REPORT 1 - Merged
REPORT 1 - Merged
“CRYPTOGRAPHY TECHNOLOGY”
Submitted By
KEERTI KHANAGOUDRA 2LG21CS061
CERTIFICATE
Certified that the Technical Seminar entitled “CRYPTOGRAPHY TECHNOLOGY” carried out by
Mr/Ms KEERTI KHANAGOUDRA USN 2LG21CS061 a Bonafide student of B.E 8th Semester in
partial fulfillement for award of Bachelor Engineering in Computer Science and Engineering of the
Visvesvaraya Technological University, Belagavi, during the year 2024-2025. It certified that all
corrections/suggestions indicated for Internal Assessment have been incorporated in the Report deposited
in the Departmental Library.
The project report has been approved as it satisfies the academic requirements in respect of Technical
Seminar prescribed for the said Degree.
1……………….......... ……………………
2……………………. …………………....
ACKNOWLEDGEMENT
I consider it a privilege to express a few words of gratitude in depth and respect to all those, who guided
and inspired for the successful completion of this seminar.
Our sincere thanks to our beloved principal, Dr. VIRUPAXI BAGODI Government Engineering College,
Talakal, for kind co-operation during our entire course
I would like to express our immense gratefulness to our beloved Guide Prof. VEERESH, Department of
Computer Science and Engineering, for his guidance and support throughout our seminar work.
I express our sincere gratitude to our beloved HOD Prof. VEERESH, Department of Computer Science
and Engineering, for major source of inspiration, co-operation and guidance.
I thankful to all the faculty members of Computer Science and Engineering for their valuable support and
co-operation.
I thankful to our Parents and Friends for their love, encouragement, affectionand moral support showered on
us during our entire course.
Cordially,
i
ABSTRACT
ii
Table of Contents
Acknowledgment i
Abstract ii
Table of Contents iii
List of Figures iv
1 Introduction 1
2 Literature Survey 2
3 Types Of Cryptography Technology 3
4 Cryptographic Algorithms And Techniques 5
5 Methodology 7
6 Advantages/Disadvantages 9
7 Applications 10
8 Future Scope 11
Conclusion
References
iii
List of Figures
FIG.NO FIG NAME PAGE NO
iv
Cryptography Technology
CHAPTER 1
INTRODUCTION
CHAPTER 2
LITERATURE SURVEY
Susan et al. pointed out that network and computer security is a new and fast-moving
technology within the computer science field, with computer security teaching to be a target
that never stops moving. Algorithmic and mathematic aspects, such as hashing techniques and
encryption, are the main focus of security courses. As crackers find ways to hack network
systems, new courses are created that cover the latest type of attacks, but each of these attacks
become outdated daily due to the responses from new security software. With the continuous
maturity of security terminology, security techniques and skills continue to emerge in the
practice of business, network optimization, security architecture, and legal foundation. Othman
O. Khalifa et al. demonstrated the primary basic concepts, characteristics, and goals of
cryptography. They discussed that in our age, i.e. the age of information, communication has
contributed to the growth of technology and therefore has an important role that requires
privacy to be protected and assured when data is sent through the medium of communication.
Nitin Jirwan et al. referred to data communication as depending mainly on digital data
communication, in which data security has the highest priority when using encryption
algorithms in order for data to reach the intended users safely without being compromised.
They also demonstrated the various cryptographic techniques that are used in the process of
data communication, such as symmetric and asymmetric methods. In a review on network
security and cryptography, Sandeep Tayal et al. mentioned that with the emergence of social
networks and commerce applications, huge amounts of data are produced daily by
organizations across the world. This makes information security a huge issue in terms of
ensuring that the transfer of data through the web is guaranteed. With more users connecting
to the internet, this issue further demonstrates the necessity of cryptography techniques. This
paper provides an overview of the various techniques used by networks to enhance security,
such as cryptography. Sad khan, S. B. pointed to the main process and trends of the fields in
cryptography the time of Julius Cesar till the modern era, as well as mentioning the current
status of the Arabic industrial and academical efforts in this field in the past that is related to
thee existing cryptographic and search for new evaluation methods for the security of
information.
CHAPTER 3
TYPES OF CRYPTOGRAPHY TECHNOLOGY
3. Hash Functions
There is no usage of any key in this algorithm. A hash value with a fixed length is
calculated as per the plain text which makes it impossible for the contents of plain text
to be recovered. Many operating systems use hash functions to encrypt passwords.
CHAPTER 4
CHAPTER 5
METHODOLOGY
Symmetric Key Cryptography is a method of encryption where the same secret key is used for
both encrypting and decrypting the data. The process begins with plain text, which is the
original readable information. This plain text is encrypted using a symmetric encryption
algorithm like AES or DES, along with a secret key, resulting in cipher text. The cipher text
appears as random, unreadable characters, making it secure for storage or transmission over
networks. When the data needs to be read again, the cipher text is decrypted using the same
secret key, restoring the original plain text. The key to this method’s effectiveness is that both
the sender and receiver must securely share and maintain the same secret key, as anyone who
gains access to the key can decrypt the data. Symmetric encryption is known for being fast and
efficient, making it ideal for encrypting large volumes of data. However, it also faces challenges
in key distribution and management because if the key is compromised, the entire security of
the encrypted data is at risk. Popular symmetric encryption algorithms include AES (Advanced
Encryption Standard), DES (Data Encryption Standard), and 3DES (Triple DES).
• Plain Text: It starts with the original readable data that needs to be protected.
• Encryption: The plain text is encrypted using a secret key and a symmetric encryption
algorithm like AES or DES.
• Cipher Text: After encryption, the data becomes cipher text, which appears scrambled and
unreadable to unauthorized users.
• Key Usage: The same secret key used for encryption must also be used for decryption,
ensuring that only those with the correct key can access the original information.
• Decryption: The cipher text is decrypted back into plain text using the same secret key and
symmetric algorithm.
• Security Dependency: The security of the entire process depends on keeping the secret key
safe and confidential.
• Efficiency: Symmetric encryption is fast and suitable for encrypting large amounts of data,
making it highly efficient in practice.
• Examples: Popular symmetric encryption algorithms include AES (Advanced Encryption
Standard), DES (Data Encryption Standard), and 3DES (Triple DES).
• Risk: If the secret key is compromised, the security of the data is completely broken,
highlighting the importance of secure key management.
CHAPTER 6
ADVANTAGES AND DISADVANTAGES
ADVANTAGES:
1. Confidentiality: Cryptography ensures that only authorized individuals can access and
read sensitive data. By converting readable data into unreadable ciphertext, it protects
information from unauthorized access, especially during transmission over networks like
the internet.
2. Data Integrity: It helps maintain the integrity of data by detecting any unauthorized
alterations. Hash functions in cryptography ensure that even a small change in the original
message can be identified, preventing tampering and ensuring the data received is exactly
as sent.
3. Authentication: Cryptographic techniques allow users and systems to verify each other’s
identities. Through methods like digital certificates and signatures, it ensures that data or
communication is genuinely from the claimed sender and not from a malicious source.
4. Non-repudiation: This prevents a sender from denying their actions, such as sending a
message or completing a transaction. Digital signatures provide undeniable proof of
origin, which is critical in legal, financial, and business processes.
DISADVANTAGES:
1. Key Management Issues: Handling encryption keys securely is complex. Losing keys
can result in permanent data loss or unauthorized access.
2. Performance Impact: Encryption and decryption require processing power, which can
slow down system performance, especially in large-scale or real-time applications.
3. No Defense Against Insider Threats: Cryptography cannot stop authorized users from
misusing their access to sensitive data.
4. High Implementation Cost: Secure cryptographic systems often require costly
infrastructure, software, and skilled personnel.
CHAPTER 7
APPLICATIONS
CHAPTER 8
FUTURE SCOPE
Cryptography holds immense potential for the future as digital security becomes more critical
in an increasingly connected world. With the advent of quantum computing, traditional
cryptographic algorithms such as RSA and ECC are at risk of being broken, which is why the
development of post-quantum cryptography is gaining momentum. These new quantum-
resistant algorithms aim to safeguard data even in the era of powerful quantum machines.
Additionally, cryptographic technologies are evolving rapidly in the blockchain space, with
innovations like zero-knowledge proofs, homomorphic encryption, and secure multi-party
computation enhancing privacy, scalability, and trust in decentralized systems. Homomorphic
encryption, in particular, is expected to revolutionize cloud computing and artificial
intelligence by enabling data processing without compromising confidentiality. In the realm of
artificial intelligence and machine learning, cryptography plays a key role in ensuring privacy
through techniques such as federated learning and differential privacy. As billions of IoT
devices become part of daily life, lightweight cryptographic algorithms will be vital for secure
communication and device authentication. Moreover, with the rise of zero-trust security models
and decentralized identity systems, cryptographic methods like digital signatures and verifiable
credentials are set to redefine how identity and access are managed online. Quantum
cryptography, including technologies like quantum key distribution (QKD), will also become
increasingly relevant as quantum networks expand. Overall, the future of cryptography lies in
its ability to adapt to emerging threats, power new technologies, and ensure privacy and
security in the digital age.
[2] S. J. Lincke and A. Hollan, "Network Security: Focus on Security, Skills, and
Stability," in 37th ASEE/IEEE Frontiers in Education Conference, Milwaukee.
[4] N. Jirwan, A. Singh and S. Vijay, "Review and Analysis of Cryptography Techniques,"
International Journal of Scientific & Engineering Research.
[5] N. Varol, F. Aydoğan and A. Varol, "Cyber Attacks Targetting Android Cellphones,"
in The 5th International Symposium on Digital Forensics and Security (ISDFS 2017),
Tirgu Mures.
[6] F. Piper and S. Murphy, Cryptography: A Very Short Introduction, London: Oxford
University Press.