Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
2018-19 Autumn
I confirm that I understand my coursework needs to be submitted online via Google Classroom
under the relevant module page before the deadline in order for my assignment to be accepted
and marked. I am fully aware that late submissions will be treated as non-submission and a
marks of zero will be awarded.
Prakriti Kadel
CC5004NI Security in Computing
Table of Contents
Abstract .............................................................................................................................
1 Introduction to Security ............................................................................................. 1
2 CIA traid and its role in Importance in security ......................................................... 2
2.1 Confidentiality..................................................................................................... 2
2.2 Integrity .............................................................................................................. 3
2.3 Availability .......................................................................................................... 3
3 Introduction Of Cryptography .................................................................................... 4
3.1 Definition Of Cryptography ................................................................................. 4
3.2 History Of Cryptography ..................................................................................... 5
3.3 Keys used in cryptography ................................................................................. 5
3.4 Encryption Keys ................................................................................................ 6
4 Introduction To Caesar Cipher .................................................................................. 8
4.1 Definition ............................................................................................................ 8
4.2 Background ........................................................................................................ 9
4.3 Advantages ........................................................................................................ 9
4.4 Disadvantages ................................................................................................... 9
5 Caesar cipher Development ................................................................................... 10
5.1 Introduction to Newly Modified Algorithm ......................................................... 10
5.2 The New Encryption Algorithm ......................................................................... 10
5.3 The New Decryption Algorithm......................................................................... 11
6 Flowchart ................................................................................................................ 11
6.1 Flowchart for Encrypted Cipher Text ................................................................ 11
6.2 Decrypted Cipher Text Flowchart ..................................................................... 12
7 Testing .................................................................................................................... 13
7.1 Test no.1 .......................................................................................................... 13
7.2 Test No.2.......................................................................................................... 14
7.3 Test No 3.......................................................................................................... 15
8 Critical Analysis ...................................................................................................... 16
9 Conclusion .............................................................................................................. 17
10 Bibliography......................................................................................................... 18
Prakriti Kadel
CC5004NI Security in Computing
Table Of Figure
Figure 1 CIA TRAID ........................................................................................................ 2
Figure 2 Symmetric Key ................................................................................................. 6
Figure 3 Asymmetric Key ............................................................................................... 7
Figure 4 Encryption Caesar Cipher Flowchart .............................................................. 11
Figure 5 Decryption Caesar Cipher Flowchart ............................................................. 12
Table of Table
Table 1 Caesar Cipher .................................................................................................... 8
Table 2 Normal Caesar Cipher ...................................................................................... 10
Table 3 ASCII Value ...................................................................................................... 10
Prakriti Kadel
CC5004NI Security in Computing
Abstract
Cryptography is the art of writing and solving the codes. Due to advancement of
technology people have started using different kinds of algorithm to make their
information more secure. In this documentation I have explained about the Caesar
Cipher and the new methodology for implementing it.
This coursework is all about the modification and new technique implement on Caesar
cipher. The Caesar Cipher is the oldest and easiest one. It can also be break easily, so
it tried to find the more secure method of doing Caesar cipher. Although, the new
modification is not much useful in big organizations, I tried to make it more secure than
original Caesar Cipher. I have explained about the new method and provided the
formula and different steps for encrypting and decrypting algorithm. There is three
testing along with the algorithm of encryption and decryption of ASCII Caesar Cipher.
The new modification can be used in small organizations. While doing research, this
coursework was little hard for me because I couldn’t find any idea of modifying the
Caesar Cipher. But with the lots of research I finally found the way of doing it . I learned
a lot of things related to cryptography and Caesar cipher.
Prakriti Kadel
CC5004NI Security in Computing
1 Introduction to Security
Any activity designed for being free from any type attacks and gives safety for data
and integrity of the network which also prevents damage or theft of data is called
Security. There are different kinds of security. Often there is a risk of getting viruses and
attacks which keeps updating every time, is the reason for damage of data and ruining
the organization. So, to prevent damage and attacks the organization needs to check
their security from time to time and upgrade it too. (Lampson, 2004)There are different
kinds of security. Here is some explanation about them:-
1
Prakriti Kadel
CC5004NI Security in Computing
2.1 Confidentiality
Confidentiality is the process of allowing authorized user to access sensitive and
protected data. Confidentiality helps to safeguard the data from the harmful user. It
ensures that data won’t get damaged or fall into unintended hands by including
strong passwords and data encryption.Data encryption translate data into another
form or code so that only people who have authorization can read it. (Bubendorfer,
2011-16) .Encrypted data can also be called as ciphertext. Confidentiality is
important because it helps to develop trust. For example:- In the hospital, the
information or data of the patient can only be accessible to authorized doctors.
Confidentiality protects the data and the failure to confidentiality means that
someone couldn’t protect the data and has managed to access it. Hence, if
someone is neglecting the confidentiality means someone accessed the information
illegally. (Kinamik, 2007)
2
Prakriti Kadel
CC5004NI Security in Computing
2.2 Integrity
Integrity is the process of maintaining the consistency, accuracy and
trustworthiness of data. If there is untrusted data it means there is a lack of
integrity. The presence of integrity in data is meant to be remaining same within an
information system and as well as while transporting data. The verification of data
integrity includes the use of data comparison and checksums. In integrity, data
changes can be created if the system gets damage or occurrence of an error.
(Bubendorfer, 2011-16) For example:- Imagine you have an online shopping
application. Now imagine attacker can shop your online application and
continuously converting the price of your product so that they can buy anything for
whatever price they choose. This means you failed in maintaining the integrity
because without your authorization your product was altered. So, the data integrity
should be maintained by training the user how to maintain data and also data
validation rule can be helpful. (Kinamik, 2007)
2.3 Availability
Availability is the process of making sure if the information or data is available to
read and use whenever needed. It means that information is accessible by an
authorized user. The right people accessing at right times can be known as
availability. Denying access to data has caused several problems nowadays.
(Kinamik, 2007)Ensuring if the hardware is working well or repaired and system
updates are kept up to date can be helpful for maintaining secure availability.
Imagine a hacker has hacked a web server of a bank and put it do (Bubendorfer,
2011-16). You as an authorized user want to do an e-banking transfer but it is not
possible to access it, the undone transfer is the money lost for the bank.
3
Prakriti Kadel
CC5004NI Security in Computing
3 Introduction Of Cryptography
3.1 Definition Of Cryptography
Cryptography is a process which is related for developing the algorithm used to
conceal information from all the sender to the receiver. It is very important as it helps
to authorize data on an uncertain, unencrypted, vulnerable spying environment.
Nowadays, transmission of messages is through space, which means any other
people can potentially eavesdrop. (S.Sunguna, Apr-2016) So, the modern
cryptography studies about how the messages can be encrypted so that only the
authorized recover can decipher the message. Cryptography is also used to store
passwords in such a way that it can never be recovered. It is helpful for preventing
criminal form stealing online information. There are four principles of cryptography.
(Adil Zaru, 2018)They are:-
Integrity:- Integrity is the process of managing accuracy and The confidential data
remains constant and uncorrupted because of integrity.
Non-repudiation:- Non-repudiation assures the sender of the data cannot cancel and
say no later stage as like data is not transmitted from their sides.
4
Prakriti Kadel
CC5004NI Security in Computing
c. Public key:- Public key is a key that can be revealed to anyone and can be
exposed anytime.
d. Private key:- Private key is a key that should be protected furthermore it
should be kept private.
e. Secret key:- In secret key only one key is used for both encryption and
description. (Adil Zaru, 2018)
f. Encryption:- Encryption is the process of converting the plain text into the
cipher text with the support of algorithms and encryption key is called as an
encryption. (S.Sunguna, Apr-2016)
5
Prakriti Kadel
CC5004NI Security in Computing
g. Decryption:- Decryption is the process of converting cipher text into plain text
with the help of an encryption keys and algorithm. (S.Sunguna, Apr-2016)
1. Symmetric Encryption -: Symmetric is the process where the same key are used for
encrypting and decrypting the information. Encryption locks up the information which
is encrypted whereas decryption unlocks the encrypted information using
cryptographic techniques. Symmetric encryption is one of the best techniques as it
uses a secret key that can be number, word or any string of random letters. (Adil
Zaru, 2018) Persons who are using symmetric key encryption must share a common
key for exchanging the pieces of information. Symmetric encryption has no special
properties and is simple to generate. The challenges of symmetric are it has a trust
issue because the sender and receiver use the same symmetric key, there is an
implicit requirement that the sender and the receiver trust each other. (Aurora, June
2012)For example, it may happen that the receiver has lost the key to an attacker
and sender is not confirmed. So, for this type of disadvantage symmetric key
encryption gave rise to asymmetric encryptions. (S.Sunguna, Apr-2016)
6
Prakriti Kadel
CC5004NI Security in Computing
2. Asymmetric Encryption:- Asymmetric key is the process where different keys are used
for encrypting and decryption the information. It can also be known as public key
cryptography, which is the advanced method as compared to symmetric encryption.
(Adil Zaru, 2018)The public key is a key which can be freely available to anyone who
wants to send you a message. For example:- you have a Viber and anyone who has
your phone number can text you, but the thing is only you can access your inbox. The
second private key is kept a secret so that only authorized person can know about it.
(Aurora, June 2012)For example:- You have your own jeweler box. So only you can
open it and can add up more jewels whenever you like and then close it. In private key
cryptography, there's just one key, that you use to lock the safe and decrypt unlock the
safe information respectively. So this single key is known as the private key.
(S.Sunguna, Apr-2016)
7
Prakriti Kadel
CC5004NI Security in Computing
Example:-
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Table 1 Caesar Cipher
The mathematical formula for encrypting the plain text is C = (P + K) mod 26, where C
is the numerical value of the Cipher Text, P is the numerical value of the Plain Text and
K is the key. The value of key is 3
The mathematical formula for deciphering the cipher text is P = (C – K) mod 26.
J= (C - K) mod 26=(9-3)=6=G
8
Prakriti Kadel
CC5004NI Security in Computing
4.2 Background
The Caesar Cipher is named after roman ruler Julius Caesar (100B.C.-44 B.C) , used
for secret communication .He replaced each letter of the alphabet with a letter three
position further long. After that, any cipher that used this “displacement” concept for the
invention of cipher alphabet was known as Caesar Cipher. Caesar Cipher is easiest
way to solve because there are only 25 possible combinations. (Hal Abelson, 2008)
4.3 Advantages
1. Caesar Cipher is easy to learn and use.
2. It is quite simple than other algorithms
3. It doesn’t need many computer resources
4. It is one of the best techniques to use if computer system cannot use
complicated coding method. (Kwang, 2019)
4.4 Disadvantages
1. It’s frequency of letter pattern provides a huge clue while decrypting the message.
2. It is very easy to crack.
3. It provides minimum security to data.
4. It has simple structure. (Kwang, 2019)
9
Prakriti Kadel
CC5004NI Security in Computing
The modification for Caesar Cipher was necessary to make because the old technique
was easy to crack for cryptanalysis. The new modification makes Caesar Cipher more
secure .The ASCII character helps to encrypt and decrypt the message by finding the
value of key. Each letter has different key while encrypting and decrypting. The below
table represent each Caesar Cipher and ASCII characters.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Table 2 Normal Caesar Cipher
ASCII Value
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90
Table 3 ASCII Value
10
Prakriti Kadel
CC5004NI Security in Computing
6 Flowchart
6.1 Flowchart for Encrypted Cipher Text
11
Prakriti Kadel
CC5004NI Security in Computing
12
Prakriti Kadel
CC5004NI Security in Computing
7 Testing
7.1 Test no.1
The formula for enciphering plain text of ASCII is C=(P+A/26) mod52 where, K=(A/26)
The formula for deciphering cipher text of ASCII P=(C-A/26) mod52 where,
Key(K)=(A/26)
13
Prakriti Kadel
CC5004NI Security in Computing
S:- C=(P+A/26) mod52 =(18+ 83/26) mod 52=(18+3) mod 52 =21=V , where K= 3
E:-C= (P+K/26) mod 52=(4+69/26) mod 52= (4+2) mod 52=6=G, where K= 2
C:- C=(P+A/26) mod 52=(2+67/26) mod 52 =(2+2) mod 52=4=E, where K=2
T:- C=(P+A/26) mod 52=(19+84/26) mod 52=(19+3) mod 52=22=W ,where K=3
The formula for deciphering cipher text of ASCII P=(C-A/26) mod52 where,
Key(K)=(A/26)
14
Prakriti Kadel
CC5004NI Security in Computing
7.3 Test No 3
The formula for enciphering plain text of ASCII is C=(P+A/26) mod52 where,
Key(K)=(A/26)
The formula for deciphering cipher text of ASCII P=(C-A/26) mod52 where,
Key(K)=(A/26)
I: - P=(C-A/26) mod 52= (8-73/26) mod 52= (8-2) mod 52=6=G, where K= 2
G: - P=(C-A/26) mod 52= (6-71/2) mod 52= (6-2) mod 52=4=E, where K= 2
15
Prakriti Kadel
CC5004NI Security in Computing
8 Critical Analysis
The main propose of this modified Caesar Cipher is to provide more security in
algorithm. This ASCII Caesar cipher uses both normal and ASCII value for encrypting
and decrypting the message. There is also the newly modified formula for encrypting
and decrypting the message. With the help of newly modified formula I have done this
algorithm.
Strength
Weakness
1. It can be encrypted and decrypted only with upper-case ASCII characters.
2. It can only be used in small networks.
3. In the scenario of cipher text, it can be easily broken because it consists less key.
4. The simple substitution cipher can be guessed by the attacker.
5. The attacker can reveal the whole message if he figures out the shift.
Application Area
The new modified algorithm can be used in simple pythons for encrypting and
decrypting the message. It can be used in java for encryption and decryption. It can also
be used in small organization for passing secret message.
16
Prakriti Kadel
CC5004NI Security in Computing
9 Conclusion
This coursework presents the evaluation about Security and it’s importance , CIA
triad and detail study about cryptography. Since ,every data and information, that
passes through computer network is not secure, the security helps in controlling the
illegal activities. Security provides an important role in helping organization to make
a profit and control the risk.
There is a detail study about Cryptography, its history and its algorithm .The
Cryptography is used for achieving the certain goals like Data Integrity,
Authentication, and Confidentiality e.t.c. So, to achieve these goals people are
introducing different kinds of algorithm. In this coursework I have introduced about
the Caesar cipher and its history advantages and disadvantages. It also includes
the newly modified Caesar Cipher and its detail.
17
Prakriti Kadel
CC5004NI Security in Computing
10 Bibliography
Adil Zaru, M.K. (2018) General Summary Of Cryptography , (2), p.4.
Hal Abelson, K.L..L. (2008) Blown to Bits: Your Life, Liberty, and Happiness After the
Digital Explosion. 1st ed.
Kinamik. (2007) Have you thought about Intergrity? The CIA traid , p.14.
Lampson, B.W. (2004) Computer Security in the Real World. Principles of Computer
Systems , p.14.
Sandeep Bhatt, P.K.M.a.L.Z. (2015) The Operational Role of Security Information and
Event Management Systems. CSIRTS, p.8.
Shilpa Pareek, A.G.D. (2017) Different Type Network Security Threats and Solutions, A
Review. IPASJ International Journal of Computer Science (IIJCS), 5(4), p.11.
Udepal Singh, U.G. (2013) An ASCII value based text data encryption. International
Journal of Scientific and Research Publications, 3(11), p.5.
18
Prakriti Kadel
CC5004NI Security in Computing
19
Prakriti Kadel