0% found this document useful (0 votes)
13 views6 pages

NIS Format KrberOs

The document outlines a micro project titled 'Encrypt and Decrypt Information using Cryptography' submitted by Pratik Date under the guidance of Mrs. J.C. Joshi as part of a Diploma course in Information Technology. It details the project's aim to enhance cybersecurity through cryptographic techniques, the resources required, an action plan, and the expected learning outcomes. The project emphasizes practical applications of various encryption methods and the importance of network security in contemporary digital environments.

Uploaded by

Ashwin Krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views6 pages

NIS Format KrberOs

The document outlines a micro project titled 'Encrypt and Decrypt Information using Cryptography' submitted by Pratik Date under the guidance of Mrs. J.C. Joshi as part of a Diploma course in Information Technology. It details the project's aim to enhance cybersecurity through cryptographic techniques, the resources required, an action plan, and the expected learning outcomes. The project emphasizes practical applications of various encryption methods and the importance of network security in contemporary digital environments.

Uploaded by

Ashwin Krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

A

Micro Project On

“Encrypt and Decrypt Information using Cryptography”

Submitted By

27. Pratik Date

Under Guidance of
Mrs. J. C. Joshi

Diploma Course in Information Technology


(As per directives of I Scheme, MSBTE)

Sinhgad Institutes
Sinhgad Technical Education Society’s
SOU. VENUTAI CHAVAN POLYTECHNIC, PUNE - 411041
ACADEMIC YEAR 2023 - 2024
Maharashtra State Board of technical
Education Certificate
This is to certify that Mr. Pratik Date with Roll No. 27 Six
Semester of Diploma in Information Technology of Institute
Sou. Venutai Chavan Polytechnic (Code:0040) has successfully
completed the Micro-Project in Network and Information
Security (22620) for the academic year 2023-2024.

Place: SVCP, Pune Enrolment No: 2100400238

Date: Exam Seat No: 173855

Mrs. J.C.Joshi Mr. U. S. Shirshetti Dr. M. S. Jadhav


Course Teacher Head of Department Principal
Annexure – I
Part A-Micro project proposal

A. BRIEF INTRODUCTION:
In contemporary cybersecurity, cryptography is pivotal. Encryption employs algorithms
and keys to transform plaintext into ciphertext, rendering it unreadable to unauthorized
users. Decryption reverses this process, converting ciphertext back to its original form.
By implementing robust cryptographic protocols, organizations fortify their defenses
against data breaches and unauthorized access, ensuring data confidentiality, integrity,
and authenticity in the digital landscape.

B. AIM OF THE PROJECT:


The project entitled “Encrypt and Decrypt Information using Cryptography” is aimed
to develop a Project of Network and information Technology.

C.INTENTED COURSE OUTCOME:


a) Identify risks related to Computer security and Information hazard in various
situations.
b) Apply user identification and authentication methods.
c) Apply cryptographic algorithms and protocols to maintain Computer Security.
d) Apply measures to prevent attacks on network using firewall.
e) Maintain secured networks and describe Information Security Compliance standards.

D.RESOURCES REQUIRED:

Name of Resource
Sr. No. Specification
Required
1 Laptop Intel (R) Core i3- 8GB RAM
2 Operating system Windows 11
3 Software Word
ACTION PLAN:

SR.NO. DETAIL OF ACTIVITY WEEK

1 Discussion and finalization of topic 04-01-2024

2 Preparation and submission of Abstract 18-01-2024

3 Literature Review 01-02-2024

4 Collection of Data 22-02-2024


5 Discussion and outline of Content 29-02-2024
6 Editing and proof Reading of Content 07-03-2024
7 Compilation of Report and Presentation 21-03-2024

8 Final submission of Micro Project 04-04-2024

GROUP MEMBERS:

Roll. No. Name of group members


27 Pratik Date
Annexure II
Part B- Micro-Project
1. Rationale

Computer network security is an important aspect in today's world. Now days due to various
threats designing security in organization is an important consideration. It is essential to
understand basic security principles, various threats to security and techniques to address
these threats. The student will be able to recognize potential threats to confidentiality,
integrity and availability and also able to implement various computer security policies. This
course will introduce basic cryptographic techniques, fundamentals of computer/network
security, Risks faced by computers and networks, security mechanisms, operating system
security, secure System design principles, and network security principles. Also it will create
awareness about IT ACT and different Cyber laws.

2. Course Outcome Addressed


b) Apply user identification and authentication methods.
c) Apply cryptographic algorithms and protocols to maintain Computer Security.

3. Actual Method Followed

The process for this micro project is to make a “Encrypt and Decrypt Information
using Cryptography”.
We collect information and organize by following points:
1. Collect the information on Overview Management.

2. Show the information to faculty.

3. First make a raw report and then correct it.

4. Then prepare a project on “Encrypt and Decrypt Information using Cryptography”

5. Make a presentation on the Encrypt and Decrypt Information using Cryptography.

6. Make pdf of report and print it.

7. We learn more about Network Information Security.


ANNEXURE III
Evaluation Sheet for the Micro Project
Academic Year: 2023-2024 Name of the Faculty: Mrs. J. C. Joshi
Course: Network Information Security Course Code: 22620 Semester: Six

Title of the project: “Encrypt and Decrypt Information using Cryptography”

COs addressed by Micro Project:

S. No Course Outcomes
A Identify risks related to Computer security and Information hazard in various
situations.
B Apply user identification and authentication methods.

Major learning outcomes achieved by students by doing the project

(a) Practical outcome:


a.Write a program to implement Caesar Cipher.

b.Write a program to implement Vernam Cipher.

c.Write a program to implement Rail fence technique.

d.Write a program to implement Simple Columnar Transposition technique this is a


secure mail

(b) Unit outcomes in Cognitive domain:


3a. Encrypt/Decrypt the given 3.1 Introduction text using different substitution
techniques.
3b. Convert plain text to cipher text and vice versa using the given transposition
technique.
3d. Explain the given technique of cryptography using example.
Comments/suggestions about team work /leadership/inter-personal communication (if any)
…………………………………………………………………………………………
Marks out of 6 for Marks out of 4 for
Roll performance in performance in
No Name of the Student group activity oral/ presentation Total Marks out
(D5 Col.8) (D5 Col.9) of 10

27 Pratik Date

(Name & Signature)

You might also like