0% found this document useful (0 votes)
32 views

Text Encryption and Decryption

Uploaded by

ccgovardhan60
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

Text Encryption and Decryption

Uploaded by

ccgovardhan60
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Text Encryption

and
Decryption
• In the digital age, securing sensitive
information is crucial to maintaining privacy
and protecting data from unauthorized
access. This project explores a
comprehensive approach to text encryption
and decryption. The system utilizes a
combination of symmetric and asymmetric
encryption algorithms, including Advanced
Abstract Encryption Standard (AES) for symmetric
encryption and RSA for asymmetric
encryption. The encryption module converts
plaintext into ciphertext, ensuring data
confidentiality, while the decryption module
reverses the process to retrieve the original
text.
Objectives
1. *Encrypt Data*: Convert text into a secure format that can’t be read without proper
Encrypt access.

Decrypt 2. *Decrypt Data*: Turn the encrypted text back into its original, readable format.

3. *Manage Keys*: Handle encryption keys safely to ensure they are not exposed or
Manage misused.

4. *Ensure Data Integrity*: Make sure the data remains accurate and unchanged during
Ensure encryption and decryption.

5. *Optimize Performance*: Ensure the encryption and decryption processes run


Optimize efficiently without slowing down the system.
Introduction
• Encryption
The process of converting plaintext into ciphertext
• Decryption
The process of converting ciphertext into plaintext
• Encryption of text

• Decryption of text
Sample
System requirements

Works on above Windows 7, XP, Vista

• Works on 64 bit Windows & 32 bit Windows


Literature survey
• Rajan.S, Geeta Shantanu Joshi, "File
Encryption and Decryption Using Secure RSA",
International Journal of Emerging Science and
Engineering (IJESE), Vol-1, Issue-4, February 2013.
Proposed system
• Encryption module
uses the AES for encryption of text .generate a key AES
• Decryption module
uses the AES to decrypt the text
• User interface
GUI will be designed allow user to encrypt and decrypt
text through a visual interface
Thank you

You might also like