114CS22018 Internship
114CS22018 Internship
ON
114CS22018
In partial fulfilment for the award of
DIPLOMA IN COMPUTER SCIENCE AND ENGINEERING
CERTIFICATE
This is to certify that the Internship work entitled “A study on solving Cyber Crime
held in an organization” is a bonafide work carried out by Ms. NEHA ANANT
NAIK (114CS22018), in partial fulfillment for the award of Diploma in Computer
Science & Engineering of Department of Collegiate and Technical Education,
Bangalore, during the year 2024-2025. It is certified that all corrections/suggestions
indicated for internal assessment have been incorporated in the report and deposited
in the department library. The internship report has been approved as it satisfies the
academic requirements in respect of internship work prescribed for the said
Diploma.
2.
ACKNOWLEDGEMENT
Sincere thanks to all faculty members of the Computer Science Department for
their direct and indirect contributions in ensuring the successful completion of
training.
Lastly, deepest thanks to parents and friends for their constant encouragement and
support, which played a crucial role in successfully completing the training.
Executive Summary
AES encryption is a symmetric key algorithm widely used to secure sensitive data.
It encrypts files, including image data, using 128-bit, 192-bit, or 256-bit keys,
making it nearly impossible for attackers to break without the correct key. AES
ensures that data remains protected both at rest and during transmission, reducing
the risk of breaches.
The primary objective of this approach is to enhance the security of image data and
sensitive files using Advanced Encryption Standard (AES) for encryption and
blockchain technology for secure, tamper-proof storage. By combining these two
technologies, organizations can ensure confidentiality, integrity, and authenticity of
digital assets, preventing unauthorized access, data breaches, and manipulation.
TABLE OF CONTENT
2.2 Interns’ technical knowledge can be applied at the site of the ......... 08
Internship
3.2 Interns’ technical knowledge can be applied at the site of the ......... 30
Internship
4.2 Secure Image Encryption and Decryption using Block Chain ............... 47
List of Figures
Fig. No Figure Names Page No
1.1 GKV Global Technology Logo 01
1.2 Organization Structure 03
2.1 Block Diagram of AES Image Encryption 07
2.2 Block Diagram of AES Image Decryption 07
2.3 AES Image Encryption and Decryption Basic 09
Diagram
2.4 Cryptography 10
2.5 AES Algorithm Working Diagram 18
2.6 AES- Add Round Key 18
2.7 AES-Sub-Bytes 19
2.8 AES- Shift Rows 19
2.9 AES- Mix Columns 20
2.10 AES- Add Round Key 20
2.11 Ciphertext data 22
2.12 The Applications of AES 24
2.13 Notepad++ 25
2.14 Main Webpage of AES Image Encryption System 26
2.15 Uploading Image and Encryption Key Stage 26
2.16 Encryption key Error Stage and Transmit Image only 27
uploaded
2.17 File Error Stage and only Encryption key entered 27
2.18 Encrypted Image Stage and ciphertext Image will be 27
used for transmission
2.19 Main Webpage of AES Image Decryption System 27
2.20 Decryption key Error Stage and Received Image 28
Only Uploaded
2.21 Upload Image Error Stage and only Decryption key 28
entered
2.22 Decrypted Image Stage -Original Image will be 28
filtered from Ciphertext Encryption
3.1 Block Chain Image Encryption 29
3.2 Block Chain Image Decryption 29
3.3 Blockchain Metadata 32
3.4 Application of Block Chain 33
3.5 Genesis Block Chain 34
3.6 Main Webpage of Block Chain Encryption System 35
3.7 Uploading Original Image and Add Encryption Key 40
Stage
3.8 Encryption key Error Stage and Transmit Image only 40
uploaded
3.9 Image upload Error Stage and only Encryption key 41
entered
3.10 Encrypted Image Stage and Genesis Hash text Image 41
will be used for transmission
3.11 Main Webpage of Block Chain File Decryption 42
System
3.12 Decryption key Error Stage and Received File Only 42
Uploaded
3.13 Upload Image Error Stage and only Decryption key 43
entered
3.14 Decrypted Image Stage -Original Image will be 40
filtered from Genesis Block Chain Encryption
4.1 Use cases of AES Image Encryption System 44
5 RC Rivest Cipher
13 RSA Rivest-Shamir-Adleman
Chapter – 01
The Main Focus area Automation & Robotics, Industrial Internet of Things (IIOT),
Drone Technologies, E-Mobility, Industrial Automation, Power Systems,
Renewable Energy, Electrical Utility, Structural Engineering, Town Panning &
Green Building, Transportation Engineering, Built Environment, Artificial
Intelligent(AI), Machine Learning, Full Stack Development, Cyber Security,
Advanced Manufacturing Technology, Heating Ventilation Air
Conditioning(HVAC), Cloud Computing, Amazon Web Services, Vehicular
Automation, Power Electronics, and Web app development. Depending on Client
Requirements we developing real time products.
We developing all kinds of college lab kits like Analog Electronics kits, Digital
electronics kits, Power Supply, Power electronic lab kits, Bio-medical kits, Medical
Electronics Kits, Robotics kits, PLC based kits, Wireless Communication Kits,
Arduino Lab Kits and Habby Kits for schools ...etc. GKV GLOBAL
TECHNOLOGY offers an internship training programs / Technical workshop for
Diploma/ BE /MTech Engineering students both in online or off-line at Mandya
Location. GKV Global Technology is a leading provider of comprehensive
technology solutions and services, empowering businesses to thrive in a rapidly
evolving digital landscape.
1.2.2 Mission:
Clients: Deliver innovative and agile IT solutions for our clients, across
industries
Development Section:
Innovation:
Project Management:
Product Management:
its launch. Product managers work with cross-functional teams to ensure that the
product meets customer needs and business goals.
Product Marketing:
Engineering:
Operations:
Production is the process of combining various inputs, both material (such as pcb
boards, electronics components, sensors, drivers, software & other materials ) and
immaterial (such as plans, or knowledge) in order to create output. Operations refer
to the activities and tasks that organizations use to produce goods and services.
1.4.2 My responsibilities:
1. Cryptography Responsibilities
4. Blockchain Responsibilities
Chapter – 02
AES
Raw Image Secrete Key Encryption
Ciphertext
Output
Original Image
consist of Ciphertext input section, Secrete Key, AES Decryption unit and
plaintext that is Original Image output section.
• Image Encryption Module: It is used to AES encrypt Image and create the
ciphertext data as output which will be transmitted to receiver.
• Image Decryption Module: it is used to AES Decrypt Image to get original
Image from ciphertext data.
1 Laptop or PC 1
5 Keyboard 1`
6 Mouse 1
AES image encryption and decryption refers to the process of using the Advanced
Encryption Standard (AES) algorithm to scramble an image into an unreadable
format (encryption) and then reversing that process to retrieve the original image
(decryption), using a shared secret key that only authorized parties possess,
effectively protecting the image data from unauthorized access.
Key points about AES image encryption/decryption:
• How it works:
The image is divided into blocks of data (usually 128 bits), which are then
individually encrypted using the AES algorithm with a secret key.
• Key components:
• Key: The secret key used to encrypt and decrypt the image data.
• Ciphertext: The encrypted image data.
• Plaintext: The original image data.
• Steps involved in encryption:
• Image conversion: The image is converted into a format suitable
for encryption (e.g., pixel values).
• Block division: The image data is split into blocks of a fixed size.
• AES encryption: Each block is encrypted using the AES algorithm
with the secret key.
• Steps involved in decryption:
• AES decryption: The encrypted blocks are decrypted using the
same secret key.
1. Confidentiality
2. Integrity
Cryptography ensures the information has not been tampered with using hashing
method.
3. Authenticity
Cryptography ensures the information sent is from intended and not fake sender.
This done using digital certificate, digital signature and Public Key Infrastructure
(PKI).
The study of cryptography has been active since the invention of electronic digital
communications. Today, cryptography has become indispensable in almost all areas
of life. From banking and government to transportation, telecommunications, and
even shopping malls, cryptography helps keep our data secure against spying and
hacking.
In symmetric cryptography, both sender and receiver uses the same secret key to
encrypt and decrypt a message. Some of the algorithms includes Blowfish, AES,
RC4, DES, RC5, and RC6. The most widely used symmetric algorithm is AES-128,
AES-192, and AES-256.
Asymmetric cryptography uses a key pairs — public and private key. It works in a
way, message encrypted with either public or private key can only be decrypted
using the other key of the pair. That is public key to encrypt, private key to decrypt
and private key to encrypt, public key to decrypt. Some of the algortihms includes
RSA, ELC, Diffie-Helman key exchange, etc.
For data encryption, a sender encryptes an information with receiver’s public key.
The message can only be decrypted using receiver’s private key which is only known
to the receiver.
Encrypting a Message
1. Sender encrypts a document with one time symmetric key. This is typically
AES or DES Session Key.
2. Sender encrypts the symmetric key with receiver’s public key
3. Sender sends both encrypted document and key.
Decrypting a Message
• Receiver uses the sender public key to decrypt the signature. The outcome is
the hashed message.
• Receiver hashes the original message.
• Receiver compares the hashes from step 1 and 2.
Hashing converts input data to output random data of fixed size (digest). This is a
one way function, hence the original input data cannot be derived from the output.
Some of the commonly used hashing algorithms include MD5, SHA-1, SHA-2 and
SHA-3.
PKI is a framework that uses public key cryptography to provide authentication and
confidentiality. It has 2 cores concepts which are data encryption and digital
signature which has been covered previously. This certificate is issued, distributed
and revoked by Certificate Authority (CA). These are often trusted third party
organization such as DigiCert and VeriSign
PKI is used in Hypertext Transfer Protocol Secure (HTTPS). HTTPS uses Transport
Layer Security (TLS) or Secure Socket Layer (SSL) to ensure secure communication
between client-server or server-server.
1. Before you key in sensitive information such as credit card details, your web
browser requests a SSL certificate from ecommerce website (server).
1. The browser receives the SSL certificate and checks if it was issued
any trusted CA. It also extracts the server public key from certificate.
2. Once the browser determines the certificate is trustable, it sends a
message to server.
3. The server digitally signed acknowledgement to start SSL encrypted
session.
4. You proceed to send your information which is then encrypted with
ecommerce’s (server) public key.
5. Server then decrypts the message with its own private key and
complete the purchase
Advantages
• Integrity: Data integrity ensures that the message has not been changed in
transit.
Disadvantages
• Speed: Encryption can slow down during the data transmission, taking
longer than unencrypted messages.
• Security Protocols: Security protocols are the rules that govern how
encryption and decryption work. Weak protocols can lead to inadequate
security, so it is vital to use secure protocols.
2.2.8.5 Tried and Tested Cryptographic Methods for Consistent Data Security:
• Symmetric Key Cryptography: This cryptography uses the same key for
encryption and decryption. Examples include AES, DES, and Blowfish.
To understand the way AES works, you first need to learn how it transmits
information between multiple steps. Since a single block is 16 bytes, a 4x4 matrix
holds the data in a single block, with each cell holding a single byte of information.
The matrix shown in the image above is known as a state array. Similarly, the key
being used initially is expanded into (n+1) keys, with n being the number of rounds
to be followed in the encryption process. So for a 128-bit key, the number of rounds
is 16, with no. of keys to be generated being 10+1, which is a total of 11 keys.
The mentioned steps are to be followed for every block sequentially. Upon
successfully encrypting the individual blocks, it joins them together to form the
final ciphertext. The steps are as follows:
1. Add Round Key: You pass the block data stored in the state array
through an XOR function with the first key generated (K0). It passes
the resultant state array on as input to the next step.
2. Sub-Bytes: In this step, it converts each byte of the state array into
hexadecimal, divided into two equal parts. These parts are the rows
and columns, mapped with a substitution box (S-Box) to generate new
values for the final state array.
3. Shift Rows: It swaps the row elements among each other. It skips the
first row. It shifts the elements in the second row, one position to the
left. It also shifts the elements from the third row two consecutive
positions to the left, and it shifts the last row three positions to the left.
5. Add Round Key: The respective key for the round is XOR’d with the
state array is obtained in the previous step. If this is the last round, the
resultant state array becomes the ciphertext for the specific block; else,
it passes as the new state array input for the next round.
Now that you understand the basic steps needed to go through the encryption
procedure, understand this example to follow along.
As you can see in the image above, the plaintext and encryption convert keys to hex
format before the operations begin. Accordingly, you can generate the keys for the
next ten rounds, as you can see below.
You need to follow the same steps explained above, sequentially extracting the state
array and passing it off as input to the next round. The steps are as follows:
8. Shift Rows:
9. Mix Columns:
This state array is now the final ciphertext for this particular round. This becomes
the input for the next round.
Now that you understand how AES works, go through some of the applications of
this encryption algorithm.
It is the visible part of website or web application which is responsible for user
experience. The user directly interacts with the front end portion of the web
application or website.
Front-end Technologies
The front end portion is built by using some languages which are discussed
below:
2.2.10.1 HTML:
HTML stands for Hyper Text Markup Language. It is used to design the
front end portion of web pages using markup language. HTML is the
combination of Hypertext and Markup language. Hypertext defines the link
between the web pages. The markup language is used to define the text
documentation within tag which defines the structure of web pages.
A style sheet language used for describing the look and formatting of a
document written in a markup language. While most often used to style web
pages and interfaces written in HTML and XHTML, the language can be
applied to any kind of XML document, including plain XML, SVG and
XUL.
2.2.10.3 JAVASCRIPT:
2.2.10.4 Notepad++:
Image Encryption and Decryption using AES Algorithm has been designed and
demonstrated successfully. Frontend webpage is implemented using HTML
(Hypertext Markup Language) and CSS (Cascading Style Sheets). AES encryption
crypto function is called form cdnjs.cloudflare.com to execute data encryption.
Notepad++ software is used for programming the all modules. All system testing
are done successfully and finally all module executed in the lab. This software
product will be used for transferring important medical images, satellite images,
military information images at secure manner like defense, military, navy, public
sector networks, research center etc..
Fig: 2.15 Uploading Original Image and Add Encryption Key Stage
Fig: 2.16 Encryption key Error Stage and Transmit Image only uploaded
Fig: 2.17 Image upload Error Stage and only Encryption key entered
Fig: 2.18 Encrypted Image Stage and ciphertext Image will be used
for transmission
Fig: 2.20 Decryption key Error Stage and Received File Only Uploaded
Fig: 2.21 Upload File Error Stage and only Decryption key entered
Fig: 2.22 Decrypted File Stage -Original File will be filtered from
Ciphertext Encryption
Chapter – 03
AES Metadata
Raw Image
ENCRYPTION Generation
AES
Image Access Decryption
consists of two module section that is Block chain Image Encryption section and
Block chain Image Decryption Section.
File Sender:
File Receiver:
• AES Decryption: The recipient decrypts the file using the received
AES key.
• Image Access: The recipient can now access the original Image.
1 Laptop or PC 1
5 Keyboard 1`
6 Mouse 1
1 Notepad++
3 HTML, CSS
4 Web Browser
clicking on a shopping cart on a website. The blockchain will ensure that the buyer
gets the title and the seller is paid via cryptos.
Blockchain empowers all IoT devices to enhance security and bring transparency
in their interconnected ecosystems. Although IoT enables home security systems to
be managed remotely from smartphones, the traditional centralized approach to
exchanging information generated by IoT devices lacks the security standards and
ownership of information.
In a world where supply chains have become complicated owing to the nascent
demands of end customers and other stakeholders, companies are in pursuit of
technologies that would not only simplify the management of supply chains but also
make them automate various business processes that constitute supply chains.
While blockchains are gradually eliminating the need for centralized government
institutions, it is most likely that the competition between governments and
cryptocurrencies will reach its epitome in the years to come.
Together blockchains and AI, or what we can denote as a ‘decentralized AI’, can
drive new possibilities in the realms of data protection, data monetization,
and smart algorithms.
3.2.11 Genesis Block in Blockchain:
The Genesis Block is the first block in the block chain and contains unique
characteristics that distinguish it from its posterior blocks. It’s the only block that
doesn’t source a former block, as there are no blocks before it. Rather, the Genesis
Block is hard coded into the blockchain’s protocol as the starting point.
For illustration, the Genesis Block of the Bitcoin blockchain contains the
communication” The Times 03/ Jan/ 2009 Chancellor on point of an alternate
bailout for banks,” which references a caption from a UK review and serves as a
timestamp for the creation of the blockchain.
Here are the key components typically found in the Genesis Block:
• Block Header: Like every block in a blockchain, the Genesis Block has a
block header that includes metadata such as version, previous block hash,
Merkle root, timestamp, and nonce.
• Genesis Block Hash: The Genesis Block’s hash serves as its unique
identifier and is computed based on the block header’s contents.
The data and parameters of the Genesis Block are hardcoded into the blockchain’s
genesis file or configuration file. A cryptographic hash is computed for the entire
Genesis Block, including its header and embedded data.
3. Mining Process
In Proof of Work (PoW) blockchains like Bitcoin, miners prepare to mine the
Genesis Block by downloading the blockchain’s software and configuration files.
Miners start the mining process by attempting to find a valid hash for the Genesis
Block. Once a miner finds a valid hash that satisfies the difficulty target, they
broadcast the completed Genesis Block to the network.
4. Network Launch
Upon verification, the Genesis Block is propagated across the network. All nodes
in the network initialize their blockchain databases with the Genesis Block’s data,
establishing a common starting point for the blockchain ledger. With the Genesis
Block in place, subsequent blocks can be mined and added to the blockchain.
The Genesis Block, as the veritably first block in a blockchain, has several unique
features that set it piecemeal from other blocks in the chain. They are some of the
crucial features of the Genesis Block.
• Unique Block Hash: The Genesis Block has a unique block hash that serves
as its identifier in the blockchain. This hash is generally hardcoded into the
blockchain software to ensure that the Genesis Block is honored as the first
block in the chain.
• Special Transactions: The Genesis Block may contain special deals that
aren’t set up in posterior blocks. For illustration, the Bitcoin Genesis Block
contained a sale that bedded a communication representing a news
composition about government bailouts for banks.
• Initializing the Network: The Genesis Block is the veritably first block in a
blockchain, and it’s used to initialize the network. It contains a set of
hardcoded data that sets the foundation for posterior blocks, similar to the
network’s original parameters, the first deals, and the cryptographic hash
that identifies the block.
• Gain the hash of the Genesis Block: You can find the hash of the Genesis
Block on the blockchain discoverer of the network you’re interested in. This
hash should be readily available and easy to find.
• Corroborate the hash: Once you have attained the hash of the Genesis Block,
you’ll need to corroborate it. This can be done by comparing the hash you
attained with the hash that’s hardcoded in the software of the network.
Check the timestamp: The Genesis Block should also have a timestamp that
indicates the exact date and time it was created. You can corroborate the
timestamp by checking it against literal records to ensure that it’s accurate.
• Corroborate the deals: Eventually, you should corroborate the deals in the
Genesis Block to ensure that they’re valid. You can do this by checking the
addresses of the sender and receiver to ensure that they’re correct, and by
vindicating the sale amounts to ensure that they’re within the anticipated
range.
• Starting point of the Network: It serves as the foundation and starting point
of every blockchain network.
Secure Image Encryption and Decryption using blockchain has been designed and
demonstrated successfully. Frontend webpage is implemented using HTML
(Hypertext Markup Language) and CSS (Cascading Style Sheets). AES
encryption crypto function is called form cdnjs.cloudflare.com to execute data
encryption. Genesis algorithm based Block chain is used to enhance security for
file transfer. Notepad++ software is used for programming the all modules.
Fig: 3.8 Encryption key Error Stage and Transmit Image only uploaded
Fig: 3.9 Image upload Error Stage and only Encryption key entered
Fig: 3.10 Encrypted File Stage and Genesis Hash text file will be used
for transmission
Fig: 3.12 Decryption key Error Stage and Received File Only Uploaded
Fig: 3.13 Upload File Error Stage and only Decryption key entered
Fig: 3.14 Decrypted File Stage -Original File will be filtered from
Genesis Block Chain Encryption
Chapter – 04
Upload Image
Add Encryption
Key
Display
Ciphertext Data
Download
Ciphertext Image
• AES Encryption system verify Uploaded image and Encryption key. If any of
data is absent then it guides to user for adding image or Encryption key.
• Once image and Encryption key are received from user then AES Encryption
system converts the data into AES Encryption Data at 256 bit. Encryption data
will be inform of ciphertext data.
Upload Ciphertext
File
Add Decryption
Key
Downlaod
Decrypted Image
Upload Image
Add Encryption
Key
AES Encryption
Block Chain
Encryption
Download Block
chain Encryption
Upload Encrypted
Image
Add Decryption
Key
Downlaod
Decrypted Image
E-MAIL:- [email protected]
SUMMARY
Dynamic and dedicated Operator at YAZAKI INDIA PVT LTD, I excelled in cross-functional collaboration, driving
team success through effective strategizing. I consistently contributed to achieving optimal goals while fostering a
cooperative work environment. Committed to utilizing my skills to further the mission of a company. Bilingual,
hardworking, and ready to join my next team.
EDUCATION
• KARNATAKA PUBLIC SCHOOL SHIRWAD KARWAR. SSLC (92.16%)
• GOVT POLYTECHNIC COLLEGE KARWAR COMPUTER SCIENCE AND ENGINEERING
(CGPA 9) 2022-2025
SKILLS
• Python
• Java
• Git
• MS docs and Excel
• Team work and co-ordination
CERTIFICATIONS
• Ethical hacker (24 AUG 2024-10 SEP 2024)
• Ethical hacking sentinels (12 SEP 2024-12 OCT 2024 )
• Junior cybersecurity analyst (13 OCT 2024-11 NOV 2024)
INTERNSHIP
INTERESTS
• Writing
• Listening Spiritual Music
• Spending time with family and friends
LANGUAGES
• Kannada
• Hindi
• English
• Kokani
DECLARATION
The above in formation is true to the best of my knowledge.
NEHA NAIK
Photo Gallery
Appendices