CDP_ETI
CDP_ETI
Sr.
Characteristic to be Poor Average Good Excellent
No.
assessed (Marks 1-3) (Marks 4-5) (Marks 6 - 8) (Marks 9-10)
(A) Process and Product Assesssment (Convert above total marks out of 6 marks)
1 Relevance to the Course
Literature Survey /
2
Information Collection
Completion of the Target as
3
per project proposal
Analysis of data and
4
representation
5 Quality of Prototype / Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 marks)
8 Presentation
9 Viva
Micro – Project Evaluation Sheet:
Process Assessment Product Assessment
Part Project Part Individual Total
A – project Methodology B – Project Presentation / Marks 10
Name of Student Proposal (2 marks) Report / Working Viva (4 marks)
(2 marks) Model(2 marks)
(Gadhari Vaidehi)
Comments / Suggestions about team work / leadership / inter – personal communication (if any)
1
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
MICRO PROJECT
Academic year: 2024-25
TITLE OF PROJECT
Cryptography & Data Protection
2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
CERTIFICATE
This is to certify 1) Gadhari Vaidehi Pradip
of 5th Semester of Diploma in Computer Technology of Institute, Shri Hiralal Hastimal
(Jain Brothers,Jalgaon) Polytechnic,Chandwad (Code: 0079) has completed the Micro-
Project satisfactorily in Subject Emerging Trends in Computer&Information Technology
(225618) for the academic year 2024- 2025 as prescribed in the curriculum.
Place: CHANDWAD
Date: / /2025
3
INDEX
Part A
Part B
4
PART A-Plan
5. Softwares - - -
5
PART B-Plan
6
Cryptography & Data Protection
Introduction:
Cryptography is a technique of securing information and communications through the use of
codes and mathematical algorithms, ensuring that only the intended recipients can access and
understand the data. It plays a crucial role in protecting sensitive information from
unauthorized access, cyber threats, and data breaches in today's digital world.
In simple terms, cryptography converts plain text (readable data) into ciphertext (encrypted
data) using encryption algorithms, making it unreadable to anyone except those with the correct
decryption key.
Thus, preventing unauthorized access to information. The prefix “crypt” means “hidden” and
the suffix “graphy” means “writing”. In Cryptography, the techniques that are used to protect
information are obtained from mathematical concepts and a set of rule-based calculations
known as algorithms to convert messages in ways that make it hard to decode them. These
algorithms are used for cryptographic key generation, digital signing, and verification to protect
data privacy, web browsing on the internet and to protect confidential transactions such as
credit card and debit card transactions.
Features:
1. Confidentiality
Confidentiality ensures that only the intended recipient can access the information, preventing
unauthorized individuals from reading or tampering with it.
2. Integrity
Integrity ensures that data remains unchanged during storage or transmission. If any
modification occurs, it is detectable.
7
• Cryptographic hashing algorithms (SHA-256, MD5) generate a unique fingerprint
(hash) of data.
• If data is altered, the hash value also changes, signaling tampering.
• Digital signatures confirm that the message has not been modified.
3. Non-Repudiation
Non-repudiation ensures that a sender cannot deny sending a message, email, or financial
transaction at a later stage.
4. Authentication
Authentication confirms the identity of users, devices, or systems, ensuring that data is
exchanged between the right parties.
• Passwords & Biometrics: Ensure only authorized users can access systems.
• Two-Factor Authentication (2FA): Adds an extra layer of security (OTP, biometrics).
• Public Key Infrastructure (PKI): Uses cryptographic certificates to verify identities.
5. Interoperability
• Standardized encryption protocols like SSL/TLS allow different web browsers and
devices to communicate securely.
• Cross-platform messaging apps use encryption standards that work on Android, iOS,
and desktops.
• Blockchain & Cryptocurrencies allow transactions between people worldwide without
a central authority.
6. Adaptability
• Stronger encryption algorithms replace outdated ones (e.g., AES replacing DES).
• Quantum Cryptography is being developed to resist future quantum computing attacks.
• Machine Learning in Cybersecurity helps detect and prevent cryptographic attacks.
8
Why is Cryptography Important in Today’s Digital Era?
In a world where digital transformation is booming, cryptography ensures privacy, security,
and trust in every aspect of our lives.
1. Prevents Cybercrime
Cyberattacks like hacking, phishing, and identity theft are rising. Cryptography defends against
data breaches and unauthorized access.
Types of Cryptography
1. Symmetric Key Cryptography
Symmetrical Key Cryptography also known as conventional or single-key encryption was the
primary method of encryption before the introduction of public key cryptography in the 1970s.
In symmetric-key algorithms, the same keys are used for data encryption and decryption. This
type of cryptography plays a crucial role in securing data because the same key is used for both
encryption and decryption.
▪ Resistance to brute force attack: The most basic requirement for the security of an
encryption cipher is that the keyspace size—in other words, the number of possible
distinct keys from which someone using the algorithm could have chosen—is very
large.
9
▪ Cryptographic attack resistance: The second fundamental requirement for symmetric
or non-symmetrical encryption is the ability to generate information-influenced (i.e.,
non-random) encrypted messages. For this to happen, a critical but not sufficient
requirement in an informational sense is that the encrypted message has high entropy.
This cryptographic system addresses two major challenges faced in traditional (symmetric)
cryptography: key distribution and digital signatures. Asymmetric algorithms use one key for
encrypting data and another, related key for decrypting it.
10
3. Hash Functions
Hash functions in cryptography are extremely valuable and are found in practically every
information security application. A hash function transforms one numerical input value into
another compressed numerical value. It is also a process that turns plaintext data of any size
into a unique ciphertext of a predetermined length.
A cryptographic hash function (CHF) is an equation that is widely used to verify the validity
of data. It has many applications, particularly in information security (e.g. user authentication).
A CHF translates data of various lengths of the message into a fixed-size numerical string the
hash. A cryptographic hash function is a single-directional work, making it extremely difficult
to reverse to recreate the information used to make it.
The Password Strength Analyzer evaluates the complexity and security of a password based
on various parameters to encourage strong password creation.
The Password Cracking Simulation demonstrates how attackers attempt to break weak
passwords using various techniques.
11
How it Works:
• Brute-Force Attack – Tries every possible combination until the correct password is
found.
• Dictionary Attack – Uses a list of common passwords to guess the correct one.
• Hash Comparison – Compares a hashed password with a list of precomputed hashes.
• Rainbow Table Attack – Uses precomputed hash values to crack hashed passwords.
12
Steganogrsaphy - Based Secure Communication
Steganography is the technique of hiding secret information within an ordinary file or message
to avoid detection. Unlike cryptography, which scrambles data into an unreadable format,
steganography conceals the existence of the data. This makes it a powerful method for secure
communication.
In this project, we will use Python, OpenCV, and steganography libraries to hide and extract
secret messages inside images using the Least Significant Bit (LSB) Steganography technique.
Conclusion
This project presents a comprehensive security system that enhances data protection and secure
communication by integrating cryptography, password security analysis, and steganography.
In today’s digital era, where cyber threats like hacking, phishing, and data breaches are
constantly evolving, it is crucial to adopt advanced security measures.
Cryptography ensures that sensitive data is securely encrypted, allowing only authorized users
to access it. It provides essential security features such as confidentiality, integrity,
authentication, and non-repudiation, making it a fundamental tool in protecting digital
information.
The Password Strength Analyzer helps users create strong passwords by evaluating their
complexity and resistance to attacks. Additionally, Password Cracking Simulation highlights
vulnerabilities in weak passwords by demonstrating dictionary and brute-force attacks,
encouraging users to enhance their security practices.
13
Steganography-based secure communication further strengthens data protection by hiding
sensitive messages within images, audio, or video files, making it nearly impossible for
unauthorized users to detect hidden information.
By integrating these techniques, this project provides a multi-layered security approach that
safeguards information against cyber threats. Future enhancements such as two-factor
authentication (2FA), mobile app development, and advanced steganography techniques will
further improve its effectiveness. This project serves as a powerful tool for ensuring secure and
private digital communication in modern cybersecurity frameworks.
14