SlideShare a Scribd company logo
PAF-Karachi Institute of Economics & Technology




                 Final Project Report




Project: Encrypter/Decrypter

              Course: Network Security
                     C.Id:55911
            Instructor: Ma’m Seema Ansari




Group Members:
   Salman Khaliq Bajwa (3746)
   Pawan Khan          (4236)




                                                        1
DEDICATION


                               This report is dedicated to



                                     Our Parents,



     Whose love, affection and support helped s in bringing our work to this level of
accomplishments; we are also thankful to them for educating us for unconditional support
   and encouragement to pursue our interests, even when the interest went beyond the
 boundaries of field and scope. Without their support and kindness this work would not
                                   have been possible.




                                                                                         2
ACKNOWLEDEMENT


                 Praise to Allah the most beneficent and the most merciful



We are grateful to our project advisor Ma’m Seema Ansari, for enlightening us with her
precious knowledge and vast experience to benefit us in the future. We also like to thank
our teachers and lab assistants for their assistance and support.

We would also thank with all gratitude and depth of our hearts to our parents who helped
us not only financially but with integrity too and support us in all our hardships. Finally
our sincere thanks to our institute PAF-KIET, for providing us the opportunity to gave us
the strength to undertake this project.

Special thanks to all our fellows and friends who lend us a hand throughout the project’s
each phase.

We pray this effort may prove to be the beginning of new era, a era in which Science and
Technology may make great progress in Pakistan and Pakistan may become a part of the
developed nations.

Thank you.




                                                                                          3
Table of Contents
Encrypter/Decrypter ..........................................................................................................................5
Objective: ..........................................................................................................................................6
Introduction: .....................................................................................................................................6
What is encryption? ...........................................................................................................................6
Why do we need it? ...........................................................................................................................6
What is Decryption?...........................................................................................................................7
Description: .......................................................................................................................................7
   1.      Ceaser Cipher:.........................................................................................................................7
   2.      Transposition Cipher: ..............................................................................................................8
   3.      Morsecode Cipher: ..................................................................................................................8
   4.      Vigenere Cipher: .....................................................................................................................9
        Vigenere Cipher Table: ................................................................................................................9
Conclusion: ........................................................................................................................................9
Refrences: ....................................................................................................................................... 10




                                                                                                                                                    4
Encrypter/Decrypter




                      5
Objective:
The main objective of this project was to develop an encrypter/decrypter using different
encryption techniques in order to prevent the messages or information from loosing or
eavesdropping.


Introduction:
Maintaining privacy in our personal communications is something everyone desires.
Encryption is a means to achieve that privacy. It was invented for that purpose. But
encryption, like most things, can be used for good or evil. And the debate over how to
harness this powerful tool rages on as people on both sides see that there are no easy
answers.


What is encryption?
Encryption is the process of scrambling a message so that only the intended recipient can
read it. The actual cryptographic process is generally a complicated mathematical
formulation, the more complex -- the more difficult to break. A key is supplied to the
recipient so that they can then decipher the message. Keys for encryption algorithms are
described in terms of the number of bits. The higher the number of bits - the more difficult
that cryptosystem would be to break.


Why do we need it?
Encryption can provide a means of securing information. As more and more information is
stored on computers or communicated via computers, the need to insure that this
information is invulnerable to snooping and/or tampering becomes more relevant. Any
thoughts with respect to your own personal information (ie. medical records, tax records,
credit history, employment history, etc.) may bring to mind an area in which you do want,
need or expect privacy. As teachers, we are often called upon to handle sensitive student
information. We need to have access to student records, but maintain the confidentiality of
their information.

Encryption is seen by many people as a necessary step for commerce on the internet to
succeed. Without confidence that net transactions are secure, people are unwilling to trust
a site enough to transact any sort of business using it. Encryption may give consumers the
confidence they need to do internet business.

Encryption can also provide a means of "message authentication". The PGP User's Guide
explains, "The sender's own secret key can be used to encrypt a message thereby signing it.
This creates a digital signature of a message. This proves that the sender was the true


                                                                                          6
originator of the message, and that the message has not been subsequently altered by
anyone else, because the sender alone possesses the secret key that made that signature."
This prevents forgery of that signed message, and prevents the sender from denying the
signature.

E-mail is certainly not secure. While you may believe that the use of a password makes
your business private, you should be aware that sending information without encryption
has been likened to sending postcards through the mail. Your message is totally open to
interception by anyone along the way. You may believe that your personal e-mail is not
incriminating and does not contain content that you must keep secret, and you may be
right. But there are many common situations, where users have a legitimate need for
security both to protect that information and to insure that information is not tampered
with: Consumers placing orders with credit cards via the Internet, journalists protecting
their sources, therapists protecting client files, businesses communicating trade secrets to
foreign branches, ATM transactions, political dissenters, or whistle-blowers -- all are
examples of why encryption may be needed for e-mail or data files, and why it might be
necessary to create a secure environment through its use.


What is Decryption?
Decryption is the opposite of encryption. When something is encrypted, the receiver needs
to decrypt that in order to read the original information or message.


Description:
In our project in order to develop an encrypter/decrypter, we used four different
encryption techniques & algorithms namely;

       Ceaser Cipher
       Transposition Cipher
       Moscode Cipher
       Vinegar Cipher



   1. Ceaser Cipher:
       In cryptography, a Caesar cipher, also known as a Caesar's cipher, the shift cipher,
       Caesar's code or Caesar shift, is one of the simplest and most widely known
       encryption techniques. It is a type of substitution cipher in which each letter in the
       plaintext is replaced by a letter some fixed number of positions down the alphabet.
       For example, with a shift of 3, A would be replaced by D, B would become E, and so


                                                                                           7
on. The method is named after Julius Caesar, who used it in his private
       correspondence.
       Example:
       Text:                                   Cipher text:
       I m salman                              l dp vdopdq

Thus, the Caesar cipher is a shift cipher since the ciphertext alphabet is derived from the
plaintext alphabet by shifting each letter a certain number of spaces. For example, if we use
a shift of 19, then we get the following pair of ciphertext and plaintext alphabets:

                 Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
                 Ciphertext: T U V W X Y Z A B C D E F G H I J K L M N O P Q R S




   2. Transposition Cipher:
   In cryptography, a transposition cipher is a method of encryption by which the
   positions held by units of plaintext (which are commonly characters or groups of
   characters) are shifted according to a regular system, so that the ciphertext constitutes
   a permutation of the plaintext. That is, the order of the units is changed.
   Mathematically obijective function is used on the characters' positions to encrypt and
   an inverse function to decrypt.
   Example: The way the simplest of these works is by picking a matrix of a fixed size (say, 6x10)
   and then writing your message across the rows. e.g. I am Salman Bajwa (matrix 4).
   0 1       2        3
   I -       a        m
   - S       a        l
   M a       n        -
   B a       j        w
   - -       a        -




   3. Morsecode Cipher:
   Morse Code, created by Samuel Morse, was designed to transmit letters across
   telegrams. He wanted frequently used letters to have short codes and less frequently
   used letters to have longer codes. When encrypting, only letters and numbers will be
   encoded and the rest will be treated like spaces. When decrypting, only periods and
   hyphens will be decoded and the rest will be treated like spaces. This web page uses
   International Morse Code with some additional enhancements, but without support for
   foreign characters. It also is geared to help you decode Morse Code snippets you find
   with the Reverse (flips the text) and Swap (exchanges periods and hyphens) links.
   e.g. I am Salman

                                                                                                8
Morsecode Cipher Text: .. / .- -- / ... .- .-.. -- .- -.

This is a table of all the Morse Code translations

A .-B -...C -.-.D -..E .F ..-.G --.H ....I ..J .--- K -.-L .-..M --N -.O ---P .--.Q --.-R .-
.S ...T - U ..-V ...-W .--X -..-Y -.--Z --..0 -----1 .----2 ..---3 ...-- 4 ....-5 .....6 -....7 --...8
---..9 ----.. .-.-.-, --..--? ..--..- -....- = -...-: ---...; -.-.-.( -.--.) -.--.-/ -..-." .-..-.$ ...-..-' .----.¶
.-.-.. _ ..--.-@ .--.-.! ---.! -.-.--+ .-.-.~ .-...# ...-.-& . ...⁄ -..-.



    4. Vigenere Cipher:
    The Vigenère cipher is a method of encrypting alphabetic text by using a series of
    different Caesar ciphers based on the letters of a keyword. It is a simple form of
    polyalphabetic substitution.

In a Caesar cipher, each letter of the alphabet is shifted along some number of places; for
example, in a Caesar cipher of shift 3, A would become D, B would become E, Y would
become B and so on. The Vigenère cipher consists of several Caesar ciphers in sequence
with different shift values.



Vigenere Cipher Table:




Conclusion:
In the end we were able to develop an encrypter & decrypter for the security purposes,
Alhamdolilah.
                                                                                                                  9
Refrences:
     Cryptography & Network Security- Course Book
     Google




                                                    10

More Related Content

What's hot

Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryptionAncy Mariam Babu
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
Cryptography
CryptographyCryptography
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
Phan Minh
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
Donte Francis
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
Anas Rock
 
Cryptography
CryptographyCryptography
Cryptography
AnandKaGe
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
Nikhil l
 
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear PairingsID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
CSCJournals
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
Shakas Technologies
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
Siddique Ibrahim
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
ieeepondy
 
Crytography
CrytographyCrytography
Crytography
Mostak Ahmed
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
Gaurav Singh
 

What's hot (20)

Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Cryptography
CryptographyCryptography
Cryptography
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear PairingsID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
 
Cryptography
CryptographyCryptography
Cryptography
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
Crytography
CrytographyCrytography
Crytography
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 

Similar to Network Security

Network Security
Network SecurityNetwork Security
Network Security
Ritam Das
 
Cryptography
CryptographyCryptography
Cryptography
Arjun Shukla
 
Crypto
CryptoCrypto
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
IJRAT
 
Cryptography
CryptographyCryptography
Cryptography
Izzatbek001
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)Neelabja Manna
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
karthikaparthasarath
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
ManishaJha43
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
Techglyphs
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164Thivya Devaraj
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
101 Blockchains
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Adv Prashant Mali
 
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
blondellchancy
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
karthikaparthasarath
 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 

Similar to Network Security (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Crypto
CryptoCrypto
Crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
Cryptography
CryptographyCryptography
Cryptography
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
Information Security
Information SecurityInformation Security
Information Security
 
Data encryption
Data encryptionData encryption
Data encryption
 

More from Express News

Network Security
Network SecurityNetwork Security
Network Security
Express News
 
Yagi uda antennea
Yagi uda antenneaYagi uda antennea
Yagi uda antennea
Express News
 
Audio amplifier prj
Audio amplifier prjAudio amplifier prj
Audio amplifier prj
Express News
 
PSK modulation
PSK modulationPSK modulation
PSK modulation
Express News
 
4 g technology
4 g technology4 g technology
4 g technology
Express News
 
Smart aquarium project
Smart aquarium projectSmart aquarium project
Smart aquarium project
Express News
 
Traffic Signal using Solar Panel
Traffic Signal using Solar PanelTraffic Signal using Solar Panel
Traffic Signal using Solar Panel
Express News
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phone
Express News
 
Routing & Switching report
Routing & Switching reportRouting & Switching report
Routing & Switching report
Express News
 
ESL report
ESL reportESL report
ESL report
Express News
 
DSP Report
DSP ReportDSP Report
DSP Report
Express News
 
TDMA
TDMATDMA
Final ppt
Final pptFinal ppt
Final ppt
Express News
 
Student counselor
Student counselorStudent counselor
Student counselor
Express News
 
Aem
AemAem
CF
CFCF

More from Express News (18)

Network Security
Network SecurityNetwork Security
Network Security
 
Yagi uda antennea
Yagi uda antenneaYagi uda antennea
Yagi uda antennea
 
Audio amplifier prj
Audio amplifier prjAudio amplifier prj
Audio amplifier prj
 
PSK modulation
PSK modulationPSK modulation
PSK modulation
 
Term paper
Term paperTerm paper
Term paper
 
4 g technology
4 g technology4 g technology
4 g technology
 
Smart aquarium project
Smart aquarium projectSmart aquarium project
Smart aquarium project
 
Traffic Signal using Solar Panel
Traffic Signal using Solar PanelTraffic Signal using Solar Panel
Traffic Signal using Solar Panel
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phone
 
Routing & Switching report
Routing & Switching reportRouting & Switching report
Routing & Switching report
 
ESL report
ESL reportESL report
ESL report
 
DSP Report
DSP ReportDSP Report
DSP Report
 
TDMA
TDMATDMA
TDMA
 
Final ppt
Final pptFinal ppt
Final ppt
 
Student counselor
Student counselorStudent counselor
Student counselor
 
Aem
AemAem
Aem
 
CF
CFCF
CF
 
Cao project final
Cao project finalCao project final
Cao project final
 

Recently uploaded

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Network Security

  • 1. PAF-Karachi Institute of Economics & Technology Final Project Report Project: Encrypter/Decrypter Course: Network Security C.Id:55911 Instructor: Ma’m Seema Ansari Group Members: Salman Khaliq Bajwa (3746) Pawan Khan (4236) 1
  • 2. DEDICATION This report is dedicated to Our Parents, Whose love, affection and support helped s in bringing our work to this level of accomplishments; we are also thankful to them for educating us for unconditional support and encouragement to pursue our interests, even when the interest went beyond the boundaries of field and scope. Without their support and kindness this work would not have been possible. 2
  • 3. ACKNOWLEDEMENT Praise to Allah the most beneficent and the most merciful We are grateful to our project advisor Ma’m Seema Ansari, for enlightening us with her precious knowledge and vast experience to benefit us in the future. We also like to thank our teachers and lab assistants for their assistance and support. We would also thank with all gratitude and depth of our hearts to our parents who helped us not only financially but with integrity too and support us in all our hardships. Finally our sincere thanks to our institute PAF-KIET, for providing us the opportunity to gave us the strength to undertake this project. Special thanks to all our fellows and friends who lend us a hand throughout the project’s each phase. We pray this effort may prove to be the beginning of new era, a era in which Science and Technology may make great progress in Pakistan and Pakistan may become a part of the developed nations. Thank you. 3
  • 4. Table of Contents Encrypter/Decrypter ..........................................................................................................................5 Objective: ..........................................................................................................................................6 Introduction: .....................................................................................................................................6 What is encryption? ...........................................................................................................................6 Why do we need it? ...........................................................................................................................6 What is Decryption?...........................................................................................................................7 Description: .......................................................................................................................................7 1. Ceaser Cipher:.........................................................................................................................7 2. Transposition Cipher: ..............................................................................................................8 3. Morsecode Cipher: ..................................................................................................................8 4. Vigenere Cipher: .....................................................................................................................9 Vigenere Cipher Table: ................................................................................................................9 Conclusion: ........................................................................................................................................9 Refrences: ....................................................................................................................................... 10 4
  • 6. Objective: The main objective of this project was to develop an encrypter/decrypter using different encryption techniques in order to prevent the messages or information from loosing or eavesdropping. Introduction: Maintaining privacy in our personal communications is something everyone desires. Encryption is a means to achieve that privacy. It was invented for that purpose. But encryption, like most things, can be used for good or evil. And the debate over how to harness this powerful tool rages on as people on both sides see that there are no easy answers. What is encryption? Encryption is the process of scrambling a message so that only the intended recipient can read it. The actual cryptographic process is generally a complicated mathematical formulation, the more complex -- the more difficult to break. A key is supplied to the recipient so that they can then decipher the message. Keys for encryption algorithms are described in terms of the number of bits. The higher the number of bits - the more difficult that cryptosystem would be to break. Why do we need it? Encryption can provide a means of securing information. As more and more information is stored on computers or communicated via computers, the need to insure that this information is invulnerable to snooping and/or tampering becomes more relevant. Any thoughts with respect to your own personal information (ie. medical records, tax records, credit history, employment history, etc.) may bring to mind an area in which you do want, need or expect privacy. As teachers, we are often called upon to handle sensitive student information. We need to have access to student records, but maintain the confidentiality of their information. Encryption is seen by many people as a necessary step for commerce on the internet to succeed. Without confidence that net transactions are secure, people are unwilling to trust a site enough to transact any sort of business using it. Encryption may give consumers the confidence they need to do internet business. Encryption can also provide a means of "message authentication". The PGP User's Guide explains, "The sender's own secret key can be used to encrypt a message thereby signing it. This creates a digital signature of a message. This proves that the sender was the true 6
  • 7. originator of the message, and that the message has not been subsequently altered by anyone else, because the sender alone possesses the secret key that made that signature." This prevents forgery of that signed message, and prevents the sender from denying the signature. E-mail is certainly not secure. While you may believe that the use of a password makes your business private, you should be aware that sending information without encryption has been likened to sending postcards through the mail. Your message is totally open to interception by anyone along the way. You may believe that your personal e-mail is not incriminating and does not contain content that you must keep secret, and you may be right. But there are many common situations, where users have a legitimate need for security both to protect that information and to insure that information is not tampered with: Consumers placing orders with credit cards via the Internet, journalists protecting their sources, therapists protecting client files, businesses communicating trade secrets to foreign branches, ATM transactions, political dissenters, or whistle-blowers -- all are examples of why encryption may be needed for e-mail or data files, and why it might be necessary to create a secure environment through its use. What is Decryption? Decryption is the opposite of encryption. When something is encrypted, the receiver needs to decrypt that in order to read the original information or message. Description: In our project in order to develop an encrypter/decrypter, we used four different encryption techniques & algorithms namely; Ceaser Cipher Transposition Cipher Moscode Cipher Vinegar Cipher 1. Ceaser Cipher: In cryptography, a Caesar cipher, also known as a Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so 7
  • 8. on. The method is named after Julius Caesar, who used it in his private correspondence. Example: Text: Cipher text: I m salman l dp vdopdq Thus, the Caesar cipher is a shift cipher since the ciphertext alphabet is derived from the plaintext alphabet by shifting each letter a certain number of spaces. For example, if we use a shift of 19, then we get the following pair of ciphertext and plaintext alphabets: Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext: T U V W X Y Z A B C D E F G H I J K L M N O P Q R S 2. Transposition Cipher: In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically obijective function is used on the characters' positions to encrypt and an inverse function to decrypt. Example: The way the simplest of these works is by picking a matrix of a fixed size (say, 6x10) and then writing your message across the rows. e.g. I am Salman Bajwa (matrix 4). 0 1 2 3 I - a m - S a l M a n - B a j w - - a - 3. Morsecode Cipher: Morse Code, created by Samuel Morse, was designed to transmit letters across telegrams. He wanted frequently used letters to have short codes and less frequently used letters to have longer codes. When encrypting, only letters and numbers will be encoded and the rest will be treated like spaces. When decrypting, only periods and hyphens will be decoded and the rest will be treated like spaces. This web page uses International Morse Code with some additional enhancements, but without support for foreign characters. It also is geared to help you decode Morse Code snippets you find with the Reverse (flips the text) and Swap (exchanges periods and hyphens) links. e.g. I am Salman 8
  • 9. Morsecode Cipher Text: .. / .- -- / ... .- .-.. -- .- -. This is a table of all the Morse Code translations A .-B -...C -.-.D -..E .F ..-.G --.H ....I ..J .--- K -.-L .-..M --N -.O ---P .--.Q --.-R .- .S ...T - U ..-V ...-W .--X -..-Y -.--Z --..0 -----1 .----2 ..---3 ...-- 4 ....-5 .....6 -....7 --...8 ---..9 ----.. .-.-.-, --..--? ..--..- -....- = -...-: ---...; -.-.-.( -.--.) -.--.-/ -..-." .-..-.$ ...-..-' .----.¶ .-.-.. _ ..--.-@ .--.-.! ---.! -.-.--+ .-.-.~ .-...# ...-.-& . ...⁄ -..-. 4. Vigenere Cipher: The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution. In a Caesar cipher, each letter of the alphabet is shifted along some number of places; for example, in a Caesar cipher of shift 3, A would become D, B would become E, Y would become B and so on. The Vigenère cipher consists of several Caesar ciphers in sequence with different shift values. Vigenere Cipher Table: Conclusion: In the end we were able to develop an encrypter & decrypter for the security purposes, Alhamdolilah. 9
  • 10. Refrences: Cryptography & Network Security- Course Book Google 10