SlideShare a Scribd company logo
This is your
presentation title
CAESAR CIPHER
2
TEAM MEMBERS
DHIRENDRA SHANKRITYAN
SHIWANGI SRIVASTAVA
AVISHREE
SYAM
PROJECT DESCRIPTION
CAESAR CIPIHER: -
It is a platform where the users enjoy the various types of cipher
codes from the noob level to the pro level. In this people will find
various algorithms to encrypt and decrypt the code. like
alphabetic, polyalphabetic substitution, alphanumeric, etc.
3
Important points; -
Encryption-Decryption: -
encryption is the process of converting
data, within a database, in plain text
format into a meaningless cipher text by
means of a suitable algorithm.
decryption is converting the
meaningless cipher text into the original
information using keys generated by the
encryption algorithms
Plaintext: -
Let’s start with the most basic term to
know, which is simple but just as
important as the others: plaintext is a
readable, plain message that anyone
can read.
Cipher text: -
It is the result of the encryption
process. The encrypted plaintext
appears as apparently random strings
of characters, rendering them
useless. A cipher is another way of
referring to the encryption algorithm
that transforms the plaintext, hence
the term cipher text.
Keys: -
The encryption process requires
a cryptographic key that tells the
algorithm how to transform the
plaintext into cipher text
Hash: -
Hashing is generating a value or
values from a string of text using
a mathematical function.
4
INFORMATION
GATHERING
BUILDING
ALGORITHM
WEBSITE
CREATION
CREATING
INTERFACE
Our project shows the power of security at its peak . With the help
of cryptography now one can make their conversation private that
other will never be knowing.It can help in keeping one’s important
information safe.
We have completed our project in three stages like noob,
intermediate and ended it with the creation of our own very cipher
text.
1. The noob level comprises of the ancient cipher text name
before the great Julius Caeser, he used this method of
communication so no other but the person he is sending the text
will only understand it.
2. the intermediate level is a polyalphabetic cipher because it
uses two or more cipher alphabets to encrypt the data. In other
words, the letters in the Vigenère cipher are shifted by different
amounts, normally done using a word or phrase as the encryption
key .
3. And it ended with the creation of our own cipher text with our
own algorithm. Where the plain text is getting converted into
alphanumeric cipher text.
After that we created a website in which we uploaded our
cipher’s. So one can enjoy the benefit from any part of their world
at their finger tips.
This project is just not about encryption but at this stage
where nothing is secure cryptography is the only solution so that
we can protect our valuable documents safe and protect it from
getting vulnerable which in turn reduces the breech of security.
6
Thanks!
Any questions?
Find me at
dhirendrasngh81@gmail.com

More Related Content

What's hot

Cryptography ppt by vaishnavi khandelwal
Cryptography ppt by vaishnavi khandelwal Cryptography ppt by vaishnavi khandelwal
Cryptography ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
Cryptography
CryptographyCryptography
Cryptography
research30
 
Crytography
CrytographyCrytography
Crytography
Mostak Ahmed
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
Anubhav Sokhal
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
Anas Rock
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
Pratik Poddar
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Cryptography
CryptographyCryptography
Cryptography
AnandKaGe
 

What's hot (20)

Cryptography ppt by vaishnavi khandelwal
Cryptography ppt by vaishnavi khandelwal Cryptography ppt by vaishnavi khandelwal
Cryptography ppt by vaishnavi khandelwal
 
Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Criptography
CriptographyCriptography
Criptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Cryptography
CryptographyCryptography
Cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Caesar cipher

Crypto
CryptoCrypto
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Sumit Satam
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
research30
 
Public Key Authentication With SSH
Public Key Authentication With SSHPublic Key Authentication With SSH
Public Key Authentication With SSHDon Norwood
 
Encryption
EncryptionEncryption
Encryption
Savyasachi14
 
Encryption is a process of converting a message, image, or any other .pdf
 Encryption is a process of converting a message, image, or any other .pdf Encryption is a process of converting a message, image, or any other .pdf
Encryption is a process of converting a message, image, or any other .pdf
rachanaprade
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
mydrynan
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
Mike Gates
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12Arindam Paul
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Similar to Caesar cipher (20)

Crypto
CryptoCrypto
Crypto
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Encryption
EncryptionEncryption
Encryption
 
Is case study
Is   case studyIs   case study
Is case study
 
Ss
SsSs
Ss
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Public Key Authentication With SSH
Public Key Authentication With SSHPublic Key Authentication With SSH
Public Key Authentication With SSH
 
Encryption
EncryptionEncryption
Encryption
 
Encryption is a process of converting a message, image, or any other .pdf
 Encryption is a process of converting a message, image, or any other .pdf Encryption is a process of converting a message, image, or any other .pdf
Encryption is a process of converting a message, image, or any other .pdf
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
無題 1
無題 1無題 1
無題 1
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

More from Technical Hub

Vulnerability assessment
Vulnerability assessmentVulnerability assessment
Vulnerability assessment
Technical Hub
 
Traffic sign reading robot
Traffic sign reading robotTraffic sign reading robot
Traffic sign reading robot
Technical Hub
 
Suggestion box
Suggestion boxSuggestion box
Suggestion box
Technical Hub
 
Smart mirror
Smart mirrorSmart mirror
Smart mirror
Technical Hub
 
Result management system
Result management systemResult management system
Result management system
Technical Hub
 
Hostel gym
Hostel gymHostel gym
Hostel gym
Technical Hub
 
Elastic Load Balancing
Elastic Load Balancing Elastic Load Balancing
Elastic Load Balancing
Technical Hub
 
Alexa voice bot
Alexa voice botAlexa voice bot
Alexa voice bot
Technical Hub
 
Layer wise network security
Layer wise network securityLayer wise network security
Layer wise network security
Technical Hub
 
Resume builder
Resume builderResume builder
Resume builder
Technical Hub
 
Result management system
Result management systemResult management system
Result management system
Technical Hub
 
Passive footprinting
Passive footprintingPassive footprinting
Passive footprinting
Technical Hub
 
Co cubes analysis
Co cubes analysisCo cubes analysis
Co cubes analysis
Technical Hub
 
Automatic generation of 50 addresses
Automatic generation of 50 addressesAutomatic generation of 50 addresses
Automatic generation of 50 addresses
Technical Hub
 
Technical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational InstitutionsTechnical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational Institutions
Technical Hub
 

More from Technical Hub (15)

Vulnerability assessment
Vulnerability assessmentVulnerability assessment
Vulnerability assessment
 
Traffic sign reading robot
Traffic sign reading robotTraffic sign reading robot
Traffic sign reading robot
 
Suggestion box
Suggestion boxSuggestion box
Suggestion box
 
Smart mirror
Smart mirrorSmart mirror
Smart mirror
 
Result management system
Result management systemResult management system
Result management system
 
Hostel gym
Hostel gymHostel gym
Hostel gym
 
Elastic Load Balancing
Elastic Load Balancing Elastic Load Balancing
Elastic Load Balancing
 
Alexa voice bot
Alexa voice botAlexa voice bot
Alexa voice bot
 
Layer wise network security
Layer wise network securityLayer wise network security
Layer wise network security
 
Resume builder
Resume builderResume builder
Resume builder
 
Result management system
Result management systemResult management system
Result management system
 
Passive footprinting
Passive footprintingPassive footprinting
Passive footprinting
 
Co cubes analysis
Co cubes analysisCo cubes analysis
Co cubes analysis
 
Automatic generation of 50 addresses
Automatic generation of 50 addressesAutomatic generation of 50 addresses
Automatic generation of 50 addresses
 
Technical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational InstitutionsTechnical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational Institutions
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Caesar cipher

  • 1. This is your presentation title CAESAR CIPHER
  • 2. 2 TEAM MEMBERS DHIRENDRA SHANKRITYAN SHIWANGI SRIVASTAVA AVISHREE SYAM PROJECT DESCRIPTION CAESAR CIPIHER: - It is a platform where the users enjoy the various types of cipher codes from the noob level to the pro level. In this people will find various algorithms to encrypt and decrypt the code. like alphabetic, polyalphabetic substitution, alphanumeric, etc.
  • 3. 3 Important points; - Encryption-Decryption: - encryption is the process of converting data, within a database, in plain text format into a meaningless cipher text by means of a suitable algorithm. decryption is converting the meaningless cipher text into the original information using keys generated by the encryption algorithms Plaintext: - Let’s start with the most basic term to know, which is simple but just as important as the others: plaintext is a readable, plain message that anyone can read. Cipher text: - It is the result of the encryption process. The encrypted plaintext appears as apparently random strings of characters, rendering them useless. A cipher is another way of referring to the encryption algorithm that transforms the plaintext, hence the term cipher text. Keys: - The encryption process requires a cryptographic key that tells the algorithm how to transform the plaintext into cipher text Hash: - Hashing is generating a value or values from a string of text using a mathematical function.
  • 5. Our project shows the power of security at its peak . With the help of cryptography now one can make their conversation private that other will never be knowing.It can help in keeping one’s important information safe. We have completed our project in three stages like noob, intermediate and ended it with the creation of our own very cipher text. 1. The noob level comprises of the ancient cipher text name before the great Julius Caeser, he used this method of communication so no other but the person he is sending the text will only understand it. 2. the intermediate level is a polyalphabetic cipher because it uses two or more cipher alphabets to encrypt the data. In other words, the letters in the Vigenère cipher are shifted by different amounts, normally done using a word or phrase as the encryption key . 3. And it ended with the creation of our own cipher text with our own algorithm. Where the plain text is getting converted into alphanumeric cipher text. After that we created a website in which we uploaded our cipher’s. So one can enjoy the benefit from any part of their world at their finger tips. This project is just not about encryption but at this stage where nothing is secure cryptography is the only solution so that we can protect our valuable documents safe and protect it from getting vulnerable which in turn reduces the breech of security.
  • 6. 6 Thanks! Any questions? Find me at dhirendrasngh81@gmail.com