Skip to main content

ENCRYPTION AND DECRYPTION USING AES

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 11 Issue: 09 | Sep 2024

p-ISSN: 2395-0072

www.irjet.net

ENCRYPTION AND DECRYPTION USING AES 1K.Venkateswarlu, 2Sree Chithra Yellanki

Department of Computer Science and Systems Engineering, Andhra University College of Engineering, Andhra Pradesh, India1 Department of Computer Science and Systems Engineering, Andhra University College of Engineering, Andhra Pradesh, India2 ---------------------------------------------------------------------***--------------------------------------------------------------------Also Abstract Cybercrime is more prevalent than ever all over the world. Consequently the ability to protect sensitive information is being crucial. Hacking and phising emails are seen these days and gives us a task to create a software that protects data. In this paper, we perform file encryption and decryption i.e., encryption is encoding files and decryption is decoding files that have sensitive data. This means that the attacker or malware with access to one's computer cannot read the sensitive data unless the attacker has the encryption- decryption key, even if attacker has encryptiondecryption key and tries to access data the file content are stored in unreadable format. “Encryption conceals data by scrambling it, so that anyone who tries to view it sees only random information. Encrypted data can only be unscrambled through the process of decryption.” Encryption, Decryption, Advanced Encryption Algorithm, Malware, Hacker

1.INTRODUCTION By the advancement of web in today’s world endless number of employees have increased that require sharing of records and folders. Security concerns with respects to information transmission and capacity are a major concern of both the transmitters and receivers. Cryptography is the fundamental stage in which present day data security, which includes the use of progressed scientific approaches in tackling difficult cryptographic issues, has gained its grounds within the computerized world. This gives the need of Encryption and Decryption utilizing AES.

Folder encryption: Encrypting whole folders and all the data included within them is a comprehensed approach. This solution might be helpful to safeguard a group of related files simultaneously. Encrypting folders simplifies the encryption procedure since you can protect several files simultaneously while retaining their structure and order.

The two main types of cryptographic algorithms are symmetric and asymmetric. Symmetric key algorithms work by using a single key to encrypt and decrypt information, whereas asymmetric cryptography uses two keys: A public key to encrypt messages and a private key to decode them.

Encryption, a crucial component of data security, plays a vital part in securing sensitive information within the computerized domain. It employs intricate numerical calculations to convert lucid data into garbled ciphertext, defending it from unauthorized access. Encryption give significance lies in its capacity to maintain privacy, judgment, and authenticity of data. It guarantees that data can be safe from unauthorized altering or debasement, and permits verification of the source and judgment of messages.

Impact Factor value: 8.315

A cryptographic key is a mathematical algorithm implemented in software or hardware and used to encrypt or decrypt data. It is a string of bits that are combined with the data to create cipher text. The cryptographic key can also be used to unencrypt data back to plaintext.

1.1 ENCRYPTION AND DERCRPTION

|

File encryption: This type of protection allows you to granularly protect individual files by encrypting them. This technique is excellent when you have specific files that need an extra degree of security or contain very sensitive information. Encrypting individual files gives you more control over access and assures that even if one file is hacked, the others will still be safe.

Decryption is the method of changing information that has been rendered incoherent through encryption back to its decoded frame. In unscrambling, the framework extricates and changes over the confused information and changes it to effectively reasonable arrange.

Key Words:

© 2024, IRJET

i. In a Public key, two keys are utilized one key is utilized for encryption and another key is utilized for decryption. One key (public key) is utilized to scramble the plain content to convert it into cipher text and another key (private key) is utilized by the receiver to unscramble the cipher text to read the message.

|

ISO 9001:2008 Certified Journal

|

Page 325


Turn static files into dynamic content formats.

Create a flipbook
ENCRYPTION AND DECRYPTION USING AES by IRJET Journal - Issuu