Professional Documents
Culture Documents
NIS Micro Pro
NIS Micro Pro
NIS Micro Pro
Title of Project
Cryptography in Symetric and Asymentric
Class : TYCO
Semester : Sixth
Roll No : 54
Enrollment No : 2111710080
Seat No : 475353
CERTIFICATE
Page | 5
Micro–Project Log Book
Semester : Sixth Program : Computer Engineering
Course : NIS Class : TYCO
Page | 6
Mr. Ghorpade M.S
Name & Signature of HOD
Page | 7
ANNEXURE I
Rubric for Evaluation of Micro Project
Academic Year : 2023-24 Program : Computer Engineering
Class : TYCO Course : NIS
Co coverage:
CO-3 . Apply cryptographic algorithms and protocols to maintain computer security.
Miss.Shinde S.A.
Page | 8
Name of Teacher & Sign
Page | 9
Micro Project Proposal
Academic Year : 2023-24 Program : Computer
Engineering
Class : TYCO Course : NIS
Course Code : 22620 Roll No : 54
Enrollment No : 2111710080 Exam Seat No : 475353
Title of Micro Project: Cryptography in Symetric and Asymentric .
Group Members:
Sr.No Name Roll Enrolment No.
No.
1 Kanchava 54 2111710080
Pankaj Rajendra
References:
1.https://csrc.nist.gov/pubs/sp/800/38/a/final
2.https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5-draft
Comments by guide
Miss.Shinde S.A.
Page | 10
Subject Teacher
Introduction:
Page | 11
Abstraction:
Abstraction is also prevalent in other domains, including engineering, where it aids in the
design and analysis of complex systems by focusing on high-level functionalities and
interactions, and in philosophy, where it underlies conceptual frameworks and theories by
distilling essential features from empirical observations and experiences.
Page | 12
Working Diagram:
Page | 13
1. 1.Data Encryption: Symmetric encryption algorithms like AES (Advanced
Encryption Standard) are widely used to encrypt sensitive data stored on computers,
servers, and other devices. This ensures that even if unauthorized individuals gain
access to the data, they cannot decipher it without the correct decryption key.
2. 2.Secure Communication: Symmetric cryptography is employed in securing
communication channels such as email, instant messaging, and Voice over IP (VoIP).
It enables parties to exchange encrypted messages securely, ensuring that only
authorized recipients can decrypt and access the content.
3. 3.File and Disk Encryption: Symmetric encryption is utilized to encrypt entire files
or disk volumes, providing comprehensive protection for stored data. This is
particularly important for securing confidential documents, financial records, and
other sensitive information stored on local drives or removable media.
4. 4.Virtual Private Networks (VPNs): Symmetric encryption algorithms are integral
to VPNs, which establish secure, encrypted connections over public networks like the
internet. By encrypting data traffic between devices, VPNs ensure privacy and
confidentiality, allowing users to access remote resources securely.
5. 5.Secure Sockets Layer/Transport Layer Security (SSL/TLS): Symmetric
cryptography plays a crucial role in SSL/TLS protocols, which secure web
communications between clients and servers. Symmetric encryption is used for
encrypting the actual data transmitted between parties during an SSL/TLS session,
complementing asymmetric encryption used for key exchange and authentication.
6. 6.Database Encryption: Symmetric encryption techniques are employed to encrypt
sensitive data stored in databases, providing an additional layer of security against
unauthorized access or data breaches. This helps organizations comply with
regulatory requirements and protect confidential information, such as customer
records and financial transactions.
7. 7.Authentication Tokens: Symmetric cryptography is used in generating and
verifying authentication tokens, such as HMAC (Hash-based Message Authentication
Code), which ensure the integrity and authenticity of transmitted data. These tokens
are commonly employed in authentication protocols and secure messaging systems.
Page | 14
1. 1.Secure Key Exchange: Asymmetric cryptography enables secure key exchange
mechanisms such as Diffie-Hellman key exchange. This allows two parties to
establish a shared secret key over an insecure channel without needing to transmit the
key itself, thus ensuring confidentiality during the key exchange process.
Page | 15
Types of Symmetric Cryptographic Algorithms:
2.Stream Ciphers: These algorithms encrypt data bit by bit or byte by byte, typically
by combining the plaintext with a pseudorandom keystream generated from a secret
key. Examples include:
RC4 (Rivest Cipher 4)
ChaCha20
Page | 16
1. RSA (Rivest-Shamir-Adleman): RSA is one of the most widely used asymmetric
encryption algorithms. It involves the use of a public key for encryption and a
corresponding private key for decryption. RSA is based on the difficulty of factoring
large prime numbers.
Page | 17
Conclusion:
In conclusion, both symmetric and asymmetric cryptographic algorithms play essential roles
in securing digital communication, protecting sensitive data, and ensuring the integrity and
authenticity of information exchanged over networks. Symmetric cryptography offers
simplicity, efficiency, and high-speed encryption, making it well-suited for encrypting large
volumes of data and securing communication channels. However, its reliance on a shared
secret key necessitates robust key management practices to prevent unauthorized access and
mitigate the risks associated with key compromise.
On the other hand, asymmetric cryptography provides enhanced security through the use of
public-private key pairs, enabling secure key exchange, digital signatures, and encrypted
communication without the need for pre-shared keys. Asymmetric algorithms offer greater
flexibility and stronger assurances of authenticity and integrity, making them indispensable
for applications requiring robust authentication and non-repudiation.
References:
1. https://csrc.nist.gov/pubs/sp/800/38/a/final
2. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5-draft
Page | 18