Software engineer Computer Science

Develop an Encryption algorithm that can encrypt and decrypt the data without sharing their key

If suppose there are three parties A & B. A gets hash of his data and encrypts with a random key and then pushes to a common platform. Now B should be able to decrypt and get hash of the data without seeking the public key of A.

Certified by

731245766 640
Play button

Timeline

30 days

Certificate

Provided by the Company after Review

Incentives

Internship Opportunity

Expected Output

  1. A report on Cryptography (Encryption and Decryption)    Pdf
  2. An executable model showing a demo of encrypting and decrypting the data. (The data could be in a cloud platform - For reference, CASE algorithm)    Link

Why take up this Menternship?

On completing this Menternship, you will learn about

    1. Encryption and Decryption of data
    2. Cloud Platforms

About this Menternship

As we are getting digitalised, there is a huge data being moved into cloud and public platforms. The insider attacks in cloud or snooping into the data for various reasons has been on increase. Encryption of the data has become the need of the hour to protect the data from those attacks. Regarding the Menternship, suppose there are two parties A & B. A gets hash of  its data and encrypts it with a random key and then pushes to a common platform. Now, B should be able to decrypt and get hash of the data without seeking the public key of A. 



Develop an Encryption algorithm that can encrypt and decrypt the data without sharing their key