0% found this document useful (0 votes)
8 views12 pages

Cyber

The project focuses on developing a secure web-based text encryption and decryption system using AES and RSA algorithms to enhance data privacy and security for online communication. It assesses the feasibility of the system from technical, economic, operational, and legal perspectives, while proposing improvements over existing encryption methods. The project concludes that with proper implementation, it can serve as a reliable tool for securing sensitive information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views12 pages

Cyber

The project focuses on developing a secure web-based text encryption and decryption system using AES and RSA algorithms to enhance data privacy and security for online communication. It assesses the feasibility of the system from technical, economic, operational, and legal perspectives, while proposing improvements over existing encryption methods. The project concludes that with proper implementation, it can serve as a reliable tool for securing sensitive information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

KLS's Gogte Institute of Technology

Department of Computer Science &


Engineering

Project Title
Secure web based text encryption and decryption using AES
and RSA Algorithm

Presented By : Under the guidance of


Amruta Talawar Prof. Sagar .S. Pujar
Shweta Vairagi Asst. Professor
Sonal Patil Dept of CSE
CONTENTS

• Problem Definition
• Introduction
• Literature Survey
• Feasibility system
• Existing System And Proposed System
• Hardware And Software
• Conclusion
• Reference
PROBLEM DEFINATION

This project aims to develop a secure web-based


system for encrypting and decrypting text using AES
and RSA algorithms. AES ensures fast and efficient
data encryption, while RSA securely exchanges
encryption keys. The system enhances data privacy and
security for online communication.
INTRODUCTION
• This project focuses on developing a secure web-based text encryption
and decryption system utilizing a cryptographic approach AES
(Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman)
algorithms.

• AES, a symmetric encryption algorithm, provides fast and efficient


data encryption, making it suitable for securing large volumes of text.

• RSA, an asymmetric encryption algorithm, ensures secure key


exchange and authentication.

• This project aims to achieve a balance between security and


performance, making encrypted communication both secure and
efficient.
LITERATURE SURVEY
The literature survey explores existing encryption techniques, their
applications, and the research conducted on web-based encryption
systems.
Cryptographic Techniques are :

1) Symmetric Key Encryption (AES)


• AES is a block cipher encryption algorithm
• It is widely used for fast encryption due to its low computational cost
and efficiency in handling large data.
use cases:-
Data Encryption
Disk Encryption
Wireless Security
Messaging App
2) Asymmetric Key Encryption (RSA)

• RSA encryption is based on the mathematical difficulty of prime


factorization of large numbers.
• It uses two keys: a public key for encryption and a private key for
decryption.
use cases:-
Secure Data Transmission
Digital Signatures
Email Encryption
Cryptographic Protocol
FEASIBILITY STUDY
A feasibility study assesses the practicality of the proposed system
from multiple aspects are:
1] Technical Feasibility
2] Economic Feasibility
3] Operational Feasibility
4] Legal Feasibility
1] Technical Feasibility
Technically feasible as it utilizes widely available web
development and cryptographic technologies:
• Programming Languages: JavaScript (Node.js)
• Cryptographic Libraries: Crypto module (Node.js)
• Security Protocols: HTTPS
2] Economic Feasibility
The cost of developing and maintaining the system is minimal due to:
• Open-source cryptographic libraries
• Low maintenance costs

3) Operational Feasibility
Key features ensuring operational feasibility include :
• Fast and efficient encryption/decryption process
• Cross-platform accessibility (desktop, mobile)
• Secure key management to prevent unauthorized access

4) Legal Feasibility
It include major cybersecurity and data protection regulations, such as:
• GDPR (General Data Protection Regulation) for user privacy
• Data Encryption Laws ensuring secure transmission
• Cybersecurity best practices to prevent data breaches
Existing System And Proposed System
Existing System
• Traditional encryption methods lack efficiency.
• Key management and exchange challenges.
• Weak encryption can lead to unauthorized access.

Proposed System
• Uses AES for fast encryption and RSA for secure key exchange.
• Improved security with HTTPS and authentication mechanisms.
• Secure key management for better protection.
• User-friendly web interface for encryption and decryption.
HARDWARE AND SOFTWARE

Software Requirements :
• Node.js:
The primary runtime environment for running the application.Text
•Editor/IDE:
A text editor or IDE is required to edit and run the JavaScript code.
•Visual Studio Code: VS Code
•Operating System: windows 10

Hardware Requirements:
•Processor: At least 1 GHz processor (modern CPUs should work
fine).
•RAM: 2 GB or more of RAM (4 GB is ideal for comfortable
development and testing).
•Storage: 100 MB or more free disk space
CONCLUSION
This project provides a solid foundation for building secure web-based
encryption services using AES and RSA. By incorporating robust
encryption practices and proper key management, the application can
serve as a reliable tool for securing sensitive information. However, in a
real-world deployment, attention should be given to secure key storage,
HTTPS implementation, and secure transmission of sensitive data to
ensure the highest level of protection.
REFERENCE
1.Tyagi, M., Manoria, M., & Mishra, B. (2019). Analysis and
Implementation of AES and RSA for cloud. International Journal of
Applied Engineering Research, 14(20), 3918.
https://doi.org/10.37622/ijaer/14.20.2019.3918-393

2. Camenisch, J., & Lysyanskaya, A. (2001). An Efficient System for


Non-transferable Anonymous Credentials with Optional Anonymity
Revocation. In Lecture notes in computer science (pp. 93–118).
https://doi.org/10.1007/3-540-44987-6_7

3. Kaminsky, A., Kurdziel, M., & Radziszowski, S. (2010). An overview


of cryptanalysis research for the advanced encryption standard. An
Overview of Cryptanalysis Research for the Advanced Encryption
Standard. https://doi.org/10.1109/milcom.2010.5680130

You might also like