0% found this document useful (0 votes)
1 views

AES Java Mini Project

Uploaded by

221902001
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

AES Java Mini Project

Uploaded by

221902001
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

“Encryption and

Decryption Using
AES Algorithm”
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
GREEN UNIVERSITY OF BANGLADESH

PRESENTED TO
Md. Sabbir Hosen Mamun ( Lecturer )

PRESENTED BY
Hasnat Zamil Sayed - 221902001
Md. Fahad Nakib - 221902149
Md. Nafijul Islam - 221902156
Table of Contents

 What is Encryption And Decryption?


 Why Use Encryption.
 What is the AES-Advanced Encryption Standard?
 Why Use AES For Encrypting And Decrypting?
 Design of AES.
 Steps for Encryption And Decryption.
 USE-CASE Diagram.
 Flow Charts.
 Implementation Snapshot’s.
 Limitation.
 Conclusion.
3
What is Encryption And
Decryption ?

Encryption is the process of


converting plain text into unreadable
ciphertext.

Decryption is the process of converting


ciphertext back to plaintext using a key
to make it readable.

3
Why Use Encryption?

Encryption is important because it allows


securely protect data that don't want anyone else to
have access to.

4
What is AES-Advanced
Encryption Standard ?

 AES is a widely used encryption algorithm for securing digital data.


 Uses symmetric encryption,
 Supports key lengths of 128, 192, or 256 bits.
 Designed to replace the older DES - Data Encryption Standard.

5
Why Using AES For Encrypting
And Decrypting Text

 Mathematically proven to resist known cryptographic attack vectors.


 Multiple key lengths -128, 192, 256 bits.
 Complex substitution and permutation processes.
 Each encryption produces unique cipher text.
 Small input changes produce significantly different outputs.

6
Design of AES

 E = encryption function for a symmetric block cipher


 m = plaintext message of size 128 bits.
 n = ciphertext.
 k = key of size 128bits. (same for encryption and decryption).
 D = decryption function for symmetric block cipher.
7
Steps for Encryption And
Decryption

8
USE-CASE Diagram

9
Flow Charts

Encryption:- Decryption:-

10
Implementation Snapshot’s

Main
Output
Window

11
Implementation Snapshot’s Cont.

Message
And
Key for
Encryption

12
Implementation Snapshot’s Cont.

Encrypted
Message and
Secret
Key For
Decryption

13
Implementation Snapshot’s Cont.

Final
Decrypted
Message

14
Limitation

While our AES implementation provides robust


security. It may face challenges in encryption in
handling extremely large text files and requires
careful key management to prevent potential
security breaches.

15
Conclusion

AES is the ultimate choice for text encryption due to its


unparalleled security through complex mathematical algorithms
that make decryption virtually impossible. Its flexible key lengths
make it the most reliable and adaptable encryption method for
safeguarding sensitive text data across diverse applications.

16
Thank You..

You might also like