0% found this document useful (0 votes)
36 views

Project Proposal Template

Uploaded by

azeemnadeem327
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Project Proposal Template

Uploaded by

azeemnadeem327
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

CRYPTOGRAPHY APPLICATION

Session 2024 - 2028

Submitted by:
MUHAMMAD AZEEM AHMAD
2024-CS-63

Supervised by:
Dr. Awais Hassan
Course:
CSC-102 Programming Fundamentals

Department of Computer Science


University of Engineering and Technology
Lahore Pakistan

_____________________________________________________________________________________
Your Name & Registration No CSC-102 Programming Fundamentals
Project Title Here.
_____________________________________________________________________________________

● Description of Project:
Cryptography Application to encrypt and decrypt the
string using encryption algorithm that is Caesar Cypher. Cryptography application in
C++ involve implementing algorithms and techniques for securing communication,
ensuring data integrity, and protecting sensitive information.

o Objectives:
 Data Confidentiality
 Data Integrity
 Authentication
 Secure Communication
 Digital Signatures and Non-Repudiation
 Access Control and Secure Systems

o Contribution to the Field of Computer Science:


 Cryptography allows the encryption of data so that only those with the proper key can
decrypt and access it. This is crucial in protecting sensitive information such as
personal data, financial records, or trade secrets.
 Cryptographic hash functions (e.g., SHA-256, MD5) are used to verify the integrity
of data. Any modification to the original data will result in a completely different
hash, allowing systems to detect tampering or corruption.
 Cryptographic techniques such as digital signatures and public key infrastructure
(PKI) are used to authenticate users or systems, ensuring that they are who they
claim to be.
 Cryptography is fundamental for creating secure communication protocols like
SSL/TLS, VPNs (Virtual Private Networks), and end-to-end encryption used in
messaging applications.
 Digital signatures, created using cryptographic algorithms, provide proof of
authorship and prevent parties from denying sending a message or approving a
transaction.
 Cryptographic techniques, such as public key infrastructure (PKI) or zero-knowledge
proofs, are used to implement secure authentication mechanisms.

o Result:
 Encrypted Files.
 Decrypted Files.

_____________________________________________________________________________________
Your Name & Registration No
Project Title Here.
_____________________________________________________________________________________

● Users of Application:

● Functional Requirements
o Functional requirements are a detailed description of what a system, product, or
service must do to meet the needs and expectations
o Use the following format to write the Functional Requirements

User As a I want to perform So that I can


Story ID

1 Admin Calculate the Price. Calculate the Price of


product w.r.t. it's quantity.

● Wireframes
o A wireframe is a visual representation of a user interface, of an application, that is
used to plan and design the structure and layout of the interface.
o All wireframes should be command line format.

_____________________________________________________________________________________
Your Name & Registration No
Project Title Here.
_____________________________________________________________________________________

o For Example

Figure 1: LogIn Screen

Important Instructions
Figure 2: Admin Main Menu Screen

Formatting Instructions
1. Heading Size is 16
2. Sub heading size is 14
3. Further heading size is 13
4. Make your heading font bold
5. Text Font size in the paragraph is 12
6. Use Times New Roman Font Style
7. Text paragraphs should be justified. (Justify is feature of MS World)

Further Instructions
1. Discuss with your TAs in the PD about how to prepare the document.
2. Submit the soft form in google classroom till 20th October.

o Clearly state the problem you are trying to solve and the objective of your project.
Explain how your project will contribute to the field of computer science and why
it is important. Specify the outputs or results you expect to deliver at the end of
your project.

_____________________________________________________________________________________
Your Name & Registration No

You might also like