Cyber
Cyber
Project Title
Secure web based text encryption and decryption using AES
and RSA Algorithm
• Problem Definition
• Introduction
• Literature Survey
• Feasibility system
• Existing System And Proposed System
• Hardware And Software
• Conclusion
• Reference
PROBLEM DEFINATION
3) Operational Feasibility
Key features ensuring operational feasibility include :
• Fast and efficient encryption/decryption process
• Cross-platform accessibility (desktop, mobile)
• Secure key management to prevent unauthorized access
4) Legal Feasibility
It include major cybersecurity and data protection regulations, such as:
• GDPR (General Data Protection Regulation) for user privacy
• Data Encryption Laws ensuring secure transmission
• Cybersecurity best practices to prevent data breaches
Existing System And Proposed System
Existing System
• Traditional encryption methods lack efficiency.
• Key management and exchange challenges.
• Weak encryption can lead to unauthorized access.
Proposed System
• Uses AES for fast encryption and RSA for secure key exchange.
• Improved security with HTTPS and authentication mechanisms.
• Secure key management for better protection.
• User-friendly web interface for encryption and decryption.
HARDWARE AND SOFTWARE
Software Requirements :
• Node.js:
The primary runtime environment for running the application.Text
•Editor/IDE:
A text editor or IDE is required to edit and run the JavaScript code.
•Visual Studio Code: VS Code
•Operating System: windows 10
Hardware Requirements:
•Processor: At least 1 GHz processor (modern CPUs should work
fine).
•RAM: 2 GB or more of RAM (4 GB is ideal for comfortable
development and testing).
•Storage: 100 MB or more free disk space
CONCLUSION
This project provides a solid foundation for building secure web-based
encryption services using AES and RSA. By incorporating robust
encryption practices and proper key management, the application can
serve as a reliable tool for securing sensitive information. However, in a
real-world deployment, attention should be given to secure key storage,
HTTPS implementation, and secure transmission of sensitive data to
ensure the highest level of protection.
REFERENCE
1.Tyagi, M., Manoria, M., & Mishra, B. (2019). Analysis and
Implementation of AES and RSA for cloud. International Journal of
Applied Engineering Research, 14(20), 3918.
https://doi.org/10.37622/ijaer/14.20.2019.3918-393