PAF-Karachi Institute of Economics & Technology                 Final Project ReportProject: Encrypter/Decrypter          ...
DEDICATION                               This report is dedicated to                                     Our Parents,     ...
ACKNOWLEDEMENT                 Praise to Allah the most beneficent and the most mercifulWe are grateful to our project adv...
Table of ContentsEncrypter/Decrypter ........................................................................................
Encrypter/Decrypter                      5
Objective:The main objective of this project was to develop an encrypter/decrypter using differentencryption techniques in...
originator of the message, and that the message has not been subsequently altered byanyone else, because the sender alone ...
on. The method is named after Julius Caesar, who used it in his private       correspondence.       Example:       Text:  ...
Morsecode Cipher Text: .. / .- -- / ... .- .-.. -- .- -.This is a table of all the Morse Code translationsA .-B -...C -.-....
Refrences:     Cryptography & Network Security- Course Book     Google                                                    10
Upcoming SlideShare
Loading in...5
×

Network Security

444

Published on

Encrypter

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
444
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Network Security

  1. 1. PAF-Karachi Institute of Economics & Technology Final Project ReportProject: Encrypter/Decrypter Course: Network Security C.Id:55911 Instructor: Ma’m Seema AnsariGroup Members: Salman Khaliq Bajwa (3746) Pawan Khan (4236) 1
  2. 2. DEDICATION This report is dedicated to Our Parents, Whose love, affection and support helped s in bringing our work to this level ofaccomplishments; we are also thankful to them for educating us for unconditional support and encouragement to pursue our interests, even when the interest went beyond the boundaries of field and scope. Without their support and kindness this work would not have been possible. 2
  3. 3. ACKNOWLEDEMENT Praise to Allah the most beneficent and the most mercifulWe are grateful to our project advisor Ma’m Seema Ansari, for enlightening us with herprecious knowledge and vast experience to benefit us in the future. We also like to thankour teachers and lab assistants for their assistance and support.We would also thank with all gratitude and depth of our hearts to our parents who helpedus not only financially but with integrity too and support us in all our hardships. Finallyour sincere thanks to our institute PAF-KIET, for providing us the opportunity to gave usthe strength to undertake this project.Special thanks to all our fellows and friends who lend us a hand throughout the project’seach phase.We pray this effort may prove to be the beginning of new era, a era in which Science andTechnology may make great progress in Pakistan and Pakistan may become a part of thedeveloped nations.Thank you. 3
  4. 4. Table of ContentsEncrypter/Decrypter ..........................................................................................................................5Objective: ..........................................................................................................................................6Introduction: .....................................................................................................................................6What is encryption? ...........................................................................................................................6Why do we need it? ...........................................................................................................................6What is Decryption?...........................................................................................................................7Description: .......................................................................................................................................7 1. Ceaser Cipher:.........................................................................................................................7 2. Transposition Cipher: ..............................................................................................................8 3. Morsecode Cipher: ..................................................................................................................8 4. Vigenere Cipher: .....................................................................................................................9 Vigenere Cipher Table: ................................................................................................................9Conclusion: ........................................................................................................................................9Refrences: ....................................................................................................................................... 10 4
  5. 5. Encrypter/Decrypter 5
  6. 6. Objective:The main objective of this project was to develop an encrypter/decrypter using differentencryption techniques in order to prevent the messages or information from loosing oreavesdropping.Introduction:Maintaining privacy in our personal communications is something everyone desires.Encryption is a means to achieve that privacy. It was invented for that purpose. Butencryption, like most things, can be used for good or evil. And the debate over how toharness this powerful tool rages on as people on both sides see that there are no easyanswers.What is encryption?Encryption is the process of scrambling a message so that only the intended recipient canread it. The actual cryptographic process is generally a complicated mathematicalformulation, the more complex -- the more difficult to break. A key is supplied to therecipient so that they can then decipher the message. Keys for encryption algorithms aredescribed in terms of the number of bits. The higher the number of bits - the more difficultthat cryptosystem would be to break.Why do we need it?Encryption can provide a means of securing information. As more and more information isstored on computers or communicated via computers, the need to insure that thisinformation is invulnerable to snooping and/or tampering becomes more relevant. Anythoughts with respect to your own personal information (ie. medical records, tax records,credit history, employment history, etc.) may bring to mind an area in which you do want,need or expect privacy. As teachers, we are often called upon to handle sensitive studentinformation. We need to have access to student records, but maintain the confidentiality oftheir information.Encryption is seen by many people as a necessary step for commerce on the internet tosucceed. Without confidence that net transactions are secure, people are unwilling to trusta site enough to transact any sort of business using it. Encryption may give consumers theconfidence they need to do internet business.Encryption can also provide a means of "message authentication". The PGP Users Guideexplains, "The senders own secret key can be used to encrypt a message thereby signing it.This creates a digital signature of a message. This proves that the sender was the true 6
  7. 7. originator of the message, and that the message has not been subsequently altered byanyone else, because the sender alone possesses the secret key that made that signature."This prevents forgery of that signed message, and prevents the sender from denying thesignature.E-mail is certainly not secure. While you may believe that the use of a password makesyour business private, you should be aware that sending information without encryptionhas been likened to sending postcards through the mail. Your message is totally open tointerception by anyone along the way. You may believe that your personal e-mail is notincriminating and does not contain content that you must keep secret, and you may beright. But there are many common situations, where users have a legitimate need forsecurity both to protect that information and to insure that information is not tamperedwith: Consumers placing orders with credit cards via the Internet, journalists protectingtheir sources, therapists protecting client files, businesses communicating trade secrets toforeign branches, ATM transactions, political dissenters, or whistle-blowers -- all areexamples of why encryption may be needed for e-mail or data files, and why it might benecessary to create a secure environment through its use.What is Decryption?Decryption is the opposite of encryption. When something is encrypted, the receiver needsto decrypt that in order to read the original information or message.Description:In our project in order to develop an encrypter/decrypter, we used four differentencryption techniques & algorithms namely; Ceaser Cipher Transposition Cipher Moscode Cipher Vinegar Cipher 1. Ceaser Cipher: In cryptography, a Caesar cipher, also known as a Caesars cipher, the shift cipher, Caesars code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so 7
  8. 8. on. The method is named after Julius Caesar, who used it in his private correspondence. Example: Text: Cipher text: I m salman l dp vdopdqThus, the Caesar cipher is a shift cipher since the ciphertext alphabet is derived from theplaintext alphabet by shifting each letter a certain number of spaces. For example, if we usea shift of 19, then we get the following pair of ciphertext and plaintext alphabets: Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext: T U V W X Y Z A B C D E F G H I J K L M N O P Q R S 2. Transposition Cipher: In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically obijective function is used on the characters positions to encrypt and an inverse function to decrypt. Example: The way the simplest of these works is by picking a matrix of a fixed size (say, 6x10) and then writing your message across the rows. e.g. I am Salman Bajwa (matrix 4). 0 1 2 3 I - a m - S a l M a n - B a j w - - a - 3. Morsecode Cipher: Morse Code, created by Samuel Morse, was designed to transmit letters across telegrams. He wanted frequently used letters to have short codes and less frequently used letters to have longer codes. When encrypting, only letters and numbers will be encoded and the rest will be treated like spaces. When decrypting, only periods and hyphens will be decoded and the rest will be treated like spaces. This web page uses International Morse Code with some additional enhancements, but without support for foreign characters. It also is geared to help you decode Morse Code snippets you find with the Reverse (flips the text) and Swap (exchanges periods and hyphens) links. e.g. I am Salman 8
  9. 9. Morsecode Cipher Text: .. / .- -- / ... .- .-.. -- .- -.This is a table of all the Morse Code translationsA .-B -...C -.-.D -..E .F ..-.G --.H ....I ..J .--- K -.-L .-..M --N -.O ---P .--.Q --.-R .-.S ...T - U ..-V ...-W .--X -..-Y -.--Z --..0 -----1 .----2 ..---3 ...-- 4 ....-5 .....6 -....7 --...8---..9 ----.. .-.-.-, --..--? ..--..- -....- = -...-: ---...; -.-.-.( -.--.) -.--.-/ -..-." .-..-.$ ...-..- .----.¶.-.-.. _ ..--.-@ .--.-.! ---.! -.-.--+ .-.-.~ .-...# ...-.-& . ...⁄ -..-. 4. Vigenere Cipher: The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.In a Caesar cipher, each letter of the alphabet is shifted along some number of places; forexample, in a Caesar cipher of shift 3, A would become D, B would become E, Y wouldbecome B and so on. The Vigenère cipher consists of several Caesar ciphers in sequencewith different shift values.Vigenere Cipher Table:Conclusion:In the end we were able to develop an encrypter & decrypter for the security purposes,Alhamdolilah. 9
  10. 10. Refrences: Cryptography & Network Security- Course Book Google 10

×