0% found this document useful (0 votes)
2 views

CDP_ETI

The document is a teacher evaluation sheet for a micro-project titled 'Cryptography & Data Protection' completed by student Gadhari Vaidehi Pradip in the Computer Technology program. It details the project's objectives, methodology, and outcomes, emphasizing the importance of cryptography in enhancing digital security. The evaluation includes a rubric for assessing the project's process, product, and individual presentation, along with comments from the faculty member.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CDP_ETI

The document is a teacher evaluation sheet for a micro-project titled 'Cryptography & Data Protection' completed by student Gadhari Vaidehi Pradip in the Computer Technology program. It details the project's objectives, methodology, and outcomes, emphasizing the importance of cryptography in enhancing digital security. The evaluation includes a rubric for assessing the project's process, product, and individual presentation, along with comments from the faculty member.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Teacher Evaluation Sheet

Name of Student: Gadhari Vaidehi Pradip


Enrolment No: 2200790202
Name of Program: Computer Technology Semester:-VI
Course Title: Emerging Trends in Computer&Information Technology (ETI) Code:22618
Title of the Micro Project: Cryptography & Data Protection

Course Outcomes Achieved:-


a) CO-f Detect network, operating system and applications vulnerabilities.

Evaluation as per Suggested Rubric for Assessment of Micro-Project:

Sr.
Characteristic to be Poor Average Good Excellent
No.
assessed (Marks 1-3) (Marks 4-5) (Marks 6 - 8) (Marks 9-10)
(A) Process and Product Assesssment (Convert above total marks out of 6 marks)
1 Relevance to the Course
Literature Survey /
2
Information Collection
Completion of the Target as
3
per project proposal
Analysis of data and
4
representation
5 Quality of Prototype / Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 marks)
8 Presentation
9 Viva
Micro – Project Evaluation Sheet:
Process Assessment Product Assessment
Part Project Part Individual Total
A – project Methodology B – Project Presentation / Marks 10
Name of Student Proposal (2 marks) Report / Working Viva (4 marks)
(2 marks) Model(2 marks)

(Gadhari Vaidehi)

Comments / Suggestions about team work / leadership / inter – personal communication (if any)

Any Other Comment

Name and designation of the faculty Member: Ms.S.S.Shinde Signature

1
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION

SHRI HIRALAL HASTIMAL(JAIN


BROTHERS,JALGAON)POLYTECHNIC,
CHANDWAD-423101 (Nashik)

MICRO PROJECT
Academic year: 2024-25

TITLE OF PROJECT
Cryptography & Data Protection

Program:Computer Technology Program Code:CM

Course: ETI Course code: 22618

2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

Sr.No. Name of Student Roll No Enrollment No Seat No


1. Gadhari Vaidehi Pradip 07 2200790202

CERTIFICATE
This is to certify 1) Gadhari Vaidehi Pradip
of 5th Semester of Diploma in Computer Technology of Institute, Shri Hiralal Hastimal
(Jain Brothers,Jalgaon) Polytechnic,Chandwad (Code: 0079) has completed the Micro-
Project satisfactorily in Subject Emerging Trends in Computer&Information Technology
(225618) for the academic year 2024- 2025 as prescribed in the curriculum.

Place: CHANDWAD

Date: / /2025

Subject Teacher Head of the Department Principal


(Ms.S.S.Shinde) (Mr. P. R. Sali) (Dr. V. A. Wankhede)

3
INDEX

SR_NO. CONTENT PAGE NO.

Part A

1.0 Brief Introduction 6

2.0 Aim of Micro Project 5

3.0 Action Plan 5

4.0 Resources Required 5

Part B

1.0 Brief Description 6

2.0 Aim of Micro Project 6

3.0 Course Outcome Integrated 6

4.0 Actual Procedure Followed 6

5.0 Actual Resource Used 7

6.0 Outputs of the Micro-projects -

7.0 Skill Developed 14

8.0 Applications of this Microproject 14

4
PART A-Plan

Title of micro-project: Cryptography & Data protection

1.0 Aim/Benefits of the Micro-Project-


This project enhances digital security using cryptography, password analysis, and
steganography to protect sensitive data from cyber threats. It ensures confidentiality,
authentication, and integrity while educating users on secure password practices and hidden
communication techniques.

2.0Course Outcomes Addressed-


a) CO-a: Describe artificial intelligence,machine learning and deep learning.
b) CO-b: Interpret IOT concepts.
c) CO-c: Compare Models of digital Forensic Investigation.
d) CO-d: Describe Evidence Handling procedures.
e) CO-e: Describe Ethical Hacking Process.
f) CO-f: Detect Network,Operating System and application vulnerabilities.

3.0 Proposed Methodology-


A multi-layered approach is used, combining encryption for data security, password analysis
for strengthening user authentication, and steganography for covert communication.
Implementation involves Python-based cryptographic algorithms, password strength
evaluation, and image-based data hiding.

4.0 Action Plan-

Planned Start Planned Finish


Sr no. Details of activity
Date Date
1. Finalization of topic
2. Preparation of Abstract
3. Collection of data
4. Preparation of concept
5. Seminar / Presentation
6. Submission of Micro Project

5.0 Resources Required:

Sr.No Name of Resource/Material Specification Quantity Remarks


1. Computer (Desktop/Laptop) i5, RAM 16GB 1 Available
2. Microsoft office word 2010 1 Available
3. Books - - -
4. Websites GeeksForGeeks 1 Available

5. Softwares - - -

5
PART B-Plan

Title of micro-project: Deep Learning

1.0 Brief Description:-


The project integrates encryption to secure data, password analysis to identify vulnerabilities,
and steganography to conceal information within images. These techniques provide a robust
cybersecurity framework for secure communication and data protection.

2.0 Aims/Benefits of Micro Project:-


This project enhances digital security using cryptography, password analysis, and
steganography to protect sensitive data from cyber threats. It ensures confidentiality,
authentication, and integrity while educating users on secure password practices and hidden
communication techniques.

3.0 Course Outcomes Achieved:


b) a) CO-f Detect network, operating system and applications vulnerabilities.

4.0 Actual Methodology/Procedure Followed:-


Research was conducted on cryptographic methods, password security, and steganography.
Implementation involved coding encryption algorithms, designing a password strength
analyzer, and developing a steganography tool. Testing ensured effectiveness, with future
improvements planned, such as two-factor authentication and advanced encryption techniques.

5.0 Actual Resources Used:

Sr.No Name of Resource/Material Specification Quantity Remarks


1. Computer (Desktop/Laptop) i5,RAM 16GB 1 Available
2. Microsoft office word 2010 1 Available
3. Books
4. Websites Available
5. Softwares 1

6
Cryptography & Data Protection
Introduction:
Cryptography is a technique of securing information and communications through the use of
codes and mathematical algorithms, ensuring that only the intended recipients can access and
understand the data. It plays a crucial role in protecting sensitive information from
unauthorized access, cyber threats, and data breaches in today's digital world.

In simple terms, cryptography converts plain text (readable data) into ciphertext (encrypted
data) using encryption algorithms, making it unreadable to anyone except those with the correct
decryption key.

Thus, preventing unauthorized access to information. The prefix “crypt” means “hidden” and
the suffix “graphy” means “writing”. In Cryptography, the techniques that are used to protect
information are obtained from mathematical concepts and a set of rule-based calculations
known as algorithms to convert messages in ways that make it hard to decode them. These
algorithms are used for cryptographic key generation, digital signing, and verification to protect
data privacy, web browsing on the internet and to protect confidential transactions such as
credit card and debit card transactions.

Plain Text Encryption Cipher Text Decryption Plain Text

Readable Format Non-Readable Format Readable Format

Features:

1. Confidentiality

Confidentiality ensures that only the intended recipient can access the information, preventing
unauthorized individuals from reading or tampering with it.

• Data is encrypted using an algorithm and a secret key before transmission.


• Only those who have the correct decryption key can access the original message.
• Even if hackers intercept the data, they cannot read it without the correct key.

2. Integrity

Integrity ensures that data remains unchanged during storage or transmission. If any
modification occurs, it is detectable.

7
• Cryptographic hashing algorithms (SHA-256, MD5) generate a unique fingerprint
(hash) of data.
• If data is altered, the hash value also changes, signaling tampering.
• Digital signatures confirm that the message has not been modified.

3. Non-Repudiation

Non-repudiation ensures that a sender cannot deny sending a message, email, or financial
transaction at a later stage.

• Uses digital signatures and public-key cryptography to create an unforgeable record.


• A sender digitally signs a message, proving that they sent it.
• If the sender denies it, the digital signature acts as proof in legal cases.

4. Authentication

Authentication confirms the identity of users, devices, or systems, ensuring that data is
exchanged between the right parties.

• Passwords & Biometrics: Ensure only authorized users can access systems.
• Two-Factor Authentication (2FA): Adds an extra layer of security (OTP, biometrics).
• Public Key Infrastructure (PKI): Uses cryptographic certificates to verify identities.

5. Interoperability

Cryptography enables secure communication between different devices, systems, and


networks, ensuring compatibility across platforms.

• Standardized encryption protocols like SSL/TLS allow different web browsers and
devices to communicate securely.
• Cross-platform messaging apps use encryption standards that work on Android, iOS,
and desktops.
• Blockchain & Cryptocurrencies allow transactions between people worldwide without
a central authority.

6. Adaptability

Cryptography is constantly evolving to counter new cybersecurity threats and technological


advancements.

• Stronger encryption algorithms replace outdated ones (e.g., AES replacing DES).
• Quantum Cryptography is being developed to resist future quantum computing attacks.
• Machine Learning in Cybersecurity helps detect and prevent cryptographic attacks.

8
Why is Cryptography Important in Today’s Digital Era?
In a world where digital transformation is booming, cryptography ensures privacy, security,
and trust in every aspect of our lives.

1. Prevents Cybercrime
Cyberattacks like hacking, phishing, and identity theft are rising. Cryptography defends against
data breaches and unauthorized access.

2. Enables Secure Online Transactions


Without cryptography, online banking, shopping, and stock trading would be unsafe, exposing
users to financial fraud.

3. Protects Personal Privacy


In the age of surveillance and data tracking, cryptography ensures secure communication and
data protection for individuals.

4. Strengthens National Security


Governments use cryptography to secure classified military and intelligence data from cyber-
espionage threats.

5. Essential for Emerging Technologies


Cryptography plays a vital role in securing blockchain, AI, IoT devices, and cloud computing
from cyber threats.

Types of Cryptography
1. Symmetric Key Cryptography
Symmetrical Key Cryptography also known as conventional or single-key encryption was the
primary method of encryption before the introduction of public key cryptography in the 1970s.
In symmetric-key algorithms, the same keys are used for data encryption and decryption. This
type of cryptography plays a crucial role in securing data because the same key is used for both
encryption and decryption.

Substitution and Transposition are two principal techniques used in symmetric-key


cryptography.

▪ Resistance to brute force attack: The most basic requirement for the security of an
encryption cipher is that the keyspace size—in other words, the number of possible
distinct keys from which someone using the algorithm could have chosen—is very
large.

9
▪ Cryptographic attack resistance: The second fundamental requirement for symmetric
or non-symmetrical encryption is the ability to generate information-influenced (i.e.,
non-random) encrypted messages. For this to happen, a critical but not sufficient
requirement in an informational sense is that the encrypted message has high entropy.

Figure 1. Symmetric Key Cryptography

2. Asymmetric Key Cryptography


In asymmetric Key cryptography, there are two keys, also known as key pairs: a public key
and a private key. The public key is publicly distributed. Anyone can use this public key to
encrypt messages, but only the recipient, who holds the corresponding private key, can decrypt
those messages. "Public-key cryptography" is another representation used to refer to
Asymmetric Key cryptography.

This cryptographic system addresses two major challenges faced in traditional (symmetric)
cryptography: key distribution and digital signatures. Asymmetric algorithms use one key for
encrypting data and another, related key for decrypting it.

Figure 2. Asymmetric Key Cryptography

10
3. Hash Functions
Hash functions in cryptography are extremely valuable and are found in practically every
information security application. A hash function transforms one numerical input value into
another compressed numerical value. It is also a process that turns plaintext data of any size
into a unique ciphertext of a predetermined length.

A cryptographic hash function (CHF) is an equation that is widely used to verify the validity
of data. It has many applications, particularly in information security (e.g. user authentication).
A CHF translates data of various lengths of the message into a fixed-size numerical string the
hash. A cryptographic hash function is a single-directional work, making it extremely difficult
to reverse to recreate the information used to make it.

Figure 3. Hash Function in Cryptography

Password Cracking & Strength Analyzer


Passwords are the first line of defense in securing digital accounts and sensitive information.
However, weak passwords make systems vulnerable to cyberattacks. The Password Cracking
& Strength Analyzer helps users evaluate the security of their passwords and demonstrates how
attackers can break weak passwords using brute-force or dictionary attacks.

The Password Strength Analyzer evaluates the complexity and security of a password based
on various parameters to encourage strong password creation.

The Password Cracking Simulation demonstrates how attackers attempt to break weak
passwords using various techniques.

11
How it Works:

• Checks Password Length – Longer passwords are harder to crack.


• Verifies Character Variety – Includes uppercase, lowercase, numbers, and special
characters.
• Detects Common Patterns – Identifies repeated characters or predictable sequences.
• Checks Against a Dictionary – Compares the password with a database of
commonly used passwords.

Methods Used for Cracking Passwords:

• Brute-Force Attack – Tries every possible combination until the correct password is
found.
• Dictionary Attack – Uses a list of common passwords to guess the correct one.
• Hash Comparison – Compares a hashed password with a list of precomputed hashes.
• Rainbow Table Attack – Uses precomputed hash values to crack hashed passwords.

Why this is important?

• Helps Users Create Strong Passwords


A password strength meter guides users in creating secure passwords that are harder to crack.
Warns users if they are using weak or common passwords.

• Demonstrates Security Risks


Shows how easy it is to crack weak passwords using brute-force or dictionary attacks.
Educates users about using password managers and multi-factor authentication (MFA).

• Encourages Use of Secure Hashing Methods


Instead of storing plaintext passwords, websites should store hashed and salted passwords
using bcrypt or Argon2.

How to Protect Against Password Attacks?

• Use a long password (12-16+ characters with mixed characters).


• Avoid common words and sequences (password123, qwerty, admin).
• Enable multi-factor authentication (MFA) for extra security.
• Use a password manager to generate and store unique passwords.
• Hash passwords securely (Use bcrypt or Argon2 instead of SHA-256).

12
Steganogrsaphy - Based Secure Communication
Steganography is the technique of hiding secret information within an ordinary file or message
to avoid detection. Unlike cryptography, which scrambles data into an unreadable format,
steganography conceals the existence of the data. This makes it a powerful method for secure
communication.

In this project, we will use Python, OpenCV, and steganography libraries to hide and extract
secret messages inside images using the Least Significant Bit (LSB) Steganography technique.

How Steganography Works?

1. Hiding Data (Encoding Process)


• The user selects an image (carrier file) and a secret message.
• The message is converted into binary form.
• The binary data is embedded into the image by modifying the Least Significant Bits
(LSB) of the pixel values.
• The modified image, which now contains the secret message, is saved and sent to the
recipient.
2. Extracting Hidden Data (Decoding Process)
• The recipient loads the modified image.
• The program extracts the Least Significant Bits from the image pixels.
• The extracted bits are reassembled into the original message.

Conclusion

This project presents a comprehensive security system that enhances data protection and secure
communication by integrating cryptography, password security analysis, and steganography.
In today’s digital era, where cyber threats like hacking, phishing, and data breaches are
constantly evolving, it is crucial to adopt advanced security measures.

Cryptography ensures that sensitive data is securely encrypted, allowing only authorized users
to access it. It provides essential security features such as confidentiality, integrity,
authentication, and non-repudiation, making it a fundamental tool in protecting digital
information.

The Password Strength Analyzer helps users create strong passwords by evaluating their
complexity and resistance to attacks. Additionally, Password Cracking Simulation highlights
vulnerabilities in weak passwords by demonstrating dictionary and brute-force attacks,
encouraging users to enhance their security practices.

13
Steganography-based secure communication further strengthens data protection by hiding
sensitive messages within images, audio, or video files, making it nearly impossible for
unauthorized users to detect hidden information.

By integrating these techniques, this project provides a multi-layered security approach that
safeguards information against cyber threats. Future enhancements such as two-factor
authentication (2FA), mobile app development, and advanced steganography techniques will
further improve its effectiveness. This project serves as a powerful tool for ensuring secure and
private digital communication in modern cybersecurity frameworks.

7.0 Skill developed

This project enhances cybersecurity expertise by applying cryptography, password security


analysis, and steganography. It strengthens programming skills in Python, improves problem-
solving through security risk assessment, and deepens knowledge of encryption techniques. By
implementing password strength evaluation and data-hiding methods, learners gain practical
experience in securing digital communication. Additionally, it builds awareness of cyber
threats and enhances software development and testing skills for creating reliable security
solutions.

8.0 Applications of this Microproject

▪ Secure Communication: Encrypting messages for private communication (e.g.,


emails, messaging).
▪ Digital Signatures: Ensuring authenticity and integrity of documents and
transactions.
▪ Data Encryption: Protecting sensitive data from unauthorized access.
▪ Secure Storage: Encrypting data stored on servers or cloud platforms.
▪ Blockchain & Cryptocurrencies: Securing transactions in decentralized systems.
▪ Password Protection: Secure password storage using hashing and salting.

14

You might also like