[go: up one dir, main page]

0% found this document useful (0 votes)
19 views12 pages

Data Com Lab Project Report Partho 221002604

The project report from Green University of Bangladesh focuses on developing a cipher encryption and decryption system to enhance data security using advanced cryptographic techniques. It outlines the motivations for the project, including ensuring confidentiality, data security, and privacy protection, and details the implementation of various algorithms such as Caesar, substitution, and XOR ciphers. The report also discusses future applications in cybersecurity, cryptography, cloud computing, and e-commerce.

Uploaded by

oliketamim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views12 pages

Data Com Lab Project Report Partho 221002604

The project report from Green University of Bangladesh focuses on developing a cipher encryption and decryption system to enhance data security using advanced cryptographic techniques. It outlines the motivations for the project, including ensuring confidentiality, data security, and privacy protection, and details the implementation of various algorithms such as Caesar, substitution, and XOR ciphers. The report also discusses future applications in cybersecurity, cryptography, cloud computing, and e-commerce.

Uploaded by

oliketamim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Green University of Bangladesh

Department of Computer Science and Engineering (CSE)


Faculty of Sciences and Engineering
Semester: (Spring, Year:2024), B.Sc. in CSE (Day)

LAB PROJECT REPORT


Course Title: Data Communication
Course Code: CSE308 Section: 221D17

Student Details

Name ID

1. Partho Sharathi Talukder 221002604

Submission Date : 12/6/2024


Course Teacher’s Name : Kazi Hasnayeen Emad

[For Teachers use only: Don’t Write Anything inside this box]

Project Proposal Status


Marks: ………………………………… Signature: .....................
Comments: .............................................. Date: ..............................
Contents
1. TITLE OF THE PROJECT PROPOSAL ....................................................................................... 3
2. PROBLEM DOMAIN & MOTIVATIONS ................................................................................... 3
3. OBJECTIVES/AIMS ...................................................................................................................... 3
4. TOOLS & TECHNOLOGIES ........................................................................................................ 3
5. IMPLEMENTATION ...................................................................................................................... 4
6. SOURCE CODE .............................................................................................................................. 5
7. TEST RESULT ................................................................................................................................ 9
8. DISCUSSION ................................................................................................................................ 10
9. FUTURE SCOPE ........................................................................................................................... 11
10. CONCLUSION ............................................................................................................................ 12
11. REFERENCE ............................................................................................................................... 12
1. TITLE OF THE PROJECT PROPOSAL
Cipher Encryption and Decryption: Enhancing Data Security through Advanced Cryptographic
Techniques.

2. PROBLEM DOMAIN & MOTIVATIONS


The project of Cipher Encryption and Decryption falls under the broad domain of cryptography,
specifically focusing on ensuring secure communication. In our digital age, vast amounts of
sensitive information are transmitted electronically, making it crucial to protect them from
unauthorized access.
There are several motivations for developing a cipher encryption and decryption project:
• Confidentiality: The primary motivation is to ensure the confidentiality of messages. By
encrypting messages, we can render them unreadable to anyone who doesn't possess the
secret key to decrypt them. This is crucial for protecting sensitive information like financial
data, personal details, or military communications.
• Data Security: Encryption safeguards data integrity during transmission or storage. Even
if intercepted by a malicious party, the encrypted message is meaningless without the
decryption key.
• Privacy Protection: Encryption empowers users to control who can access their
information. It allows for secure communication in environments where data breaches or
snooping might be a concern.

3. OBJECTIVES/AIMS
In an era where data breaches and cyber threats are increasingly prevalent, ensuring the security
and privacy of information is paramount. This project aims to develop a comprehensive encryption
and decryption system using advanced cipher techniques.
• Develop an encryption module that can securely convert plaintext into ciphertext using
various cipher techniques.
• Create a decryption module that can accurately revert ciphertext back to plaintext for
authorized users.
• Implement multiple cipher algorithms including ceasar cipher, substitution cipher and XOR
cipher encryption.
• Ensure data integrity and authenticity through the implementation of cryptographic hash
functions.

4. TOOLS & TECHNOLOGIES


To build this project we will use three different algorithms,
1. Ceasar Cipher algorithm for encryption and decryption plain text.
2. Substitution Cipher algorithm.
3. XOR Cipher algorithm.
4. A compiler to implement source code in C.
5. IMPLEMENTATION
1. Ceasar Cipher Algorithm
The Caesar cipher is one of the most basic and oldest encryption techniques around. It's a type
of substitution cipher, which means it replaces letters in a message with different letters. Here's
how it works:
 Shifting the Alphabet: If we choose a number, called the shift or key. This number
tells us how many positions down the alphabet to move each letter in your message.
 Encryption: For each letter in our message, we find its place in the alphabet (A=1,
B=2, etc.). Then we have to add the shift value to that number. If the new number goes
past the end of the alphabet (Z=26), we wrap around to the beginning. This gives us
the encrypted letter.
 Decryption: To decrypt a Caesar cipher message, we simply subtract the shift value
from each letter. Again, we wrap around to the end of the alphabet if the result is
negative.

2. Substitution Cipher Algorithm


A substitution cipher is a cryptographic technique for encrypting messages by replacing
individual units of plaintext (usually letters) with different units (typically letters) according
to a fixed rule. This rule, known as the key, specifies how each character is mapped to another.
Here's a breakdown of the algorithm:
Encryption:
 Plaintext: The original message you want to encrypt.
 Key: A secret rule that defines the substitution pattern. This can be a simple mapping
like a Caesar cipher where each letter is shifted a certain number of positions, or a
more complex scheme where different letters are substituted with different symbols.
 Substitution: Replace each character in the plaintext with its corresponding substitute
according to the key. For example, if the key dictates 'A' is replaced by 'X' and 'B' by
'Y', then "ATTACK AT DAWN" would become "XXRAYY AT YXWN".
Decryption:
 Ciphertext: The encrypted message you received.
 Key: The same secret rule used for encryption.
 Reverse Substitution: Apply the key in reverse to replace ciphertext characters back
to their original plaintext equivalents. Following the previous example, "XXRAYY
AT YXWN" would become "ATTACK AT DAWN" again upon decryption.

3. XOR cipher algorithm


The XOR cipher is a simple encryption algorithm that uses the Exclusive OR (XOR) operation
to scramble data. It's a type of symmetric encryption, meaning the same key is used for both
encryption and decryption. Here's how it works:
 Key Selection: A secret key is chosen. This key can be a string of text, but typically
it's a random sequence of bits that's as long as the message (or longer) for better
security.

 Encryption: Each bit of the message (often represented in ASCII code for text) is
XORed with the corresponding bit from the key. This essentially flips the bits
wherever the corresponding bits in the message and key differ.

 Decryption: To decrypt the message, you simply XOR the ciphertext (encrypted
message) with the same key again. Because XOR is its own inverse (meaning XORing
twice with the same key cancels out the effect), this reverses the encryption and
retrieves the original message.

6. SOURCE CODE
7. TEST RESULT
 Initial Output

 User Input and Encryption


 Encrypted Text Output

 User Input and Decryption

 Decrypted Text Output

8. DISCUSSION
1. Code Discussion
Main Function: The main function provides a user interface to choose between
encrypting or decrypting text, and to select the algorithm for the operation.
Encryption and Decryption Functions: The code has two main functions, ‘encryptText’
and ‘decryptText’ which handle the overall process of encryption and decryption
respectively. ‘encryptText’ Encrypts the input text using the chosen algorithm.
‘decryptText’ Decrypts the input text using the chosen algorithm.
Cipher Algorithms: ‘caesarEncrypt’ Encrypts text by shifting each letter by a specified
number of positions. ‘caesarDecrypt’ Decrypts text by shifting each letter back by the
same number of positions used in encryption. ‘substitutionEncrypt’ Encrypts text by
substituting each letter with a corresponding letter from a provided key.
‘substitutionDecrypt’ Decrypts text by reversing the substitution process.
File Operations: ‘encrypted_text_output.txt’ Stores the result of the encryption.
‘decrypted_text_output.txt’ Stores the result of the decryption.
2. Result Discussion
The code simulates a text cipher program. The program greets the user with an intro
message, including a title and thematic text. It presents a menu with choices for encryption,
decryption, or exit. For encryption and decryption, it asks the user for: Text to
encrypt/decrypt Encryption/decryption algorithm (Caesar Cipher, Substitution Cipher,
XOR Cipher) Additional parameters based on the chosen algorithm (e.g., shift value for
Caesar Cipher, key for Substitution/XOR). It validates user input and provides error
messages if invalid options are chosen. Based on user choices, the program performs the
following:
Encryption: Applies the chosen algorithm (Caesar Cipher, Substitution Cipher, XOR
Cipher) to the input text and saves the encrypted output to a file named
‘encrypted_text_output.txt’.
Decryption: Applies the chosen algorithm (Caesar Cipher, Substitution Cipher, XOR
Cipher) to the input text and saves the decrypted output to a file named
‘decrypted_text_output.txt’.
For Error Handling, the program validates user input for choices and key formats. It
displays error messages if invalid input is detected and might exit the program in critical
cases (e.g., invalid substitution key). It handles potential file opening errors during output
generation.

9. FUTURE SCOPE
Cipher encryption and decryption projects have a wide range of applications and a promising
future scope in various domains.

 Cybersecurity: Encryption and decryption techniques are crucial for securing data
transmission and storage in cybersecurity applications. As the need for data privacy and
protection against cyber threats continues to grow, the development of robust and secure
ciphers will remain a priority.
 Cryptography: Cryptography is the foundation of secure communication systems, and
cipher algorithms are at the heart of modern cryptography. Ongoing research in
cryptography aims to develop new ciphers and improve existing ones to enhance security,
efficiency, and resistance against attacks.
 Cloud computing and data storage: As more data is stored and processed in the cloud,
encryption and decryption techniques play a crucial role in protecting sensitive information
from unauthorized access. Cloud service providers and data centers rely on robust ciphers
to ensure data confidentiality and integrity.
 E-commerce and financial transactions: Secure online transactions and financial data
exchange require strong encryption protocols to protect sensitive information, such as
credit card numbers and personal data. Cipher algorithms are essential for ensuring the
security of e-commerce platforms and financial systems.
10. CONCLUSION
This project aims to enhance data security through the development of a robust encryption and
decryption system. By leveraging advanced cryptographic techniques and ensuring ease of use,
the system will provide secure and reliable protection for sensitive information, making it an
invaluable tool in the fight against cyber threats.

11. REFERENCE
1. https://github.com/cliffordebayan/Caesar-Cipher
2. https://www.scribd.com/doc/221104536/148816-3041-Encryption-Decryption-Project
3. https://www.linkedin.com/pulse/project-encryption-decryption-string-using-c-amrutha-
swamy-8plxc

You might also like