification, the Genesis Block is propagated across the network. All nodes
in the network initialize their blockchain databases with the Genesis Block’s data,
establishing a common starting point for the blockchain ledger. With the Genesis
Block in place, subsequent blocks can be mined and added to the blockchain.

Genesis Block Characteristics

The Genesis Block, as the veritably first block in a blockchain, has several unique
features that set it piecemeal from other blocks in the chain. They are some of the
crucial features of the Genesis Block.

• No Previous Block: The Genesis Block is the first block in a blockchain,


which means that it has no former block to reference. As a result, it generally
contains a hardcoded set of data that initializes the network and sets the
foundation for posterior blocks.

• Fixed Block Reward: In numerous blockchain networks, the Genesis Block


is the only block that has a fixed block price. This is because posterior
blocks generally have dwindling block prices, which are designed to
incentivize miners to continue booby-trapping new blocks.

• Unique Block Hash: The Genesis Block has a unique block hash that serves
as its identifier in the blockchain. This hash is generally hardcoded into the

Dept. of CSE, GPT- Karwar Page 38


INTERNSHIP – CYBER SECURITY

blockchain software to ensure that the Genesis Block is honored as the first
block in the chain.

• Special Transactions: The Genesis Block may contain special deals that
aren’t set up in posterior blocks. For illustration, the Bitcoin Genesis Block
contained a sale that bedded a communication representing a news
composition about government bailouts for banks.

Overall, the Genesis Block is a foundational element of blockchain technology, and


its unique features make it an important element in the development and functioning
of blockchain networks.

3.2.11.3 Importance of Genesis:

The Genesis Block is a critical element of a blockchain network because it serves


as the foundation for the entire network. Following are the reasons why the Genesis
Block mechanism was created in the first place:-

• Initializing the Network: The Genesis Block is the veritably first block in a
blockchain, and it’s used to initialize the network. It contains a set of
hardcoded data that sets the foundation for posterior blocks, similar to the
network’s original parameters, the first deals, and the cryptographic hash
that identifies the block.

• Ensuring Consensus: Because the Genesis Block is the first block in a


blockchain, it’s used to establish an agreement among network actors about
the original state of the network. Providing a Fixed Starting Point: The
Genesis Block provides a fixed starting point for the blockchain, which
ensures that all posterior blocks can be vindicated and traced back to the
veritably first block.

3.2.11.4 Verify Genesis Block:

• Gain the hash of the Genesis Block: You can find the hash of the Genesis
Block on the blockchain discoverer of the network you’re interested in. This
hash should be readily available and easy to find.

Dept. of CSE, GPT- Karwar Page 39


INTERNSHIP – CYBER SECURITY

• Corroborate the hash: Once you have attained the hash of the Genesis Block,
you’ll need to corroborate it. This can be done by comparing the hash you
attained with the hash that’s hardcoded in the software of the network.
Check the timestamp: The Genesis Block should also have a timestamp that
indicates the exact date and time it was created. You can corroborate the
timestamp by checking it against literal records to ensure that it’s accurate.

• Corroborate the deals: Eventually, you should corroborate the deals in the
Genesis Block to ensure that they’re valid. You can do this by checking the
addresses of the sender and receiver to ensure that they’re correct, and by
vindicating the sale amounts to ensure that they’re within the anticipated
range.

3.2.11.5 Significance of Genesis Block:

• Starting point of the Network: It serves as the foundation and starting point
of every blockchain network.

• Contains critical information: It contains critical information that establishes


the original state of the network, similar to difficulty position, network rules,
and a maximum number of coins.

• Serves as a reference point: It serves as a reference point for all posterior


blocks in the chain, linking them together in a tamper-apparent way.

• Makes blockchain immutable: Any changes made to the Genesis Block


would abate the entire chain, making it impossible to add new blocks or
conduct deals on the network.

• Nonfictional significance: The Genesis Block has a nonfictional and


cultural significance, as it marks the birth of the first blockchain network,
Bitcoin, and the morning of a new period of decentralized technology.

3.3 Create value to the organization through


internship:

Dept. of CSE, GPT- Karwar Page 40


INTERNSHIP – CYBER SECURITY

Secure Image Encryption and Decryption using blockchain has been designed and
demonstrated successfully. Frontend webpage is implemented using HTML
(Hypertext Markup Language) and CSS (Cascading Style Sheets). AES
encryption crypto function is called form cdnjs.cloudflare.com to execute data
encryption. Genesis algorithm based Block chain is used to enhance security for
file transfer. Notepad++ software is used for programming the all modules.

Fig: 3.6 Main Webpage of Block Chain Encryption System

Fig: 3.7 Uploading Original Image and Add Encryption Key

Dept. of CSE, GPT- Karwar Page 41


INTERNSHIP – CYBER SECURITY

Fig: 3.8 Encryption key Error Stage and Transmit Image only uploaded

Fig: 3.9 Image upload Error Stage and only Encryption key entered

Fig: 3.10 Encrypted File Stage and Genesis Hash text file will be used
for transmission

Dept. of CSE, GPT- Karwar Page 42


INTERNSHIP – CYBER SECURITY

Fig: 3.11 Main Webpage of Block Chain File Decryption System

Fig: 3.12 Decryption key Error Stage and Received File Only Uploaded

Fig: 3.13 Upload File Error Stage and only Decryption key entered

Dept. of CSE, GPT- Karwar Page 43


INTERNSHIP – CYBER SECURITY

Fig: 3.14 Decrypted File Stage -Original File will be filtered from
Genesis Block Chain Encryption

Dept. of CSE, GPT- Karwar Page 44


INTERNSHIP – CYBER SECURITY

Chapter – 04

4.1 Use Case – 1

Cyber Secure Data Communication using AES Algorithm:

4.1.1 AES Image Encryption System:

AES Image Encryption

Upload Image

Add Encryption
Key

Verify data and


Encryption Key

User Execute Data


Encryption

Display
Ciphertext Data

Download
Ciphertext Image

Fig: 4.1 Use cases of AES Image Encryption System

• User Should upload image which is should encrypted.


• User Should Enter Encryption key (Secrete Key) for AES Encryption.

Dept. of CSE, GPT- Karwar Page 45


INTERNSHIP – CYBER SECURITY

• AES Encryption system verify Uploaded image and Encryption key. If any of
data is absent then it guides to user for adding image or Encryption key.
• Once image and Encryption key are received from user then AES Encryption
system converts the data into AES Encryption Data at 256 bit. Encryption data
will be inform of ciphertext data.

4.1.2 AES File Decryption System:

AES Image Decryption

Upload Ciphertext
File

Add Decryption
Key

Verify data and


Decryption Key

User Execute Data


Decryption

Downlaod
Decrypted Image

Fig: 4.2 Use cases AES File Decryption System

4.2 Use Case – 2

Secure Image Encryption and Decryption using Block Chain:


4.2.1 Block Chain Image Encryption System:

Dept. of CSE, GPT- Karwar Page 46


INTERNSHIP – CYBER SECURITY

Block Chain Encryption

Upload Image

Add Encryption
Key

AES Encryption

User Block Chain


Authentication

Block Chain
Encryption

Download Block
chain Encryption

Fig: 4.3 Use cases of Block Chain Image Encryption System

• User Should upload Image which is should encrypted.


• User Should Enter Encryption key (Secrete Key) for AES Encryption.
• AES Encryption system verify Uploaded Image and Encryption key. If any
of data is absent then it guides to user for adding Image or Encryption key.
• Once Image and Encryption key are received from user then AES
Encryption system converts the data into AES Encryption Data at 256 bit.
• Block chain authentication is done using Genesis Block Chain Algorithm.
• Metadata hash data are created with Block chain authentication and
Encrypted file will be Downloaded for receiver section transfer purpose.

Dept. of CSE, GPT- Karwar Page 47


INTERNSHIP – CYBER SECURITY

4.2.2 Block Chain Image Decryption System:

Block Chain Decryption

Upload Encrypted
Image

Add Decryption
Key

Verify data and


Decryption Key

User Execute Block


Chain Decryption

Downlaod
Decrypted Image

Fig: 4.4 Use cases Block Chain Image Decryption System

• User Should upload Encrypted data file which is should Decrypted.


• User Should Enter Decryption key (Secrete Key) for AES Decryption.
• AES Decryption system verify Uploaded Ciphertext data and Decryption key.
If any of data is absent then it guides to user for encryption file or Decryption
key.
• Once data and Decryption key are received from user then AES Decryption
system converts the encrypted block chain data into Block chain Decryption
Data to convert it as original transmitted Image. Decryption data will be
displayed on the screen and it will be has download option to download original
file.
• Original decrypted Image will be download using download Image option.

Dept. of CSE, GPT- Karwar Page 48


RESUME
NEHA NAIK
PHONE NO:-+91 8660792846

E-MAIL:- [email protected]

SUMMARY
Dynamic and dedicated Operator at YAZAKI INDIA PVT LTD, I excelled in cross-functional collaboration, driving
team success through effective strategizing. I consistently contributed to achieving optimal goals while fostering a
cooperative work environment. Committed to utilizing my skills to further the mission of a company. Bilingual,
hardworking, and ready to join my next team.

EDUCATION
• KARNATAKA PUBLIC SCHOOL SHIRWAD KARWAR. SSLC (92.16%)
• GOVT POLYTECHNIC COLLEGE KARWAR COMPUTER SCIENCE AND ENGINEERING
(CGPA 9) 2022-2025

SKILLS
• Python
• Java
• Git
• MS docs and Excel
• Team work and co-ordination

CERTIFICATIONS
• Ethical hacker (24 AUG 2024-10 SEP 2024)
• Ethical hacking sentinels (12 SEP 2024-12 OCT 2024 )
• Junior cybersecurity analyst (13 OCT 2024-11 NOV 2024)

INTERNSHIP

• Cyber Security Intern


Undergone internship from 16-12-2024 TO 31-3-2025 IN GKV GLOBAL TECHNOLOGY , MANDYA .
Internship Title- CYBER SECURITY
WORKED ON- CRYPTOGRAPHY BASED CYBER SECURITY WEB APPLICATION.
WORK EXPERIENCE
• OPERATOR 12/2024 - 04/2025
YAZAKI INDIA PVT LTD LAKKENHALLI BANGALORE RURAL, INDIA
Served as a friendly, hardworking, and punctual employee
Effectively participated in cross-team strategizing efforts to achieve optimal goal. Worked with
cross-functional teams to achieve goals.

INTERESTS
• Writing
• Listening Spiritual Music
• Spending time with family and friends

LANGUAGES
• Kannada
• Hindi
• English
• Kokani

DECLARATION
The above in formation is true to the best of my knowledge.

NEHA NAIK
Photo Gallery
Appendices

• GKV Global Technology, http://gkvgt.com

• Cyber Security, https://www.geeksforgeeks.org/what-is-cyber-security/

• Cryptography Basic, https://www.kaspersky.com/resource-


center/definitions/what-is-cryptography

• Advanced Encryption Standard (AES), https://www.geeksforgeeks.org/advanced-


encryption-standard-aes/

• Block Chain Basics, http://www.blockchain-basics.com/

• Genesis block chain basics, https://www.geeksforgeeks.org/genesis-block-in-


blockchain/

• Cyber Security Tutorial, https://www.w3schools.com/cybersecurity/

You might also like