0% found this document useful (0 votes)
234 views23 pages

Project Presentation PPT Format

Uploaded by

Rakshith Ah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
234 views23 pages

Project Presentation PPT Format

Uploaded by

Rakshith Ah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

CLOUD BASED

ENCRYPTION PLATFORM

BHUVAN S – 01JST20IS013
NIHAL NOOJIBAIL - 01JST20IS027
INTRODUCTION
“ Data is the new oil, and encryption is the lock that keeps it secure.”

Welcome to the Encryption Website, where security meets simplicity.


In today's interconnected world, protecting sensitive data has never
been more critical. Our project addresses the pressing need for secure
file encryption, ensuring the confidentiality and integrity of your
valuable information. With our user-friendly platform, we make
encryption accessible to everyone, empowering individuals and
organizations to safeguard their data and maintain privacy. Join us on
this journey towards a safer digital future.
OBJECTIVES

• Develop a user-friendly encryption website for secure file protection.


• Implement robust encryption algorithms to safeguard sensitive data.
• Enable easy file upload and download with end-to-end encryption.
• Enhance user experience through intuitive features like drag-and-
drop functionality.
• Optimize the deployment process to ensure high availability,
scalability, and cost-effectiveness of the encryption website.
• Ensure the utmost privacy and confidentiality of user data.
ABSTRACT

Our project is a client-side file encryption and decryption website that


guarantees secure data protection using advanced cryptographic techniques.
Using the AES 256-CBC encryption algorithm and PBKDF2 key derivation
function, users can seamlessly encrypt and decrypt files within their browser.
The website offers a user-friendly interface and employs best practices in web
development, cryptography, and security to deliver a reliable and intuitive file
encryption solution. Additionally, we have implemented a scalable
deployment approach that ensures widespread accessibility and availability of
our application. By combining cutting-edge technology with ease of use and
efficient deployment, our project aims to empower users with robust
encryption capabilities while maintaining a streamlined experience.
LITERATURE SURVEY

Brief review of the paper


How AES encryption works AES includes three block ciphers:
AES-128, AES-192 and AES-256. AES-128 uses a 128-bit key
length to encrypt and decrypt a block of messages, while AES-
192 uses a 192-bit key length and AES-256 a 256-bit key
length to encrypt and decrypt messages. Each cipher encrypts
and decrypts data in blocks of 128 bits using cryptographic
keys of 128, 192 and 256 bits, respectively. Symmetric, also
known as secret key , ciphers use the same key for encrypting
and decrypting, so the sender and the receiver must both know
-- and use -- the same secret key. The government classifies
information in three categories: Confidential, Secret or Top
Secret. All key lengths can be used to protect the Confidential
and Secret level. Top Secret information requires either 192-
or 256-bit key lengths. There are 10 rounds for 128-bit keys,
12 rounds for 192-bit keys and 14 rounds for 256-bit keys. A
round consists of several processing steps that include
substitution, transposition and mixing of the input plaintext to
transform it into the final output of cipher text.
Brief review of the paper

The paper proposes a mechanism for securing and managing


passwords using AES256 encryption and PBKDF2. The
proposed mechanism is designed to be more secure than
traditional password-based authentication methods, as it uses a
strong encryption algorithm and a password-stretching
function
• The proposed mechanism uses a strong encryption
algorithm (AES256) and a password-stretching function
(PBKDF2) to make it more secure than traditional
password-based authentication methods.
• The proposed mechanism includes a number of security
features to prevent unauthorized access to the user's
account.
• The proposed mechanism was evaluated by conducting a
number of security tests, and the results showed that it is
secure against a variety of attacks.
• The proposed mechanism is more secure, easier to
manage, and more scalable than traditional password-based
authentication methods.
SYSTEM DESIGN
PROCESS FLOW DIAGRAM
IMPLEMENTATION
RESULTS
ENCRYPTING A FILE

Upload the file


to be encrypted

Enter the password


And click on Encrypt
Download the
encrypted file
DECRYPTING A FILE

Upload the
encrypted file to
be decrypted

Enter the passkey


to decrypt
Download the
decrypted file
FUTURESCOPE
&
CONCLUSION
FUTURE SCOPE

• Additional Encryption Algorithms and Modes


• Mobile Application
• File Sharing and Collaboration
• Cloud Integration
• Implementation of rolling passwords
• Enhanced User Experience
• Continuous Security Updates
• Compliance with Post-Quantum Cryptography
CONCLUSION

Our client-side file encryption website offers a secure and user-


friendly solution for protecting data. With advanced encryption
algorithms and key derivation functions, users can confidently
encrypt and decrypt files in their browser. Our project prioritizes
simplicity and accessibility, ensuring widespread availability
through scalable deployment. Future enhancements, like rolling
passwords, hold potential for further strengthening data security.
In summary, our project delivers a seamless encryption
experience, empowering users to protect their privacy and
maintain control over their data.
REFERENCES

1. Dr.Rajeshree Khande, Dr.Shubhangee Ramaswami, Chaitanya Naidu,


Nidhi Patel(2021) “An effective mechanism for securing and managing
password using AES-256 encryption & PBKDF2”

2. Nikhil Anand (2020) “Using AES algorithm for encryption and


decryption of text file, image and audio.”
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy