Académique Documents
Professionnel Documents
Culture Documents
Guided by:
Presented by:
Abstract
Existing system
DECRYPTION:
PROBLEM
Highly secured data Transfer with Encryption &
Compression Techniques
while sending and
Decryption & Decompression techniques while
receiving the data.
Proposed system
ARCHITECTURE DIAGRAM
Sender site
Receiver site
INPUT
OUTPUT
Plain
text
ENCRYPTION
DECOMPRESSION
COMPRESSION
unicode
10s
complemen
t
Pseudo
key
Logical
operation
2s
complemen
t
Bit
shuffling
compressio
n
Ciphered
text
Decompres
s/cipher
text
Decryption Algorithm:
Step 1: Start
Step 2: Input the Cipher-text and Encrypted key seed
value.
Step 3:Decompress the Cipher-text input value.
Step 4: Decrypt the key seed value and generate the key
values using key generation algorithm.
Step 5: Apply the Encryption Algorithm in reverse
direction.
Step 6:Retrieve the plaintext message.
WORKING MODEL
Plain text:
In this module the plaint text from sender site is used
as input for the next module.
Unicode :
In this module the input plain text is converted into
unicode value .
10s complement:
In this module the unicode value is translated with
10s complement for making security at first level.
Compression:
To provide the higher level of security the value after
bit shuffling is compressed.
Output:
The final output is given in Cipher-text .
Decryption:
Input the ciphered text and apply the above modules
in
reverse direction.
The resulting value is retrieved as plain text.
Chart
Compression Efficiency:
Compression Efficiency
Original File Size
TIME TAKEN
6463
3750
3453
2031
0
1
0
2
0
3
780
0
4
0
5
7000
6000
5000
4000
3000
2000
1000
0
Conclusion
Result
Original file
Encrypted file
Decrypted file
Thank you