You are on page 1of 7

A Project

Report on

DNA & AMINO ACID BASED


PLAYFAIR IMPLEMENTATION
Submitted in partial fulfilment of the requirement for the award of Degree of
Bachelor of Technology in Information Technology

Submitted To

UTTAR PRADESH TECHNICAL UNIVERSITY


LUCKNOW (U.P)
Submitted By
Sumedha Chaturvedi (1112813059)
Vishal Thakur (1112813069)
Parul Gupta (1112813041)
Archit Goyal (1112813013)
Under the Guidance of
Mr. Anubhav Sharma
(Asstt. Professor)

Department of Information Technology


BHARAT INSTITUTE OF TECHNOLOGY
By Pass Road, Partapur, Meerut (U.P) 250103 Session 2014-15

BHARAT INSTITUTE OF TECHNOLOGY


By Pass Road, Partapur, Meerut (U.P) - 250103

DEPARTMENT OF INFORMATON TECHNOLOGY


CERTIFICATE
This is to certify that the Project Report entitled DNA & AMINO ACID BASED
PLAYFAIR IMPLEMENTATION

being

submitted by Sumedha Chaturvedi

(1112813059) Vishal Thakur (1112813069) Parul Gupta (1112813041) Archit Goyal


(1112813013) in partial fulfilment of the requirement for the award of Bachelor of
Technology Degree in I n f o r m a t i o n

Tec h n o l o g y from Uttar Pradesh

Technical University, Lucknow (U.P) during the academic year 2014-15 is a record of
bonafide piece of work as per best of my knowledge , carried out by them under my
supervision and guidance in the Department of Information Technology, Bharat
Institute of Technology, Meerut (U.P).

Mr. Anubhav Sharma

Mr. Raj Kumar

Mr. Sudeep Tanwar

Project Guide

Project Coordinator

HOD IT

BIT, MEERUT

BIT, MEERUT

BIT, MEERUT

The External Project Viva voice examination has been held on


.........................

Signature of Internal Examiner


Date:

Signature of External Examiner


Date:

DECLARATION
I hereby declare that this submission is my own work and that, to the best of my knowledge
and belief, it contains no material previously published or written by another person nor
material which to a substantial extent has been accepted for the award of any other degree or
diploma of the university or other institute of higher learning, except where due
acknowledgment has been made in the text.

Date:

Sumedha Chaturvedi

Vishal Thakur

(1112813059)

(1112813069)

Parul Gupta

Archit Goyal

(1112823041)

(1112813013)

ACKNOWLEDGEMENT

It gives us a great sense of pleasure to present the report of the Project Work, undertaken during
B.Tech Final Year. We owe special debt of gratitude to our project guide, Mr. Anubhav
Sharma, Asstt. Professor for his constant support and guidance throughout the course of our
work. His sincerity, thoroughness and perseverance have been a constant source of inspiration
for us. It is only his cognizant efforts that our endeavours have seen light of the day.
We take the opportunity to acknowledge the contribution of Mr. Sudeep Tanwar Associate
Professor, Head Of Department of Information Technology, Bharat Institute of Technology,
Meerut for his full support and assistance during the development of the project.
We also do not like to miss the opportunity to acknowledge the contribution of all faculty
members of the department for their kind assistance and cooperation during the development of
our project.
Last but not the least; we acknowledge our friends and family for their contribution in the
completion of the project.

Sumedha Chaturvedi

Vishal Thakur

(1112813059)

(1112813069)

Parul Gupta

Archit Goyal

(1112823041)

(1112813013)

Date:

ABSTRACT

This project provides a system for encrypting data that is based on modifying a simple
algorithm, which in this case is the Playfair Cipher .
The main purpose behind our project is to discover new fields of encoding the data in addition
to the conventional used encryption algorithm in order to make decryption more typical and
therefore implementing more security.

There are two types of users that is


A. Sender (Encryption)
B. Receiver (Decryption)

In this system , user can encipher their confidential code and messages which has to be sent ,
and through this system , the confidentiality of the message or code can be easily maintained.
The system will be such that the cipher is rendered passive to cryptanalysis. Our new
modifications will make playfair a more powerful and secure encryption algorithm.

TABLE OF CONTENT
1. Introduction.............................................................................................................
1.1 Objective
1.2 Scope
2. Existing System.....................................................................................................
2.1 Proposed System
2.2 Algorithm Used
3. System Analysis and Design...................................................................................
3.1 Encryption Module
3.2 Decryption Module
4. Technology To Be Used.........................................................................................
5. System Requirements ............................................................................................
5.1 Minimum Hardware Required for Development
5.2 Minimum Software Required for Development
6. System Planning
7. Methodology Adopted And System Implementation............................................
8. Detailed Life Cycle Of Project..............................................................................
8.1 Data Flow Diagram
8.2 Context Level DFD or Zero Level DFD
8.3 One Level DFD
8.4 Flowchart
9. Input Output And Screening Design.....................................................................
10. Methodology Used For Testing..........................................................................
10.1 Testing
10.2 Testing Methodologies
10.3 Test Planning

10.4 Result Analysis


10.5 TCD
10.6 Functional Testing
10.7 Structural Testing
10.8 Stress Testing
11. Coding...........................................................................................................................
12. Future Scope ........................................................................................................... ....
13. Conclusion ..................................................................................................................

LIST OF FIGURES

4.1 System Architecture..................................................................................................


6.1 Pert Chart
6.2 Gantt Chart..
7.1 Iterative Waterfall Model.
8.1 Context Level DFD..
8.3 One Level DFD....
8.4 One Level DFD...

You might also like