Professional Documents
Culture Documents
1 Streview
1 Streview
TO
DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS
.
ANNAMACHARYA P.G. COLLEGE OF COMPUTER STUDIES
NEW BOYANAPALLI, RAJAMPET - 516126.
ENCRYPTION AND DECRYPTION
ALGORITHM BASED ON NEURAL
NETWORK
Encryption and decryption algorithm based
on neural network
PRESENTED BY
UNDER THE GUIDANCE OF
D.AKBAR RASOOL,
ROLL NO:215N1F0003,
V. NIRMALA,
MCA-IV SEMESTER,
ASSITANT PROFESSOR,
APGCCS .RAJAMPET.
DEPT of MCA,
CONTENTS
Abstract ER diagram
Introduction UML diagram
Testing
Existingsystem Test cases
Disadvantages Implementation
Proposed system Sample screens
Advantages
conclusion
Modules
System Architecture
Hardware requirements
Software requirements
Non functional requirements
ABSTRACT
A Neural Network is a machine which is designed to work like brain. It has the
capability to execute complex calculations easily. Cryptography is the interchange of
data between the users without seep of data to others.
Many public key cryptography are there which are based on numerical theory but it has
the limitation of availability of large analytical power, trigonometric and time utilization
during creation of key. To overcome these limitations, I am using self associative neural
network concept of soft computing in coordination with encryption technique to send
information securely on communication network.
Introduction
This project aims at removing the necessity for the coding to follow a general rule by
employing a neural network for cryptography the cipher text. Thus introducing the
randomness in secret writing creating it most harder to decrypt. I’ve conjointly
introduced the thought of as well as lies with in the data transmitted to misguide any
listener who manages to decipher the ciphertext.
Cryptography may be a science that involves two techniques secret writing and
decipherment and it essentially permits to send sensitive and confidential information
over the unsecure network. The root of the term "cryptography“, is came for the Greek
word “kryptos.” meaning of this word is hidden or secret.
Scope
The scope of an encryption and decryption algorithm based on neural network
involves designing and implementing a system that utilizes neural networks for
securing and processing sensitive data. This project entails researching existing
encryption algorithms, exploring the potential of neural networks in cryptography,
and designing a novel ANN-based algorithm.
Purpose
The purpose of an encryption and decryption algorithm based on neural network is to
provide a secure and efficient method for protecting sensitive data during
transmission or storage. By leveraging the capabilities of neural networks, the
algorithm aims to enhance the confidentiality and integrity of the data being
encrypted.
Existing System
The existing system for encryption and decryption algorithms based on neural network may
include various traditional encryption methods such as symmetric-key algorithms (e.g., AES) or
asymmetric-key algorithms (e.g., RSA). These conventional encryption schemes often rely on
mathematical operations and cryptographic techniques rather than neural networks.
Dis-Advantages
Less accuracy
low Efficiency
limited adaptability
Proposed System
In this project I am using neural network to encrypt and decrypt and this neural
network will be trained with keys and plain text. While training neural network
application calculate weight between keys and neural network and this weight will be
consider as encrypted data. This encrypted data can be send to any receiver and then
receiver will perform below steps to decrypt text.
Advantages
High accuracy
High efficiency
adaptability
Software Requirement
Analysis and Specification
Modules
User
1. Generate key
2.build neural network model
3.neural network encryption
4.neural network decryption
System
System Architecture
Hardware Requirements
Processor : i3 or higher
Hard Disk : 40 GB
RAM : 4 GB (min)
Software Requirements
Operating system : Windows XP/7/8
Coding Language : Python
Frame work : Tkinter
Backend : TensorFlow
NON FUNCTIONAL REQUIREMENTS
Usability
Reliability
Security
Performance
Maintainability
SDLC Model
System Design
ER Diagram
Data Tables
Table Name: User
Column Name Data Type(Size) Constraint
Types:
White box testing
Black box testing
Levels of testing:
Unit Testing
Integration Testing
System Testing
Acceptance Testing
Test Cases
Test Test CaseTest Case Test Steps Test Test
Case Name Description Case Priority
Id Step Expected Actual Status
01 Start the Host the If it doesn'tWe cannot run theThe application hostsHigh High
Application application Start application. success.
and test if it
starts making
sure the required
software is
available
02 Home Page Check the If it doesn’tWe cannot access theThe application isHigh High
Deployment load. application. running
environment for successfully
properly .
loading the
application.
03 User Mode Verify the working of If it doesn’t We cannot The application displays theHigh High
The application Respond use the Freestyle
in freestyle Freestyle Page
mode mode.