More than 3000 engineers find our updates useful. You can get them at your mail box!
Search your paper presentation and project titles:

Department/Area of interest: ( To list the projects / paper presentations)

Mechanical               Scada technology              Communication             Computer science           Alternative energy
Electrical                  Robotics                        Biometrics                     Artificial intelligence             Electronics

CSE final year engineering projects: Cryptography technique.

Title: New generation cryptography technique.
Department: Computer science engineering (CSE projects), information technology (IT projects).
Can be used for: Final year engineering projects, research purposes and paper presentation for students.

The project is with the complete thesis attached to it at the bottom of the post. This project is an good choice for the computer science engineering students, who are searching for a good topic in the information security side. Most engineers will have the experience of coming across papers on networks and security. In those papers, cryptography is one of the most important and interesting topic. Cryptography projects are real fun to have your hand on. It is a science of using the maths to hide (encrypt) and unhide (decrypt) data. Using this technique only all are data are claimed to be secure through out the networks.

Sample of the attached CSE project: SAFER+ is a substitution-linear transformation network based on the SAFER family of ciphers. There are 8, 12, or 16 rounds, depending on the key size, plus an output transformation after the final round. The round function consists of key-controlled substitution on the sixteen bytes of the data block followed by an invertible linear transformation on the entire data block. The substitution function acts on each individual byte with a combination of key addition, key XOR, and either a fixed permutation or its inverse. The permutation corresponds to discrete exponentiation of a fixed generator in the multiplicative group of integers modulo 257. The linear transformation is generated by a combination of the Pseudo-Hadamard Transform matrix and the Armenian Shuffle permutation. The decryption routine is derived from the encryption routine by inverting each step.

Download this CSE engineering final year project
The New generation cryptography technique details here:

Intense Debate Comments