SlideShare a Scribd company logo
1 of 20
A NOVEL ENCRYPTION TECHNIQUE BASED ON
PASCAL’S TRIANGLE AND SIERPINSKI TRIANGLE
Project by
K.ROSHINI
MCA IV Semester
PG202102025
T.TEJASWI
MSc(Computer Science)
IV Semester
PG202106016
Under Guidance of
Dr. D.CHANDRAVATHI
HEAD OF THE DEPARTMENT(M.SC)
& ASSOCIATE PROFESSOR
 Abstract
 Introduction
 Problem Statement
 Existing System
 Proposed System
 Algorithm
 Example
 Conclusion
CONTENTS
ABSTRACT
Text messages are often created and shared among different users. Because of its frequent
usage those messages are not been encrypted. Thus it is unable to send confidential messages via
SMS service. In this project, a new encryption technique using the notions of Pascal’s Triangle and
Sierpinski Triangle is introduced. The proposed method uses the Pascal’s triangle for substitution
and Sierpinski triangle for permutation. The method is simple and easy to implement in real time.
It is difficult for the attackers to predict the original message contained in the ciphertext. The
proposed method is not much vulnerable to brute force and letter frequency attacks.
Due to the availability and abundant use of technology, sending of short text messages between
the communicating users has increased in domain such as social media, messaging apps, e-mails.
Some messages in those domains are confidential and sensitive for the communicating persons.
Hence, providing confidential to those messages is important.
Confidential service can be provided by mechanisms like encipherment.
Transposition and Substitution methods are used to encrypt and decrypt text messages.
In this project, a new substitution and permutation based technique to encrypt/decrypt text
messages using the concept of Pascal and Sierpinski triangle is proposed.
The notion of Pascal triangle is used to perform XOR operation on the characters of plaintext
message in a particular pattern and then permutation is done to get the ciphertext.
INTRODUCTION
EXISTING SYSTEM
Quantum Cryptography enables users to communicate more securely compared to
traditional cryptography. After keys are exchanged between the involved parties, there
is little concern that a malicious actor could decode the data without the key . If the key
is observed when it is being constructed , the expected outcome changes, alerting both
sender and the receiver.
PROPOSED SYSTEM
The proposed encryption method uses the Pascals triangle concept as substitution and Sierpinski
triangle concept as permutation to encrypt the data.
Initially, the characters of the plaintext are arranged in triangle format.
Then by using the Pascal principle the characters are XORed bitwise to get a new cipher character.
Subsequently permutation technique is applied using sierpinski triangle to get the final encrypted
message.
PASCAL TRIANGLE
Pascal's triangle is a triangular array of the binomial coefficients. The entries in each row are
numbered from the left beginning with k = 0 and are usually staggered relative to the numbers in the
adjacent rows. Having the indices of both rows and columns start at zero makes it possible to state that the
binomial coefficient (nk) appears in the nth row and kth column of Pascal's triangle.
SIERPINSKI TRIANGLE
In Sierpinski triangle, the characters at the odd positions are written first and then the even position
characters. A sample of Sierpinski triangle shown below
ENCRYPTION ALGORITHM
Input: Plaintext
Step 1: Let the message to be encrypted in the matrix[m, m] as triangle 1.
At sender side, the characters of the plain text are arranged row wise in the triangular pattern
(Triangle-1).
Step 2: Develop another triangle, triangle 2, based on the concept of Pascal triangle. i.e., the corner
characters are XOR’ed with 0 and the middle characters are XORed with the neighboring characters.
Step 3: Add characters in triangle 1 with triangle 2 for substitution.
Step 4: Repeat step 3 until all the characters in the matrix are processed.
Step 5: Read the characters based on the concept of sierpinski triangle to accomplish permutation.
Step 6: Store the encrypted text.
Output: Ciphertext.
EXAMPLE : ENCRYPTION
STEP 1:Let us take the plaintext message “ROSHINIPGMCA”.
STEP 2: We need to place the characters of plaintext message is shown below. Padding character, in this
case x‟ is appended at the end to complete the triangle.
Triangle 1
A B C D E F G H I J
0 1 2 3 4 5 6 7 8 9
K L M N O P Q R S T
10 11 12 13 14 15 16 17 18 19
U V W X Y Z
20 21 22 23 24 25
STEP 3:Based on the concept of Pascal triangle, the corner
characters are XORed with 0 and the middle values are XORed
with neighboring characters using vigenere cipher.
Ci = (Pi + Ki) mod 26
(0R )+ O
0 = 00000
R = 10001(17)
Now we need to perform XOR for 0 AND R
0R = 10001=17.
17 17+14(we have O value 14) = 31
Now we do mod operation
31 mod 26 = 5
Now we need to check the 5 in the table
5=F
ENCRYPTION EXAMPLE
(0R)+O
=F
(R0)+S
=J
(0F)+H
=M
(FJ)+I
=U
(J0)+N
=W
(0M)=I
=U
(MU)+P
=N
(UW)+G
=I
(W0)+M
=I
(0U)+C
=W
(UN)+A
=Z
(NI)+X
=C
(II)+X
=C
(I0)+X
=F
Triangle 2
Ci = (Pi + Ki) mod 26
(F^J)+I
F=0101(5)
J=1001(9)
Now we need to perform XOR for F AND J
FR= 1100=12.
12 12+8=20
Now we do mod operation
20 mod 26 = 20
Now we need to check the 20 in the table
20=U
ENCRYPTION EXAMPLE
ENCRYPTION EXAMPLE
Cipher text 1: RFJMUWUNIIWZCXF
ENCRYPTION EXAMPLE
In Sierpinski triangle, the characters at the odd positions are
written first and then the even position characters.
RFJMWUNIIWFUZCX
Ciphertext:2
Sierpinski triangle
DECRYPTION ALGORITHM
Input : Cipher Text
Step1: Read the characters based on the concept of sierpinski triangle to accomplish permutation.
Step2: Let the message to be decrypted in the matrix [m , m] as triangle 1.
At receiver side the characters of the cipher text are arranged row wise in the triangular pattern.
Step3: Develop another triangle, triangle 2,based on the concept of pascal triangle. i.e., the
corner characters are Xored with 0 and the middle characters are xored with the neighbouring
characters.
Step4: Apply vigenere cipher decryption for 1&2 triangles and perform substitution.
Output: Plain text
EXAMPLE:DECRYPTION
 STEP 1: Take the cipher text message” RFJMWUNIIWFUZCX”.
 STEP 2: We need to place the characters of cipher text message is
shown in the cipher text triangle-1.
 STEP 3: The cipher text is arranged according to the Sierpinski
Rule
RFJMWUNIIWFUZCX
EXAMPLE: DECRYPTION
STEP 3:Based on the concept of Pascal triangle,
the corner characters are XORed with 0 and the
middle values are XORed with neighboring
characters using vigenere cipher.
Ci = (Pi -Ki) mod 26
0 = 00000
R = 10001
Now we need to perform XOR for O AND R
0R = 10001=17.
F=5
F-(0R)=5-17=-12
Now we need to do the mod operation
-12 mod 26 = 14=O
Triangle-2
A B C D E F G H I J
0 1 2 3 4 5 6 7 8 9
K L M N O P Q R S T
10 11 12 13 14 15 16 17 18 19
U V W X Y Z
20 21 22 23 24 25
F-(0R)
=O
J-(R0)
=S
M-(0F)
=H
U-(FJ)
=I
W-(J0)
=N
U-(0M)
=I
N-(MU)
=P
I-(UW)
=G
I-(W0)
=M
W-(0U)
=C
Z-(CN)
=X
C-(NI)
=X
X-(II)
=X
F-(I0)
=X
DECRYPTION EXAMPLE
Decrypted Triangle
Plain text : ROSHINIPGMCA
CONCLUSION
In this project, a new cryptosystem to encrypt/decrypt text messages by using Pascal and
Sierpinski triangles is developed. The method is very simple and easy to implement because it
involves permutation and substitution techniques for encryption. The characters of the plaintext
are transformed to random characters after substitution and the ciphertext are randomly shuffled
by using permutation. The proposed encryption method satisfies both confusion and diffusion
properties significantly. The messages encrypted using the proposed method is not much
vulnerable to cryptanalysis and letter frequency attacks.
THANK YOU

More Related Content

Similar to Roshini project 1st Review.pptx

Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
Problem 2.19. How much time is required to add or subtract two large.pdf
Problem 2.19. How much time is required to add or subtract two large.pdfProblem 2.19. How much time is required to add or subtract two large.pdf
Problem 2.19. How much time is required to add or subtract two large.pdfJUSTSTYLISH3B2MOHALI
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEIJNSA Journal
 
Optimization and simulation of a New Low Density Parity-Check Decoder using t...
Optimization and simulation of a New Low Density Parity-Check Decoder using t...Optimization and simulation of a New Low Density Parity-Check Decoder using t...
Optimization and simulation of a New Low Density Parity-Check Decoder using t...IJERA Editor
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2IAEME Publication
 
Ceng232 Decoder Multiplexer Adder
Ceng232 Decoder Multiplexer AdderCeng232 Decoder Multiplexer Adder
Ceng232 Decoder Multiplexer Addergueste731a4
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...sipij
 
A design of parity check matrix for short irregular ldpc codes via magic
A design of parity check matrix for short irregular ldpc codes via magicA design of parity check matrix for short irregular ldpc codes via magic
A design of parity check matrix for short irregular ldpc codes via magicIAEME Publication
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
Computation of electromagnetic fields scattered from dielectric objects of un...
Computation of electromagnetic fields scattered from dielectric objects of un...Computation of electromagnetic fields scattered from dielectric objects of un...
Computation of electromagnetic fields scattered from dielectric objects of un...Alexander Litvinenko
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptographyinventy
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...Alexander Decker
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...Alexander Decker
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...Alexander Decker
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftAlexanderCominsky
 

Similar to Roshini project 1st Review.pptx (20)

Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
Problem 2.19. How much time is required to add or subtract two large.pdf
Problem 2.19. How much time is required to add or subtract two large.pdfProblem 2.19. How much time is required to add or subtract two large.pdf
Problem 2.19. How much time is required to add or subtract two large.pdf
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
 
Optimization and simulation of a New Low Density Parity-Check Decoder using t...
Optimization and simulation of a New Low Density Parity-Check Decoder using t...Optimization and simulation of a New Low Density Parity-Check Decoder using t...
Optimization and simulation of a New Low Density Parity-Check Decoder using t...
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2
 
Ceng232 Decoder Multiplexer Adder
Ceng232 Decoder Multiplexer AdderCeng232 Decoder Multiplexer Adder
Ceng232 Decoder Multiplexer Adder
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...
 
A design of parity check matrix for short irregular ldpc codes via magic
A design of parity check matrix for short irregular ldpc codes via magicA design of parity check matrix for short irregular ldpc codes via magic
A design of parity check matrix for short irregular ldpc codes via magic
 
con-dif2
con-dif2con-dif2
con-dif2
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
ICIECA 2014 Paper 12
ICIECA 2014 Paper 12ICIECA 2014 Paper 12
ICIECA 2014 Paper 12
 
Computation of electromagnetic fields scattered from dielectric objects of un...
Computation of electromagnetic fields scattered from dielectric objects of un...Computation of electromagnetic fields scattered from dielectric objects of un...
Computation of electromagnetic fields scattered from dielectric objects of un...
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptography
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
 
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
1.[1 6] a novel papr reduction scheme based on selective mapping and a random...
 
NCM RB PAPER
NCM RB PAPERNCM RB PAPER
NCM RB PAPER
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
 

Recently uploaded

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 

Recently uploaded (20)

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 

Roshini project 1st Review.pptx

  • 1. A NOVEL ENCRYPTION TECHNIQUE BASED ON PASCAL’S TRIANGLE AND SIERPINSKI TRIANGLE Project by K.ROSHINI MCA IV Semester PG202102025 T.TEJASWI MSc(Computer Science) IV Semester PG202106016 Under Guidance of Dr. D.CHANDRAVATHI HEAD OF THE DEPARTMENT(M.SC) & ASSOCIATE PROFESSOR
  • 2.  Abstract  Introduction  Problem Statement  Existing System  Proposed System  Algorithm  Example  Conclusion CONTENTS
  • 3. ABSTRACT Text messages are often created and shared among different users. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service. In this project, a new encryption technique using the notions of Pascal’s Triangle and Sierpinski Triangle is introduced. The proposed method uses the Pascal’s triangle for substitution and Sierpinski triangle for permutation. The method is simple and easy to implement in real time. It is difficult for the attackers to predict the original message contained in the ciphertext. The proposed method is not much vulnerable to brute force and letter frequency attacks.
  • 4. Due to the availability and abundant use of technology, sending of short text messages between the communicating users has increased in domain such as social media, messaging apps, e-mails. Some messages in those domains are confidential and sensitive for the communicating persons. Hence, providing confidential to those messages is important. Confidential service can be provided by mechanisms like encipherment. Transposition and Substitution methods are used to encrypt and decrypt text messages. In this project, a new substitution and permutation based technique to encrypt/decrypt text messages using the concept of Pascal and Sierpinski triangle is proposed. The notion of Pascal triangle is used to perform XOR operation on the characters of plaintext message in a particular pattern and then permutation is done to get the ciphertext. INTRODUCTION
  • 5. EXISTING SYSTEM Quantum Cryptography enables users to communicate more securely compared to traditional cryptography. After keys are exchanged between the involved parties, there is little concern that a malicious actor could decode the data without the key . If the key is observed when it is being constructed , the expected outcome changes, alerting both sender and the receiver.
  • 6. PROPOSED SYSTEM The proposed encryption method uses the Pascals triangle concept as substitution and Sierpinski triangle concept as permutation to encrypt the data. Initially, the characters of the plaintext are arranged in triangle format. Then by using the Pascal principle the characters are XORed bitwise to get a new cipher character. Subsequently permutation technique is applied using sierpinski triangle to get the final encrypted message.
  • 7. PASCAL TRIANGLE Pascal's triangle is a triangular array of the binomial coefficients. The entries in each row are numbered from the left beginning with k = 0 and are usually staggered relative to the numbers in the adjacent rows. Having the indices of both rows and columns start at zero makes it possible to state that the binomial coefficient (nk) appears in the nth row and kth column of Pascal's triangle.
  • 8. SIERPINSKI TRIANGLE In Sierpinski triangle, the characters at the odd positions are written first and then the even position characters. A sample of Sierpinski triangle shown below
  • 9. ENCRYPTION ALGORITHM Input: Plaintext Step 1: Let the message to be encrypted in the matrix[m, m] as triangle 1. At sender side, the characters of the plain text are arranged row wise in the triangular pattern (Triangle-1). Step 2: Develop another triangle, triangle 2, based on the concept of Pascal triangle. i.e., the corner characters are XOR’ed with 0 and the middle characters are XORed with the neighboring characters. Step 3: Add characters in triangle 1 with triangle 2 for substitution. Step 4: Repeat step 3 until all the characters in the matrix are processed. Step 5: Read the characters based on the concept of sierpinski triangle to accomplish permutation. Step 6: Store the encrypted text. Output: Ciphertext.
  • 10. EXAMPLE : ENCRYPTION STEP 1:Let us take the plaintext message “ROSHINIPGMCA”. STEP 2: We need to place the characters of plaintext message is shown below. Padding character, in this case x‟ is appended at the end to complete the triangle. Triangle 1
  • 11. A B C D E F G H I J 0 1 2 3 4 5 6 7 8 9 K L M N O P Q R S T 10 11 12 13 14 15 16 17 18 19 U V W X Y Z 20 21 22 23 24 25 STEP 3:Based on the concept of Pascal triangle, the corner characters are XORed with 0 and the middle values are XORed with neighboring characters using vigenere cipher. Ci = (Pi + Ki) mod 26 (0R )+ O 0 = 00000 R = 10001(17) Now we need to perform XOR for 0 AND R 0R = 10001=17. 17 17+14(we have O value 14) = 31 Now we do mod operation 31 mod 26 = 5 Now we need to check the 5 in the table 5=F ENCRYPTION EXAMPLE (0R)+O =F (R0)+S =J (0F)+H =M (FJ)+I =U (J0)+N =W (0M)=I =U (MU)+P =N (UW)+G =I (W0)+M =I (0U)+C =W (UN)+A =Z (NI)+X =C (II)+X =C (I0)+X =F Triangle 2
  • 12. Ci = (Pi + Ki) mod 26 (F^J)+I F=0101(5) J=1001(9) Now we need to perform XOR for F AND J FR= 1100=12. 12 12+8=20 Now we do mod operation 20 mod 26 = 20 Now we need to check the 20 in the table 20=U ENCRYPTION EXAMPLE
  • 13. ENCRYPTION EXAMPLE Cipher text 1: RFJMUWUNIIWZCXF
  • 14. ENCRYPTION EXAMPLE In Sierpinski triangle, the characters at the odd positions are written first and then the even position characters. RFJMWUNIIWFUZCX Ciphertext:2 Sierpinski triangle
  • 15. DECRYPTION ALGORITHM Input : Cipher Text Step1: Read the characters based on the concept of sierpinski triangle to accomplish permutation. Step2: Let the message to be decrypted in the matrix [m , m] as triangle 1. At receiver side the characters of the cipher text are arranged row wise in the triangular pattern. Step3: Develop another triangle, triangle 2,based on the concept of pascal triangle. i.e., the corner characters are Xored with 0 and the middle characters are xored with the neighbouring characters. Step4: Apply vigenere cipher decryption for 1&2 triangles and perform substitution. Output: Plain text
  • 16. EXAMPLE:DECRYPTION  STEP 1: Take the cipher text message” RFJMWUNIIWFUZCX”.  STEP 2: We need to place the characters of cipher text message is shown in the cipher text triangle-1.  STEP 3: The cipher text is arranged according to the Sierpinski Rule RFJMWUNIIWFUZCX
  • 17. EXAMPLE: DECRYPTION STEP 3:Based on the concept of Pascal triangle, the corner characters are XORed with 0 and the middle values are XORed with neighboring characters using vigenere cipher. Ci = (Pi -Ki) mod 26 0 = 00000 R = 10001 Now we need to perform XOR for O AND R 0R = 10001=17. F=5 F-(0R)=5-17=-12 Now we need to do the mod operation -12 mod 26 = 14=O Triangle-2 A B C D E F G H I J 0 1 2 3 4 5 6 7 8 9 K L M N O P Q R S T 10 11 12 13 14 15 16 17 18 19 U V W X Y Z 20 21 22 23 24 25 F-(0R) =O J-(R0) =S M-(0F) =H U-(FJ) =I W-(J0) =N U-(0M) =I N-(MU) =P I-(UW) =G I-(W0) =M W-(0U) =C Z-(CN) =X C-(NI) =X X-(II) =X F-(I0) =X
  • 19. CONCLUSION In this project, a new cryptosystem to encrypt/decrypt text messages by using Pascal and Sierpinski triangles is developed. The method is very simple and easy to implement because it involves permutation and substitution techniques for encryption. The characters of the plaintext are transformed to random characters after substitution and the ciphertext are randomly shuffled by using permutation. The proposed encryption method satisfies both confusion and diffusion properties significantly. The messages encrypted using the proposed method is not much vulnerable to cryptanalysis and letter frequency attacks.