This is your
presentation title
CAESAR CIPHER
2
TEAM MEMBERS
DHIRENDRA SHANKRITYAN
SHIWANGI SRIVASTAVA
AVISHREE
SYAM
PROJECT DESCRIPTION
CAESAR CIPIHER: -
It is a platform where the users enjoy the various types of cipher
codes from the noob level to the pro level. In this people will find
various algorithms to encrypt and decrypt the code. like
alphabetic, polyalphabetic substitution, alphanumeric, etc.
3
Important points; -
Encryption-Decryption: -
encryption is the process of converting
data, within a database, in plain text
format into a meaningless cipher text by
means of a suitable algorithm.
decryption is converting the
meaningless cipher text into the original
information using keys generated by the
encryption algorithms
Plaintext: -
Let’s start with the most basic term to
know, which is simple but just as
important as the others: plaintext is a
readable, plain message that anyone
can read.
Cipher text: -
It is the result of the encryption
process. The encrypted plaintext
appears as apparently random strings
of characters, rendering them
useless. A cipher is another way of
referring to the encryption algorithm
that transforms the plaintext, hence
the term cipher text.
Keys: -
The encryption process requires
a cryptographic key that tells the
algorithm how to transform the
plaintext into cipher text
Hash: -
Hashing is generating a value or
values from a string of text using
a mathematical function.
4
INFORMATION
GATHERING
BUILDING
ALGORITHM
WEBSITE
CREATION
CREATING
INTERFACE
Our project shows the power of security at its peak . With the help
of cryptography now one can make their conversation private that
other will never be knowing.It can help in keeping one’s important
information safe.
We have completed our project in three stages like noob,
intermediate and ended it with the creation of our own very cipher
text.
1. The noob level comprises of the ancient cipher text name
before the great Julius Caeser, he used this method of
communication so no other but the person he is sending the text
will only understand it.
2. the intermediate level is a polyalphabetic cipher because it
uses two or more cipher alphabets to encrypt the data. In other
words, the letters in the Vigenère cipher are shifted by different
amounts, normally done using a word or phrase as the encryption
key .
3. And it ended with the creation of our own cipher text with our
own algorithm. Where the plain text is getting converted into
alphanumeric cipher text.
After that we created a website in which we uploaded our
cipher’s. So one can enjoy the benefit from any part of their world
at their finger tips.
This project is just not about encryption but at this stage
where nothing is secure cryptography is the only solution so that
we can protect our valuable documents safe and protect it from
getting vulnerable which in turn reduces the breech of security.
6
Thanks!
Any questions?
Find me at
dhirendrasngh81@gmail.com

Caesar cipher

  • 1.
    This is your presentationtitle CAESAR CIPHER
  • 2.
    2 TEAM MEMBERS DHIRENDRA SHANKRITYAN SHIWANGISRIVASTAVA AVISHREE SYAM PROJECT DESCRIPTION CAESAR CIPIHER: - It is a platform where the users enjoy the various types of cipher codes from the noob level to the pro level. In this people will find various algorithms to encrypt and decrypt the code. like alphabetic, polyalphabetic substitution, alphanumeric, etc.
  • 3.
    3 Important points; - Encryption-Decryption:- encryption is the process of converting data, within a database, in plain text format into a meaningless cipher text by means of a suitable algorithm. decryption is converting the meaningless cipher text into the original information using keys generated by the encryption algorithms Plaintext: - Let’s start with the most basic term to know, which is simple but just as important as the others: plaintext is a readable, plain message that anyone can read. Cipher text: - It is the result of the encryption process. The encrypted plaintext appears as apparently random strings of characters, rendering them useless. A cipher is another way of referring to the encryption algorithm that transforms the plaintext, hence the term cipher text. Keys: - The encryption process requires a cryptographic key that tells the algorithm how to transform the plaintext into cipher text Hash: - Hashing is generating a value or values from a string of text using a mathematical function.
  • 4.
  • 5.
    Our project showsthe power of security at its peak . With the help of cryptography now one can make their conversation private that other will never be knowing.It can help in keeping one’s important information safe. We have completed our project in three stages like noob, intermediate and ended it with the creation of our own very cipher text. 1. The noob level comprises of the ancient cipher text name before the great Julius Caeser, he used this method of communication so no other but the person he is sending the text will only understand it. 2. the intermediate level is a polyalphabetic cipher because it uses two or more cipher alphabets to encrypt the data. In other words, the letters in the Vigenère cipher are shifted by different amounts, normally done using a word or phrase as the encryption key . 3. And it ended with the creation of our own cipher text with our own algorithm. Where the plain text is getting converted into alphanumeric cipher text. After that we created a website in which we uploaded our cipher’s. So one can enjoy the benefit from any part of their world at their finger tips. This project is just not about encryption but at this stage where nothing is secure cryptography is the only solution so that we can protect our valuable documents safe and protect it from getting vulnerable which in turn reduces the breech of security.
  • 6.
    6 Thanks! Any questions? Find meat dhirendrasngh81@gmail.com