2
Most read
3
Most read
13
Most read
Encryption And Decryption
Using AES
By Ankita Singh
Prachi Sangli
Asmita Shinde
What is Encryption And Decryption ?
Encryption is the process of
translating plain text data (plaintext)
into something that appears to be
random and meaningless (ciphertext).
Decryption is the process of
converting ciphertext back to
plaintext.
Why Use Encryption ?
Encryption is important because it allows you to
securely protect data that you don't want anyone else to
have access to.
1
What is AES (Advanced Encryption Standard) ?
◈ It is a symmetric block cipher chosen by the U.S.
government to protect classified information and is
implemented in software and hardware throughout the
world to encrypt sensitive data.
◈ It was intended to be easy to implement in hardware and
software, as well as in restricted environments
Design Of AES
◈ AES comprises three block ciphers: AES-128,
AES-192 and AES-256.
◈ Each cipher encrypts and decrypts data in
blocks of 128 bits using cryptographic keys of
128-, 192- and 256-bits, respectively.
◈ Symmetric ciphers use the same key for
encrypting and decrypting, so the sender
and the receiver must both know and use
the same secret key.
Design Of AES
◈ All key lengths are deemed
sufficient to protect classified
information up to the "Secret"
level with "Top Secret" information
requiring either 192- or 256-bit
key lengths.
Encryption
The Code In Our Project,
Converts A Text File Into An
Encrypted File Using Java Code
And AES Algorithm
Using AES For Encrypting And Decrypting Text
Decryption
Later, That Encrypted File Can be
Taken To Any Receiving System
And Decrypted To View The
Original Intended Text Using The
Java Code.
Proposed System
ScreenShot
Original text.txt File Encrypted File After Code Execution
ScreenShot
Decrypted File After Code Execution
What Does It Do ?
◈ It Makes The Communication Between Two Individuals
Or Parties Very Secure.
◈ Due To Which the Enemy Or The Middle Person Cannot
Understand What Message Is Sent.
“
Cryptography is the ultimate form
of non-violent direct action.
- Julian Assange
Thanks!
Any questions?

More Related Content

PPT
Lecture 3 Properties of Nanomaterial- Surface to Volume Ratio.ppt
PPTX
Hospital management system
PPTX
Encryption
PPT
work and energy
PPTX
Data encryption
PPTX
Solution Architecture Framework
DOC
Hospital management system
PPT
Encryption And Decryption
 
Lecture 3 Properties of Nanomaterial- Surface to Volume Ratio.ppt
Hospital management system
Encryption
work and energy
Data encryption
Solution Architecture Framework
Hospital management system
Encryption And Decryption
 

What's hot (20)

PPTX
Cryptography
PDF
Introduction to Cryptography
PPTX
Idea(international data encryption algorithm)
PPTX
Data Encryption Standard (DES)
PPT
Secure Socket Layer
DOCX
What is AES? Advanced Encryption Standards
PPTX
Advanced encryption standard (aes)
PDF
IP Security
PPTX
Image encryption and decryption
PPT
Network security cryptographic hash function
PPTX
Symmetric and asymmetric key
PPTX
Encryption algorithms
PPT
Message Authentication Code & HMAC
PPT
Message authentication
 
PPTX
Transposition Cipher
PPTX
Block cipher modes of operation
PPTX
Cryptography
Cryptography
Introduction to Cryptography
Idea(international data encryption algorithm)
Data Encryption Standard (DES)
Secure Socket Layer
What is AES? Advanced Encryption Standards
Advanced encryption standard (aes)
IP Security
Image encryption and decryption
Network security cryptographic hash function
Symmetric and asymmetric key
Encryption algorithms
Message Authentication Code & HMAC
Message authentication
 
Transposition Cipher
Block cipher modes of operation
Cryptography
Ad

Similar to Encryption And Decryption Using AES Algorithm (20)

PPTX
Encryption techniques
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PPTX
Overview of cryptography
PDF
week 12
PPT
Encryption Primer por Cathy Nolan
PPTX
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
PPTX
Seminar on Encryption and Authenticity
PDF
Ijetcas14 355
PDF
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
PPTX
Encryption33.pptx
PPTX
CNS team 6.pptx
DOCX
AES Abstract
PDF
無題 1
PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
PPT
Ch11 Basic Cryptography
Encryption techniques
Cryptography
Cryptography
Cryptography
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Overview of cryptography
week 12
Encryption Primer por Cathy Nolan
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Seminar on Encryption and Authenticity
Ijetcas14 355
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
Encryption33.pptx
CNS team 6.pptx
AES Abstract
無題 1
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Ch11 Basic Cryptography
Ad

Recently uploaded (20)

PDF
CBCN cam bien cong nghiep bach khoa da năng
PDF
Water Industry Process Automation & Control Monthly - September 2025
PDF
August 2025 Top read articles in International Journal of Database Managemen...
PPTX
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
PDF
Application of smart robotics in the supply chain
PPT
linux chapter 1 learning operating system
PPTX
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
PDF
PhD defense presentation in field of Computer Science
PPTX
Ingredients of concrete technology .pptx
PDF
August 2025 Top Read Articles in - Bioscience & Engineering Recent Research T...
PDF
IoT-Based Hybrid Renewable Energy System.pdf
PDF
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
PPTX
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
PPTX
module 2 renewable energy power plant.pptx
PDF
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
PDF
Traditional Programming vs Machine learning and Models in Machine Learning
PDF
Human CELLS and structure in Anatomy and human physiology
PPTX
quantum theory on the next future in.pptx
PPTX
non conventional energy resorses material unit-1
DOCX
web lab manual for fifth semester BE course fifth semester vtu belgaum
CBCN cam bien cong nghiep bach khoa da năng
Water Industry Process Automation & Control Monthly - September 2025
August 2025 Top read articles in International Journal of Database Managemen...
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
Application of smart robotics in the supply chain
linux chapter 1 learning operating system
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
PhD defense presentation in field of Computer Science
Ingredients of concrete technology .pptx
August 2025 Top Read Articles in - Bioscience & Engineering Recent Research T...
IoT-Based Hybrid Renewable Energy System.pdf
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
module 2 renewable energy power plant.pptx
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
Traditional Programming vs Machine learning and Models in Machine Learning
Human CELLS and structure in Anatomy and human physiology
quantum theory on the next future in.pptx
non conventional energy resorses material unit-1
web lab manual for fifth semester BE course fifth semester vtu belgaum

Encryption And Decryption Using AES Algorithm

  • 1. Encryption And Decryption Using AES By Ankita Singh Prachi Sangli Asmita Shinde
  • 2. What is Encryption And Decryption ? Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext.
  • 3. Why Use Encryption ? Encryption is important because it allows you to securely protect data that you don't want anyone else to have access to. 1
  • 4. What is AES (Advanced Encryption Standard) ? ◈ It is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. ◈ It was intended to be easy to implement in hardware and software, as well as in restricted environments
  • 5. Design Of AES ◈ AES comprises three block ciphers: AES-128, AES-192 and AES-256. ◈ Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and 256-bits, respectively. ◈ Symmetric ciphers use the same key for encrypting and decrypting, so the sender and the receiver must both know and use the same secret key.
  • 6. Design Of AES ◈ All key lengths are deemed sufficient to protect classified information up to the "Secret" level with "Top Secret" information requiring either 192- or 256-bit key lengths.
  • 7. Encryption The Code In Our Project, Converts A Text File Into An Encrypted File Using Java Code And AES Algorithm Using AES For Encrypting And Decrypting Text Decryption Later, That Encrypted File Can be Taken To Any Receiving System And Decrypted To View The Original Intended Text Using The Java Code.
  • 9. ScreenShot Original text.txt File Encrypted File After Code Execution
  • 11. What Does It Do ? ◈ It Makes The Communication Between Two Individuals Or Parties Very Secure. ◈ Due To Which the Enemy Or The Middle Person Cannot Understand What Message Is Sent.
  • 12. “ Cryptography is the ultimate form of non-violent direct action. - Julian Assange