SlideShare a Scribd company logo
1 of 44
Team members
• Mohit Kundu
(3313 -61 -0028)
• Sabyaschi Ghosh
(3313 -61 -0031)
• Nilanjit Roy
(3313 -61 -0029)
Encryption is a method of converting an original message of
regular text into encoded text. The text is encrypted by
means of an algorithm (type of formula). If information is
encrypted, there would be a low probability that anyone
other than the receiving party who has the key to the code or
access to another confidential process would be able to
decrypt (translate) the text and convert it into plain,
comprehensible text.
1. Data security
Encryption ensures data security by encrypting the data that can’t be
accessed by others. This way the data can also be sent over unsecured
channels as security is present in the encrypted data itself.
2. Data Integrity
Encryption ensures that if the data has been modified during transit or
intentionally by a hacker, the same cannot be decoded at the recipient's end,
providing complete security of the data.
Encryption Decryption
1. Start.
2. Input the plain text.
3. Assume a variable K and initialized with a constant value.
4. Assume a variable Kmax and initialized with a constant value greater than K.
5. Take a character from the plain text and repeat 5 to 13 steps while the all characters
of the plain text have not been taken.
6. Check the value of the variable K whether its value less than Kmax or not.
7. If the value of K is equal or greater than Kmax then reset the value of K with initial
value.
8. Assume one more variable N.
9. Do the following 3 steps (i.e. 10, 11, 12) for N =1 to K.
10. Convert the character to their corresponding ASCII (decimal) equivalent.
11. Add {5*(-1)N+3N} with the ASCII (decimal) value of the character.
12. Convert the Modified ASCII value to its equivalent character and store it as
encrypted text.
13. Increment the value of K by 1.
14. Stop
1. Please Start..
2. Input the Encrypted text.
3. Initialized a variable SKP, where the value of SKP is equal to (K-1) (K variable is
initialized at the time of encryption algorithm initialization.).
4. Take the a character from the encrypted text and repeat 5 to 9 steps while the all
characters of the encrypted text have not been taken.
5. Convert the character to their corresponding ASCII (decimal) equivalent.
6. Add 2 to the ASCII value of the character.
Modified ASCII value = Original ASCII value of character + {5*(-1)N+3N}
Original ASCII value of character = Modified ASCII value - {5*(-1)N+3N}
For each character of plain text, the value of first bit of each bit Stream is = {5*(-
1)1+3*1} (where N=1) = -5+3 = - 2
Original ASCII value of character = Modified ASCII value - {5*(-1)N+3N}
Original ASCII value of character = Modified ASCII value - (- 2)
Original ASCII value of character = Modified ASCII value +2
Convert the Modified ASCII value to its equivalent character and store it in a New
plain text.
Check the value of SKIP less than (Kmax-1) or not.
7. If the value of SKIP is equal or greater than (Kmax-1) then reset the value of SKIP
with initial value..
8. Skip next SKP (Where SKP is a variable) character.
9. Increment the value of SKP by 1.
10. Stop
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
67
• No of character for each character of plain text (k-1)
: 4
• Value of N : 1
• ASCII Value of plain character : 67
+ 5 * (-1)1 + 3*1
• ASCII Value of cipher character :
= 67
= 67 + (-5) + 3
= 67 + (-2)
= 65
65
A
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
67
• No of character for each character of plain text (k-1)
: 4
• Value of N : 2
• ASCII Value of plain character : 67
+ 5 * (-1)2 + 3*2
• ASCII Value of cipher character :
= 67
= 67 + (+5) + 6
= 67 + (+11)
= 78
65 78
A N
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
67
• No of character for each character of plain text (k-1)
: 4
• Value of N : 3
• ASCII Value of plain character : 67
+ 5 * (-1)3 + 3*3
• ASCII Value of cipher character :
= 67
= 67 + (-5) + 9
= 67 + (+4)
= 71
65 78 71
A N G
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
67
• No of character for each character of plain text (k-1)
: 4
• Value of N : 4
• ASCII Value of plain character : 67
+ 5 * (-1)4 + 3*4
• ASCII Value of cipher character :
= 67
= 67 + (+5) + 12
= 67 + (+17)
= 84
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567
• No of character for each character of plain text (k-1)
: 5
• Value of N : 1
• ASCII Value of plain character : 65
+ 5 * (-1)1 + 3*1
• ASCII Value of cipher character :
= 65
= 65 + (-5) + 3
= 65 + (-2)
= 63
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63
?
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567
• No of character for each character of plain text (k-1)
: 5
• Value of N : 2
• ASCII Value of plain character : 65
+ 5 * (-1)2 + 3*2
• ASCII Value of cipher character :
= 65
= 65 + (+5) + 6
= 65 + (+11)
= 76
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76
? L
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567
• No of character for each character of plain text (k-1)
: 5
• Value of N : 3
• ASCII Value of plain character : 65
+ 5 * (-1)3 + 3*3
• ASCII Value of cipher character :
= 65
= 65 + (-5) + 9
= 65 + (+4)
= 69
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69
? L E
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567
• No of character for each character of plain text (k-1)
: 5
• Value of N : 4
• ASCII Value of plain character : 65
+ 5 * (-1)4 + 3*4
• ASCII Value of cipher character :
= 65
= 65 + (+5) + 12
= 65 + (+17)
= 82
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69 82
? L E R
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567
• No of character for each character of plain text (k-1)
: 5
• Value of N : 5
• ASCII Value of plain character : 65
+ 5 * (-1)5 + 3*5
• ASCII Value of cipher character :
= 65
= 65 + (-5) + 15
= 65 + (+10)
= 75
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69 82
? L E R
75
K
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567 66
• No of character for each character of plain text (k-1)
: 6
• Value of N : 1
• ASCII Value of plain character : 66
+ 5 * (-1)1 + 3*1
• ASCII Value of cipher character :
= 66
= 66 + (-5) + 3
= 66 + (-2)
= 64
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69 82
? L E R
75
K
64
@
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567 66
• No of character for each character of plain text (k-1)
: 6
• Value of N : 2
• ASCII Value of plain character : 66
+ 5 * (-1)2 + 3*2
• ASCII Value of cipher character :
= 66
= 66 + (+5) + 6
= 66 + (+11)
= 77
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69 82
? L E R
75
K
64 77
@ M
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567 66
• No of character for each character of plain text (k-1)
: 6
• Value of N : 3
• ASCII Value of plain character : 66
+ 5 * (-1)3 + 3*3
• ASCII Value of cipher character :
= 66
= 66 + (-5) + 9
= 66 + (+4)
= 70
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69 82
? L E R
75
K
64 77 70
@ M F
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567 66
• No of character for each character of plain text (k-1)
: 6
• Value of N : 4
• ASCII Value of plain character : 66
+ 5 * (-1)4 + 3*4
• ASCII Value of cipher character :
= 66
= 66 + (+5) + 12
= 66 + (+17)
= 83
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69 82
? L E R
75
K
64 77 70 83
@ M F S
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567 66
• No of character for each character of plain text (k-1)
: 6
• Value of N : 5
• ASCII Value of plain character : 66
+ 5 * (-1)5 + 3*5
• ASCII Value of cipher character :
= 66
= 66 + (-5) + 15
= 66 + (+10)
= 76
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69 82
? L E R
75
K
64 77 70 83
@ M F S
76
L
C A B
• The variable K, which value is lies between 5 to 9 and it also determine the number of
character to be generated for a single
character of the plain text.
6567 66
• No of character for each character of plain text (k-1)
: 6
• Value of N : 6
• ASCII Value of plain character : 66
+ 5 * (-1)6 + 3*6
• ASCII Value of cipher character :
= 66
= 66 + (+5) + 18
= 66 + (+23)
= 89
65 78 71 84
A N G T
• The variable N, which value lies between
1 to (K-1)
( Let CAB is a plain text )
63 76 69 82
? L E R
75
K
64 77 70 83
@ M F S
76
L
89
Y
65
• The SKIP variable is used to skip
no encrypted character.
• For first character of a bit stream
the value of N always be 1
• For first time the value of SKIP
variable is 0.
No of Character to SKIP :
Value of N :
Original ASCII value of character :
- {5*(-1)1+3*1}
0
- {(-5)+3}= 65
= 65 - (-2)
= 65 + 2
= 67
= 65
1
A N G T ? L E R K @ M F S L Y
C
A N G T ? L E R K @ M F S L Y
65 63
• The SKIP variable is used to skip
no encrypted character.
• For first character of a bit stream
the value of N always be 1
• For first time the value of SKIP
variable is 0.
No of Character to SKIP :
Value of N :
Original ASCII value of character :
- {5*(-1)1+3*1}= 63
- {(-5)+3}= 63
= 63 - (-2)
= 63 + 2
= 65
3
1
C A
A N G T ? L E R K @ M F S L Y
65 63 64
• The SKIP variable is used to skip
no encrypted character.
• For first character of a bit stream
the value of N always be 1
• For first time the value of SKIP
variable is 0.
No of Character to SKIP :
Value of N :
Original ASCII value of character :
- {5*(-1)1+3*1}= 64
- {(-5)+3}= 64
= 64 - (-2)
= 64 + 2
= 66
4
1
C A B
Sender X Y Z
= Can decode
= Can’t decode
Encrypted text
Encrypted text
Sender X Y Z
Encoder
Password
Plain Text
Spacial
Character
Encrypted Text
• It does Support trail version & demo version.
• Register user can set password to the encrypted file.
• It automatically attched the sender information with this encrypted file.
• It requires low memory space (Primary memory as well as secondary memory.
• Our application is devoloped in C enviroment only for windows xp platform.
• This application only works on text type file(.txt) .
• We can not use ‘tiled’ (~) character in password, because tiled character is
used to separate text file password and original text.
•There is no provision to know if the encrypted file is modified or some text
missing.
• At present our application works on only text type of
document(.txt), but in future we are thinking that we also works on
video(.mp4), audio(.mp3) and image type of file(.jpg) format.
• Now our application generates 4-8 bit character for each single
character in plain text, but we are thinking to change it in 32-64
character for each single character in plain text.
• If someone changes our cipher text file, hen there may be creating
some problem to get the original file by decryption. But in future we
are trying to develop that; if someone modify the cipher text file
then it will automatically find out the error and correct it.
[1] Bement A. L. et. al. (2004), Standards for Security Categorization of Federal
Information and Information Systems, Computer Security Division, Information
Technology Laboratory, National Institute of Standards and Technology
Gaithersburg, MD 20899-8900.
[2] Ayushi, (2010), A Symmetric Key Cryptographic Algorithm, International Journal
of Computer Applications (0975 - 8887) Volume 1. No. 15.
[3] Atul Kahate, (2008) Cryptography and Network Security, Tata McGraw-Hill
Education, pg. 47.
[4] Ijaz Ali Shoukat , Kamalrulnizam Abu Bakar and Mohsin Iftikhar, “A Survey about
the Latest Trends and Research Issues of Cryptographic Elements”, p 141,
International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011,
ISSN 1694 0814.
[5] Sukalyan Som, Saikat Ghosh, “A Survey of Traditional or Character Oriented
Symmetric Key Cryptography”, International Journal of Advanced Research in
Computer Science, Vol. 2, No. 4, July-August 2011
International Journal of Computer Applications (0975 – 8887)
Volume 39– No.8, February 2012
ISBN: 978-93-80866-31-7
SRIJONI MAITRA
ARUN KUMAR CHAKRABARTI
SAMIT MAZUNDER
SONALI GUPTA
File Encryption Application For Windows Based On Polyalphabetic Substitution Cipher

More Related Content

Viewers also liked

Take5 - NW2W for SMB US
Take5 - NW2W for SMB USTake5 - NW2W for SMB US
Take5 - NW2W for SMB USUnifyCo
 
Peripheral neuropathy - Dr Shirley Wong
Peripheral neuropathy - Dr Shirley WongPeripheral neuropathy - Dr Shirley Wong
Peripheral neuropathy - Dr Shirley WongBreaCan
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobileSolutionsDTAG
 
Adams ch03 lecture
Adams ch03 lectureAdams ch03 lecture
Adams ch03 lectureTheSlaps
 
Adams ch05 lecture
Adams ch05 lectureAdams ch05 lecture
Adams ch05 lectureTheSlaps
 
Microbiology Ch 06 lecture_presentation
Microbiology Ch 06 lecture_presentationMicrobiology Ch 06 lecture_presentation
Microbiology Ch 06 lecture_presentationTheSlaps
 
Quantity theory of money
Quantity theory of moneyQuantity theory of money
Quantity theory of moneyNayan Vaghela
 

Viewers also liked (7)

Take5 - NW2W for SMB US
Take5 - NW2W for SMB USTake5 - NW2W for SMB US
Take5 - NW2W for SMB US
 
Peripheral neuropathy - Dr Shirley Wong
Peripheral neuropathy - Dr Shirley WongPeripheral neuropathy - Dr Shirley Wong
Peripheral neuropathy - Dr Shirley Wong
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-Administrators
 
Adams ch03 lecture
Adams ch03 lectureAdams ch03 lecture
Adams ch03 lecture
 
Adams ch05 lecture
Adams ch05 lectureAdams ch05 lecture
Adams ch05 lecture
 
Microbiology Ch 06 lecture_presentation
Microbiology Ch 06 lecture_presentationMicrobiology Ch 06 lecture_presentation
Microbiology Ch 06 lecture_presentation
 
Quantity theory of money
Quantity theory of moneyQuantity theory of money
Quantity theory of money
 

Similar to File Encryption Application For Windows Based On Polyalphabetic Substitution Cipher

Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programmingShaishavShah8
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesComputer Science Journals
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
String in c programming
String in c programmingString in c programming
String in c programmingDevan Thakur
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSAaritraranjan
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemCSCJournals
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentationSoham Mondal
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 

Similar to File Encryption Application For Windows Based On Polyalphabetic Substitution Cipher (19)

Analysis of a Modified RC4
Analysis of a Modified RC4 Analysis of a Modified RC4
Analysis of a Modified RC4
 
IJEIR_1615
IJEIR_1615IJEIR_1615
IJEIR_1615
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
Unit 2
Unit  2Unit  2
Unit 2
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
IDEA.ppt
IDEA.pptIDEA.ppt
IDEA.ppt
 
Lexicalanalyzer
LexicalanalyzerLexicalanalyzer
Lexicalanalyzer
 
Lexicalanalyzer
LexicalanalyzerLexicalanalyzer
Lexicalanalyzer
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
String in c programming
String in c programmingString in c programming
String in c programming
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Regular expressions
Regular expressionsRegular expressions
Regular expressions
 
Cryptography
CryptographyCryptography
Cryptography
 
Security
Security Security
Security
 
Encoding survey
Encoding surveyEncoding survey
Encoding survey
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

File Encryption Application For Windows Based On Polyalphabetic Substitution Cipher

  • 1.
  • 2. Team members • Mohit Kundu (3313 -61 -0028) • Sabyaschi Ghosh (3313 -61 -0031) • Nilanjit Roy (3313 -61 -0029)
  • 3. Encryption is a method of converting an original message of regular text into encoded text. The text is encrypted by means of an algorithm (type of formula). If information is encrypted, there would be a low probability that anyone other than the receiving party who has the key to the code or access to another confidential process would be able to decrypt (translate) the text and convert it into plain, comprehensible text.
  • 4. 1. Data security Encryption ensures data security by encrypting the data that can’t be accessed by others. This way the data can also be sent over unsecured channels as security is present in the encrypted data itself. 2. Data Integrity Encryption ensures that if the data has been modified during transit or intentionally by a hacker, the same cannot be decoded at the recipient's end, providing complete security of the data.
  • 6.
  • 7. 1. Start. 2. Input the plain text. 3. Assume a variable K and initialized with a constant value. 4. Assume a variable Kmax and initialized with a constant value greater than K. 5. Take a character from the plain text and repeat 5 to 13 steps while the all characters of the plain text have not been taken. 6. Check the value of the variable K whether its value less than Kmax or not. 7. If the value of K is equal or greater than Kmax then reset the value of K with initial value. 8. Assume one more variable N. 9. Do the following 3 steps (i.e. 10, 11, 12) for N =1 to K. 10. Convert the character to their corresponding ASCII (decimal) equivalent. 11. Add {5*(-1)N+3N} with the ASCII (decimal) value of the character. 12. Convert the Modified ASCII value to its equivalent character and store it as encrypted text. 13. Increment the value of K by 1. 14. Stop
  • 8. 1. Please Start.. 2. Input the Encrypted text. 3. Initialized a variable SKP, where the value of SKP is equal to (K-1) (K variable is initialized at the time of encryption algorithm initialization.). 4. Take the a character from the encrypted text and repeat 5 to 9 steps while the all characters of the encrypted text have not been taken. 5. Convert the character to their corresponding ASCII (decimal) equivalent. 6. Add 2 to the ASCII value of the character. Modified ASCII value = Original ASCII value of character + {5*(-1)N+3N} Original ASCII value of character = Modified ASCII value - {5*(-1)N+3N} For each character of plain text, the value of first bit of each bit Stream is = {5*(- 1)1+3*1} (where N=1) = -5+3 = - 2 Original ASCII value of character = Modified ASCII value - {5*(-1)N+3N} Original ASCII value of character = Modified ASCII value - (- 2) Original ASCII value of character = Modified ASCII value +2 Convert the Modified ASCII value to its equivalent character and store it in a New plain text. Check the value of SKIP less than (Kmax-1) or not.
  • 9. 7. If the value of SKIP is equal or greater than (Kmax-1) then reset the value of SKIP with initial value.. 8. Skip next SKP (Where SKP is a variable) character. 9. Increment the value of SKP by 1. 10. Stop
  • 10.
  • 11. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 67 • No of character for each character of plain text (k-1) : 4 • Value of N : 1 • ASCII Value of plain character : 67 + 5 * (-1)1 + 3*1 • ASCII Value of cipher character : = 67 = 67 + (-5) + 3 = 67 + (-2) = 65 65 A • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text )
  • 12. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 67 • No of character for each character of plain text (k-1) : 4 • Value of N : 2 • ASCII Value of plain character : 67 + 5 * (-1)2 + 3*2 • ASCII Value of cipher character : = 67 = 67 + (+5) + 6 = 67 + (+11) = 78 65 78 A N • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text )
  • 13. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 67 • No of character for each character of plain text (k-1) : 4 • Value of N : 3 • ASCII Value of plain character : 67 + 5 * (-1)3 + 3*3 • ASCII Value of cipher character : = 67 = 67 + (-5) + 9 = 67 + (+4) = 71 65 78 71 A N G • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text )
  • 14. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 67 • No of character for each character of plain text (k-1) : 4 • Value of N : 4 • ASCII Value of plain character : 67 + 5 * (-1)4 + 3*4 • ASCII Value of cipher character : = 67 = 67 + (+5) + 12 = 67 + (+17) = 84 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text )
  • 15. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 • No of character for each character of plain text (k-1) : 5 • Value of N : 1 • ASCII Value of plain character : 65 + 5 * (-1)1 + 3*1 • ASCII Value of cipher character : = 65 = 65 + (-5) + 3 = 65 + (-2) = 63 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 ?
  • 16. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 • No of character for each character of plain text (k-1) : 5 • Value of N : 2 • ASCII Value of plain character : 65 + 5 * (-1)2 + 3*2 • ASCII Value of cipher character : = 65 = 65 + (+5) + 6 = 65 + (+11) = 76 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 ? L
  • 17. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 • No of character for each character of plain text (k-1) : 5 • Value of N : 3 • ASCII Value of plain character : 65 + 5 * (-1)3 + 3*3 • ASCII Value of cipher character : = 65 = 65 + (-5) + 9 = 65 + (+4) = 69 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 ? L E
  • 18. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 • No of character for each character of plain text (k-1) : 5 • Value of N : 4 • ASCII Value of plain character : 65 + 5 * (-1)4 + 3*4 • ASCII Value of cipher character : = 65 = 65 + (+5) + 12 = 65 + (+17) = 82 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 82 ? L E R
  • 19. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 • No of character for each character of plain text (k-1) : 5 • Value of N : 5 • ASCII Value of plain character : 65 + 5 * (-1)5 + 3*5 • ASCII Value of cipher character : = 65 = 65 + (-5) + 15 = 65 + (+10) = 75 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 82 ? L E R 75 K
  • 20. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 66 • No of character for each character of plain text (k-1) : 6 • Value of N : 1 • ASCII Value of plain character : 66 + 5 * (-1)1 + 3*1 • ASCII Value of cipher character : = 66 = 66 + (-5) + 3 = 66 + (-2) = 64 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 82 ? L E R 75 K 64 @
  • 21. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 66 • No of character for each character of plain text (k-1) : 6 • Value of N : 2 • ASCII Value of plain character : 66 + 5 * (-1)2 + 3*2 • ASCII Value of cipher character : = 66 = 66 + (+5) + 6 = 66 + (+11) = 77 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 82 ? L E R 75 K 64 77 @ M
  • 22. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 66 • No of character for each character of plain text (k-1) : 6 • Value of N : 3 • ASCII Value of plain character : 66 + 5 * (-1)3 + 3*3 • ASCII Value of cipher character : = 66 = 66 + (-5) + 9 = 66 + (+4) = 70 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 82 ? L E R 75 K 64 77 70 @ M F
  • 23. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 66 • No of character for each character of plain text (k-1) : 6 • Value of N : 4 • ASCII Value of plain character : 66 + 5 * (-1)4 + 3*4 • ASCII Value of cipher character : = 66 = 66 + (+5) + 12 = 66 + (+17) = 83 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 82 ? L E R 75 K 64 77 70 83 @ M F S
  • 24. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 66 • No of character for each character of plain text (k-1) : 6 • Value of N : 5 • ASCII Value of plain character : 66 + 5 * (-1)5 + 3*5 • ASCII Value of cipher character : = 66 = 66 + (-5) + 15 = 66 + (+10) = 76 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 82 ? L E R 75 K 64 77 70 83 @ M F S 76 L
  • 25. C A B • The variable K, which value is lies between 5 to 9 and it also determine the number of character to be generated for a single character of the plain text. 6567 66 • No of character for each character of plain text (k-1) : 6 • Value of N : 6 • ASCII Value of plain character : 66 + 5 * (-1)6 + 3*6 • ASCII Value of cipher character : = 66 = 66 + (+5) + 18 = 66 + (+23) = 89 65 78 71 84 A N G T • The variable N, which value lies between 1 to (K-1) ( Let CAB is a plain text ) 63 76 69 82 ? L E R 75 K 64 77 70 83 @ M F S 76 L 89 Y
  • 26.
  • 27.
  • 28.
  • 29. 65 • The SKIP variable is used to skip no encrypted character. • For first character of a bit stream the value of N always be 1 • For first time the value of SKIP variable is 0. No of Character to SKIP : Value of N : Original ASCII value of character : - {5*(-1)1+3*1} 0 - {(-5)+3}= 65 = 65 - (-2) = 65 + 2 = 67 = 65 1 A N G T ? L E R K @ M F S L Y C
  • 30. A N G T ? L E R K @ M F S L Y 65 63 • The SKIP variable is used to skip no encrypted character. • For first character of a bit stream the value of N always be 1 • For first time the value of SKIP variable is 0. No of Character to SKIP : Value of N : Original ASCII value of character : - {5*(-1)1+3*1}= 63 - {(-5)+3}= 63 = 63 - (-2) = 63 + 2 = 65 3 1 C A
  • 31. A N G T ? L E R K @ M F S L Y 65 63 64 • The SKIP variable is used to skip no encrypted character. • For first character of a bit stream the value of N always be 1 • For first time the value of SKIP variable is 0. No of Character to SKIP : Value of N : Original ASCII value of character : - {5*(-1)1+3*1}= 64 - {(-5)+3}= 64 = 64 - (-2) = 64 + 2 = 66 4 1 C A B
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Sender X Y Z = Can decode = Can’t decode Encrypted text Encrypted text Sender X Y Z
  • 38. • It does Support trail version & demo version. • Register user can set password to the encrypted file. • It automatically attched the sender information with this encrypted file. • It requires low memory space (Primary memory as well as secondary memory.
  • 39. • Our application is devoloped in C enviroment only for windows xp platform. • This application only works on text type file(.txt) . • We can not use ‘tiled’ (~) character in password, because tiled character is used to separate text file password and original text. •There is no provision to know if the encrypted file is modified or some text missing.
  • 40. • At present our application works on only text type of document(.txt), but in future we are thinking that we also works on video(.mp4), audio(.mp3) and image type of file(.jpg) format. • Now our application generates 4-8 bit character for each single character in plain text, but we are thinking to change it in 32-64 character for each single character in plain text. • If someone changes our cipher text file, hen there may be creating some problem to get the original file by decryption. But in future we are trying to develop that; if someone modify the cipher text file then it will automatically find out the error and correct it.
  • 41. [1] Bement A. L. et. al. (2004), Standards for Security Categorization of Federal Information and Information Systems, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, MD 20899-8900. [2] Ayushi, (2010), A Symmetric Key Cryptographic Algorithm, International Journal of Computer Applications (0975 - 8887) Volume 1. No. 15. [3] Atul Kahate, (2008) Cryptography and Network Security, Tata McGraw-Hill Education, pg. 47. [4] Ijaz Ali Shoukat , Kamalrulnizam Abu Bakar and Mohsin Iftikhar, “A Survey about the Latest Trends and Research Issues of Cryptographic Elements”, p 141, International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011, ISSN 1694 0814. [5] Sukalyan Som, Saikat Ghosh, “A Survey of Traditional or Character Oriented Symmetric Key Cryptography”, International Journal of Advanced Research in Computer Science, Vol. 2, No. 4, July-August 2011
  • 42. International Journal of Computer Applications (0975 – 8887) Volume 39– No.8, February 2012 ISBN: 978-93-80866-31-7
  • 43. SRIJONI MAITRA ARUN KUMAR CHAKRABARTI SAMIT MAZUNDER SONALI GUPTA