Tuesday, December 31, 2019
Hill Cipher - 2661 Words
CioheWednesday, April 13, 2016 University of Botswana ISS 334 LAB 2 ASSIGNMENT Ndlovu.I 200902852 Ndlovu.I ISS 334 Lab 2 Assignment Page 1 of 27 Wednesday, April 13, 2016 Contents 1. Hill Cipher Description .......................................................................................................................... 3 2. Question ................................................................................................................................................ 3 3. Implementation .................................................................................................................................... 3 3.1. Hill Cipher Encryption andâ⬠¦show more contentâ⬠¦Step 3 is the same as Step 2 but using a different matrix multiplication to find the key. All the programs have written in java using Dr. Java. Ndlovu.I ISS 334 Lab 2 Assignment Page 3 of 27 Wednesday, April 13, 2016 3.1. Hill Cipher Encryption and Decryption Ndlovu.I ISS 334 Lab 2 Assignment Page 4 of 27 Wednesday, April 13, 2016 3.1.1. Part 1 Class Basic the class has the indexOfChar and indexAtChar method. The first method matches characters of a string to the alphabet and returns a numeric value, the second method is used to return a char which is located at the position int pos. Class Hill has an object basic of the class basic so as to access the methods from the basic class, this is done later on in the program. Class Hill also contains method Hill, this ensures that the matrix we are using is a 2X2 matrix, thatââ¬â¢s why the variable block=2. The method reads the key matrix. The user will enter in the first number and press ââ¬Å"enterâ⬠and do this until the fourth number is entered. The assumption is that we are using a 2x2 matrix as the key size. Ndlovu.I ISS 334 Lab 2 Assignment Page 5 of 27 Wednesday, April 13, 2016 Ndlovu.I ISS 334 Lab 2 Assignment Page 6 of 27 Wednesday, April 13, 2016 3.1.2. Part 2 The method KeyInverse also reads 4 integers which are stored to the double array Key[][] and uses them for the decryption key. The method encryptBlock isShow MoreRelatedSystematic Study Of Avalanche Effect2978 Words à |à 12 Pagessuch algorithm to provide data security. It is further modified as Triple DES (3DES) to provide added security due to the extra key length. In DES, 3DES the data is coded in binary system. Avalanche effect is the variation that is observed in the cipher text due to one bit variation in the plain text. In this paper we implement Triple DES algorithms in which the plain text is encoded using various binary coded decimal systems such as 8421, 7421, 5421, excess-3, gray code etcâ⬠¦before encrypting itRead MoreTypes Of Passive And Active Security Attacks Essay2288 Words à |à 10 Pagesa What are the two basic functions used in encryption algorithms? (1 points) The functions used in encryption alogirthms are the substitution and transformation of a plaintext to ciphertext. 2.b What are the two general approaches to attacking a cipher? (1 points) The two general approach are: Cryptanalysis Brute-force attack. Ã¢â¬Æ' 2.c List and briefly define types of cryptanalytic attacks based on what is known to the attacker. (2 points) Types of cryptanalytic attacks are as follows: CiphertextRead MoreNetwork Security : Measures Protect Data During Their Transmission Over A Collection Of Interconnected Networks1068 Words à |à 5 Pagessolutions to computer and communications security problems Classical Encryption Techniques Substitution Techniques â⬠¢ Caesar Cipher â⬠¢ Monoalphabetic Ciphers â⬠¢ Playfair Cipher â⬠¢ Hill Cipher â⬠¢ Polyalphabetic Ciphers â⬠¢ One-Time Pad â⬠¢ Transposition (Permutation) Techniques â⬠¢ Rail Fence Technique â⬠¢ Block (Columnar) Transposition Technique Product Techniques Substitution and transposition ciphers are concatenated 2. Steganography The art of covered writing Security by obscurity Hide messages in other messagesRead MoreNetwork Security : Measures Protect Data During Their Transmission Over A Collection Of Interconnected Networks Essay1068 Words à |à 5 Pagessolutions to computer and communications security problems Classical Encryption Techniques Substitution Techniques â⬠¢ Caesar Cipher â⬠¢ Monoalphabetic Ciphers â⬠¢ Playfair Cipher â⬠¢ Hill Cipher â⬠¢ Polyalphabetic Ciphers â⬠¢ One-Time Pad â⬠¢ Transposition (Permutation) Techniques â⬠¢ Rail Fence Technique â⬠¢ Block (Columnar) Transposition Technique Product Techniques Substitution and transposition ciphers are concatenated 2. Steganography The art of covered writing Security by obscurity Hide messages in other messagesRead More Safety of Online Shopping Through Mathematics Essay1401 Words à |à 6 Pagesyears ago, Julius Caesar encrypted the alphabet, called the Caesar Cipher, to send messages. So that even if his enemies intercepted the messages, they wouldnââ¬â¢t be able to read them. However, his simple encryption wasnââ¬â¢t effective because it was easy to decipher; therefore mathematicians and other scholars work hard to find other complicated encryptions. Early methods of cryptography, the study of encryption, used symmetrical key cipher, a technique which two people who want to send messages to eachRead MoreZodiac Killer Essay1490 Words à |à 6 Pagesshootings, but also a cipher letter which he demanded be printed by Friday, August 1, 1969, or he would cruse around looking to kill a dozen people over the weekend. He signed the bottom of the letter with cross-circle symbol. He followed up those letters with the most chilling letter yet, received on A ugust 7, 1969, that provided more unsettling details about the shootings, but also correcting factual issues that had been printed. By August 8, 1969 the 408-character cipher had been decoded, whichRead MoreCoco Chanel1452 Words à |à 6 Pagesthere on top of my mothers dressing table stood a bottle of Chanel No. 5, beyond my reach but not out of sight, and I knew from the moment I began to discern its mysterious letters and number that there was something magical to the black-and-white cipher. Im not alone in that discovery -- Chanel has come to represent the essence of everywoman, whether in the scent of her perfume or her choice of bold red lipstick or the perfect little black dress -- but the story of Coco feels somehow entwined withRead MoreThe Security Of Database System1880 Words à |à 8 Pagesto be more problematic than the passive ones. Spoofing is considered to be a major way to carry out this attack. This type of attack involves the replacement of a cipher value throu gh the formation of a dummy value (Chander, et al, 2010). In another method of splicing, the cipher text value is effectively out in place of another cipher value for the purpose of misleading. Popular Threats Affecting the Security of Database Some of the most popular threats affecting the overall performance of databasesRead MoreThe Philosophical and Sociological Developments for Bebop During the 1940s1518 Words à |à 7 Pagesare racing, nervous phrases, which sometimes appear as melodic fragments. Every note not needed is left out. Everything is highly concentrated. As a bop musician once said: Everything that is self-explanatory is excluded. Many phrases became ciphers for extended musical runs. It is a kind of musical shorthand, and one must listen to a good deal of bop to make this facility, and due to this, bop had a good deal of not being able to understand, mostly in its early years. But this holds true forRead MoreCritically Evaluate the Importance of Information Security3488 Words à |à 14 Pages Figure 2.5 â⬠¢ Enciphering ââ¬â converting plain text into cipher text â⬠¢ Deciphering ââ¬â converting cipher text back to plain text â⬠¢ The aim of encryption is to make it as hard as is possible for an attacker to obtain the secure message â⬠¢ Substitution cipher ââ¬â an encryption mechanism in which the characters in the plain text message are substituted with alternative characters (e.g. alphabets with numbers) â⬠¢ Transposition cipher ââ¬â an encryption mechanism in which the characters in the plain
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.