ENCRYPTION AND DECRYPTION
Submitted by
LOGANATHAN.M
920322104025
In partial fulfillment for the award of the degree
BACHELOR OF ENGINEERING IN
COMPUTER SCIENCE AND ENGINEERING
SB8026 - ROBOTIC PROCESS AUTOMATION DEVELOPMENT
NAAN MUDHALVAN
CHRISTIAN COLLEGE OF ENGINEERING AND
TECHNOLOGY
ODDANCHATRAM - 624619
NOVEMBER 2024
Supervised by
V. KEERTHIKA , M.E
BONAFIDE CERTIFICATE
This is to certify that the project report titled " Encryption and Decryption" is the
bonafide work of LOGANATHAN.M(920322104025)who carried out the
project work under my supervision in the Naan Mudhalvan Lab.
SIGNATURE SIGNATURE
HEAD OF THE DEPARTMENT FACULTY
Department of Computer Science and Engineering,
CHRISTIAN COLLEGE OF ENGINEERING AND TECHNOLGY
ODDANCHATRAM-624619
INTERNAL EXAMINAR EXTERNAL EXAMINAR
ACKNOWLEDGEMENT
I extend my heartfelt gratitude to V.KEERTHIKA, M.E. Co-ordinated of
Robotic Process Automation Development Naan Mudhalvan, for her guidance
and support throughout this project. I also thank my peers and family for their
encouragement, without which this project would not have been possible.
I extend my sincere thanks to all teaching and non-teaching staff of the
Department of Computer Science and Engineering and my peers for their support
and encouragement.
I am deeply grateful to Dr.C.SUNDAR, M.E., Ph.D., Head of the Department,
for her constant support and guidance.
Finally, I thank my family and friends, whose encouragement and patience
motivated me to complete this project successfully.
LOGANATHAN.M(920322104025)
ABSTRACT
The Encryption and Decryption automation using UiPath is designed to
streamline the process of entering spreadsheet data into a web form. The system
dynamically adapts to changing field positions on the form after each
submission, ensuring accuracy and reliability. The automation leverages UiPath’s
advanced features like dynamic selectors, Excel integration, and retry
mechanisms to handle the challenges posed by real-time changes in the web form
layout. The solution improves productivity and reduces manual intervention.
TABLE OF CONTENTS
1. Introduction
o 1.1 Problem Statement
o 1.2 Objectives
o 1.3 Challenges
2. System Requirements
o 2.1 Hardware Requirements
o 2.2 Software Requirements
3. System Design
o 3.1 System Architecture
o 3.2 Workflow Design
4. Implementation
o 4.1 Setup Environment
o 4.2 Workflow Creation
o 4.3 Dynamic Selectors
5. Features of the System
6. Testing and Results
7. Future Enhancements
8. Conclusion
Introduction:
1.1 Problem Statement:
Highlight the challenges associated with securing sensitive data,
such as unauthorized access, data breaches, or lack of encryption
protocols in existing systems.
1.2 Objectives:
1.Ensure secure data transmission using encryption and
decryption mechanisms.
2.Provide a scalable API for seamless integration of encryption
services into applications.
3.Guarantee confidentiality and integrity of user data.
1.3 Challenge:
Explain how APIs facilitate standardized, scalable, and
interoperable encryption/decryption services, enabling applications
to implement security without developing algorithms from scratch.
2. System Requirements
2.1 Software Requirements:
Programming language (e.g., Python, Java).
Libraries/Frameworks:
Cryptography libraries (e.g., PyCryptodome, OpenSSL).
Tools: Postman for API testing, Docker for deployment (optional).
2.2 Hardware Requirements:
Minimum specifications:
4 GB RAM, dual-core processor for development.
Server/Cloud infrastructure for production:
Secure storage and fast processing.
3. System Design
3.1 System Architecture:
Include encryption and decryption modules as core
components.
A flow diagram illustrating how input data is encrypted and
decrypted through API endpoints.
Interaction with a database (if applicable) to store encrypted
data securely.
3.2 Workflow Design:
User sends a request to encrypt or decrypt data through the
API.
API processes the request, applies encryption/decryption
algorithms, and returns the result.
Optional: Add logging or auditing features for tracking usage.
4. Implementation
4.1 Setup Environment:
Install required software (Python, Flask, etc.).
Configure cryptography libraries and initialize API
framework.
4.2 Create the Workflow:
Define encryption/decryption algorithms (e.g., AES, RSA).
Set up API endpoints for encrypting and decrypting data.
4.3 Configure API Call:
Define request payloads for encryption (e.g., plaintext and
encryption key).
Provide response formats (e.g., encrypted data in Base64 or
Hex format).
Secure API with HTTPS and token-based authentication.
5. Features of the System
5.1 Mock User Data Generation:
Simulate input data (e.g., plain text, sensitive information)
for testing encryption and decryption.
5.2 Free and Accessible:
Open-source implementation.
Easy-to-use endpoints with comprehensive documentation
for developers.
6. Testing and Results
6.1 Test Cases:
Validate encryption by comparing the output for the same
plaintext and key.
Test decryption to ensure accurate retrieval of the original data.
Check for edge cases like invalid keys or corrupted data.
6.2 Response Structure:
Encryption API: { "encrypted_data": "<Base64 String>" }
Decryption API: { "decrypted_data": "<Original Text>" }
7. Future Enhancements
7.1 Advanced Filtering:
Introduce options to encrypt only specific parts of data (e.g.,
sensitive fields in JSON).
7.2 Batch Data Processing:
Support batch encryption/decryption for large datasets to
improve performance.
8. Conclusion
Summarize the success of implementing a secure, efficient
encryption/decryption API. Discuss its benefits in ensuring data
privacy and suggest further improvements to adapt to evolving
security standards.
REFERENCES:
1. UiPath Official Documentation
Comprehensive guide to activities like Read Range, For Each Row,
Dynamic Selectors, and Retry Scope.
Link: UiPath Documentation
2. RPA Challenge Official Website
The dynamic web form used in this project, designed to test RPA
capabilities in handling changing field positions.
Link: RPA Challenge