Sei sulla pagina 1di 23

CC5004NI Security in Computing

Module Code & Module Title

CC5004NI Security In Computing

Assessment Weightage & Type

30% Individual Coursework

Year and Semester

2018-19 Autumn

Student Name: Prakriti Kadel

London Met ID:17030793

College ID: 170065

Assignment Due Date: 4th Feb 2019(Sunday)

Assignment Submission Date: : 4th Feb 2019

Word Count (Where Required):3645

I confirm that I understand my coursework needs to be submitted online via Google Classroom
under the relevant module page before the deadline in order for my assignment to be accepted
and marked. I am fully aware that late submissions will be treated as non-submission and a
marks of zero will be awarded.

Prakriti Kadel
CC5004NI Security in Computing

Table of Contents
Abstract .............................................................................................................................
1 Introduction to Security ............................................................................................. 1
2 CIA traid and its role in Importance in security ......................................................... 2
2.1 Confidentiality..................................................................................................... 2
2.2 Integrity .............................................................................................................. 3
2.3 Availability .......................................................................................................... 3
3 Introduction Of Cryptography .................................................................................... 4
3.1 Definition Of Cryptography ................................................................................. 4
3.2 History Of Cryptography ..................................................................................... 5
3.3 Keys used in cryptography ................................................................................. 5
3.4 Encryption Keys ................................................................................................ 6
4 Introduction To Caesar Cipher .................................................................................. 8
4.1 Definition ............................................................................................................ 8
4.2 Background ........................................................................................................ 9
4.3 Advantages ........................................................................................................ 9
4.4 Disadvantages ................................................................................................... 9
5 Caesar cipher Development ................................................................................... 10
5.1 Introduction to Newly Modified Algorithm ......................................................... 10
5.2 The New Encryption Algorithm ......................................................................... 10
5.3 The New Decryption Algorithm......................................................................... 11
6 Flowchart ................................................................................................................ 11
6.1 Flowchart for Encrypted Cipher Text ................................................................ 11
6.2 Decrypted Cipher Text Flowchart ..................................................................... 12
7 Testing .................................................................................................................... 13
7.1 Test no.1 .......................................................................................................... 13
7.2 Test No.2.......................................................................................................... 14
7.3 Test No 3.......................................................................................................... 15
8 Critical Analysis ...................................................................................................... 16
9 Conclusion .............................................................................................................. 17
10 Bibliography......................................................................................................... 18

Prakriti Kadel
CC5004NI Security in Computing

Table Of Figure
Figure 1 CIA TRAID ........................................................................................................ 2
Figure 2 Symmetric Key ................................................................................................. 6
Figure 3 Asymmetric Key ............................................................................................... 7
Figure 4 Encryption Caesar Cipher Flowchart .............................................................. 11
Figure 5 Decryption Caesar Cipher Flowchart ............................................................. 12

Table of Table
Table 1 Caesar Cipher .................................................................................................... 8
Table 2 Normal Caesar Cipher ...................................................................................... 10
Table 3 ASCII Value ...................................................................................................... 10

Prakriti Kadel
CC5004NI Security in Computing

Abstract
Cryptography is the art of writing and solving the codes. Due to advancement of
technology people have started using different kinds of algorithm to make their
information more secure. In this documentation I have explained about the Caesar
Cipher and the new methodology for implementing it.

This coursework is all about the modification and new technique implement on Caesar
cipher. The Caesar Cipher is the oldest and easiest one. It can also be break easily, so
it tried to find the more secure method of doing Caesar cipher. Although, the new
modification is not much useful in big organizations, I tried to make it more secure than
original Caesar Cipher. I have explained about the new method and provided the
formula and different steps for encrypting and decrypting algorithm. There is three
testing along with the algorithm of encryption and decryption of ASCII Caesar Cipher.
The new modification can be used in small organizations. While doing research, this
coursework was little hard for me because I couldn’t find any idea of modifying the
Caesar Cipher. But with the lots of research I finally found the way of doing it . I learned
a lot of things related to cryptography and Caesar cipher.

Prakriti Kadel
CC5004NI Security in Computing

1 Introduction to Security
Any activity designed for being free from any type attacks and gives safety for data
and integrity of the network which also prevents damage or theft of data is called
Security. There are different kinds of security. Often there is a risk of getting viruses and
attacks which keeps updating every time, is the reason for damage of data and ruining
the organization. So, to prevent damage and attacks the organization needs to check
their security from time to time and upgrade it too. (Lampson, 2004)There are different
kinds of security. Here is some explanation about them:-

a. Physical security: Physical Security means protection of network, software,


hardware and data from the physical threats which includes theft, fire and natural
disaster. (Techopedia, 2019)
b. Operational Security: Operational Security is a risk management process that
encourages managers to view operations from the perspective of an adversary in
order to protect sensitive information from falling into the wrong hands. (Sandeep
Bhatt, 2015)
c. Network Security: Network security is the process of taking preventive measures
for physical and software to secure the primary network infrastructure from illegal
access, misuse of data etc. It creates a security policy by creating a secure
environment. (Shilpa Pareek, 2017)
d. Data/Information Security: Data Security refers to protecting the data from
various unwanted or unauthorized access throughout its lifecycle. (Shilpa
Pareek, 2017)

1
Prakriti Kadel
CC5004NI Security in Computing

2 CIA traid and its role in Importance in security

The three components of C.I.A traid is Confidentiality, Integrity and Availability


which is most important in role of security. CIA triangle is a process of defining the
negative characteristics of information. It acts as a keystone of the computer security
since the days when mainframes where invented. CIA is important in security as it
helps to assure whether the information is dependable or not. It also confirms to give
access to only authorized personnel. The aim of CIA traid is to secure confidentiality
of data and information, maintain intergrity of data and tp promote availability of
data. (Kinamik, 2007)The detail study of CIA trade is given below.

Figure 1 CIA TRAID (HENDERSON, 2017)

2.1 Confidentiality
Confidentiality is the process of allowing authorized user to access sensitive and
protected data. Confidentiality helps to safeguard the data from the harmful user. It
ensures that data won’t get damaged or fall into unintended hands by including
strong passwords and data encryption.Data encryption translate data into another
form or code so that only people who have authorization can read it. (Bubendorfer,
2011-16) .Encrypted data can also be called as ciphertext. Confidentiality is
important because it helps to develop trust. For example:- In the hospital, the
information or data of the patient can only be accessible to authorized doctors.
Confidentiality protects the data and the failure to confidentiality means that
someone couldn’t protect the data and has managed to access it. Hence, if
someone is neglecting the confidentiality means someone accessed the information
illegally. (Kinamik, 2007)

2
Prakriti Kadel
CC5004NI Security in Computing

2.2 Integrity
Integrity is the process of maintaining the consistency, accuracy and
trustworthiness of data. If there is untrusted data it means there is a lack of
integrity. The presence of integrity in data is meant to be remaining same within an
information system and as well as while transporting data. The verification of data
integrity includes the use of data comparison and checksums. In integrity, data
changes can be created if the system gets damage or occurrence of an error.
(Bubendorfer, 2011-16) For example:- Imagine you have an online shopping
application. Now imagine attacker can shop your online application and
continuously converting the price of your product so that they can buy anything for
whatever price they choose. This means you failed in maintaining the integrity
because without your authorization your product was altered. So, the data integrity
should be maintained by training the user how to maintain data and also data
validation rule can be helpful. (Kinamik, 2007)

2.3 Availability
Availability is the process of making sure if the information or data is available to
read and use whenever needed. It means that information is accessible by an
authorized user. The right people accessing at right times can be known as
availability. Denying access to data has caused several problems nowadays.
(Kinamik, 2007)Ensuring if the hardware is working well or repaired and system
updates are kept up to date can be helpful for maintaining secure availability.
Imagine a hacker has hacked a web server of a bank and put it do (Bubendorfer,
2011-16). You as an authorized user want to do an e-banking transfer but it is not
possible to access it, the undone transfer is the money lost for the bank.

3
Prakriti Kadel
CC5004NI Security in Computing

3 Introduction Of Cryptography
3.1 Definition Of Cryptography
Cryptography is a process which is related for developing the algorithm used to
conceal information from all the sender to the receiver. It is very important as it helps
to authorize data on an uncertain, unencrypted, vulnerable spying environment.
Nowadays, transmission of messages is through space, which means any other
people can potentially eavesdrop. (S.Sunguna, Apr-2016) So, the modern
cryptography studies about how the messages can be encrypted so that only the
authorized recover can decipher the message. Cryptography is also used to store
passwords in such a way that it can never be recovered. It is helpful for preventing
criminal form stealing online information. There are four principles of cryptography.
(Adil Zaru, 2018)They are:-

Confidentiality:- The main objective of confidentiality is to be strict toward the


information so that it won’t pass anywhere to an unauthorized user. It keeps the data
secret.

Integrity:- Integrity is the process of managing accuracy and The confidential data
remains constant and uncorrupted because of integrity.

Non-repudiation:- Non-repudiation assures the sender of the data cannot cancel and
say no later stage as like data is not transmitted from their sides.

Authentication:- Authentication is the process of verifying person identification and


making confirmation of each other identity because of authentication.

4
Prakriti Kadel
CC5004NI Security in Computing

3.2 History Of Cryptography


The word cryptography is derived from the two Greek words kryptos and graphein, in
which Kryptos means hidden and graph means to describe or write. In short,
cryptography means carrying in a secret way of any kind of intelligence we may want to
communicate. It has a lengthy and very complex history. The earliest use of
cryptography was found in 2000 B.C from the old kingdom of Egypt and the Egyptian
practice of hieroglyphics. This secret code was only known to the clerk and used to
pass message in favour of king so that messages cannot be leaked and kept within
them. (M.Damico, 2009)

Modern Cryptography was first known to be used by Julius Caesar(100B.C-400B.C)


who didn’t use to trust his messenger while communicating with his people, governors
and officers. So, this is the reason he decided to create a system in which each
character in his message was replaced by the character three places ahead of it in the
Roman alphabet. During the period of the 16th century, Vigenere developed a cipher
that was known as the first cipher which was used as an encryption key. It is used to
secure data and communication with the use of codes so that the data is only provided
for a certain secret person who can read and process it. Since then, the concept of
cryptography has taken place in the human world. (Davies, 1997)

3.3 Keys used in cryptography


a. Cipher:- The Cipher text is a cryptographic algorithm which is usually used for
encryption and description of the text. For example:- The plain text “ What are
you doing “ is converted into the cipher text as “#5ka@%O”. (S.Sunguna, Apr-
2016)
b. Plain:- Plaintext is defined as a message which is used before encryption and
decryption. It converts text into the easy way which is readable by human
beings .For example :- Priyanka wants to send text “What are you doing” to
Bidushi , in that case “What are you doing” can be called as plain text.
(S.Sunguna, Apr-2016)

c. Public key:- Public key is a key that can be revealed to anyone and can be
exposed anytime.
d. Private key:- Private key is a key that should be protected furthermore it
should be kept private.
e. Secret key:- In secret key only one key is used for both encryption and
description. (Adil Zaru, 2018)
f. Encryption:- Encryption is the process of converting the plain text into the
cipher text with the support of algorithms and encryption key is called as an
encryption. (S.Sunguna, Apr-2016)

5
Prakriti Kadel
CC5004NI Security in Computing

g. Decryption:- Decryption is the process of converting cipher text into plain text
with the help of an encryption keys and algorithm. (S.Sunguna, Apr-2016)

3.4 Encryption Keys

1. Symmetric Encryption -: Symmetric is the process where the same key are used for
encrypting and decrypting the information. Encryption locks up the information which
is encrypted whereas decryption unlocks the encrypted information using
cryptographic techniques. Symmetric encryption is one of the best techniques as it
uses a secret key that can be number, word or any string of random letters. (Adil
Zaru, 2018) Persons who are using symmetric key encryption must share a common
key for exchanging the pieces of information. Symmetric encryption has no special
properties and is simple to generate. The challenges of symmetric are it has a trust
issue because the sender and receiver use the same symmetric key, there is an
implicit requirement that the sender and the receiver trust each other. (Aurora, June
2012)For example, it may happen that the receiver has lost the key to an attacker
and sender is not confirmed. So, for this type of disadvantage symmetric key
encryption gave rise to asymmetric encryptions. (S.Sunguna, Apr-2016)

Figure 2 Symmetric Key (Malygin, 2014)

6
Prakriti Kadel
CC5004NI Security in Computing

2. Asymmetric Encryption:- Asymmetric key is the process where different keys are used
for encrypting and decryption the information. It can also be known as public key
cryptography, which is the advanced method as compared to symmetric encryption.
(Adil Zaru, 2018)The public key is a key which can be freely available to anyone who
wants to send you a message. For example:- you have a Viber and anyone who has
your phone number can text you, but the thing is only you can access your inbox. The
second private key is kept a secret so that only authorized person can know about it.
(Aurora, June 2012)For example:- You have your own jeweler box. So only you can
open it and can add up more jewels whenever you like and then close it. In private key
cryptography, there's just one key, that you use to lock the safe and decrypt unlock the
safe information respectively. So this single key is known as the private key.
(S.Sunguna, Apr-2016)

Figure 3 Asymmetric Key (Malygin, 2014)

7
Prakriti Kadel
CC5004NI Security in Computing

4 Introduction To Caesar Cipher


4.1 Definition
Caesar Cipher is can also be known as shift cipher, which is one of the simplest and
easiest methods for encrypting a message. The work of Caesar Cipher is to replace
each of the plain text with different one a fixed number of places down the alphabets. It
is a symmetric cipher, as the matching keys are used for encryption and decryption.
Here is the plaintext/ cipher text according Caesar Cipher to shift 4.

Example:-

Plaintext Letters abcdefghijklmnopqrstuvwxyz

Cipher text Letters E F G H I J K L M N O P Q R S T U V W XYZ A B C D

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Table 1 Caesar Cipher

Here is the example for encryption and decryption of algorithm.

The mathematical formula for encrypting the plain text is C = (P + K) mod 26, where C
is the numerical value of the Cipher Text, P is the numerical value of the Plain Text and
K is the key. The value of key is 3

Encrypting the plain text GAME as follows:

G:-C = (P + K)mod 26=(6+3)mod 26=9=J

A:-C = (P + K) mod 26=(0+3)mod 26=3=D

M:-C = (P + K) mod 26=(12+3) mod 26=15=P

E:- C = (P + K) mod 26=(4+3)mod 26=7=H

Hence, the Cipher text is JDQH.

The mathematical formula for deciphering the cipher text is P = (C – K) mod 26.

J= (C - K) mod 26=(9-3)=6=G

D=(C - K) mod 26=(3-3)=0=A

P=(C - K) mod 26=(15-3)=12=M

H=(C - K) mod 26=(7-3)=4=E

Hence, the Plain text is GAME

8
Prakriti Kadel
CC5004NI Security in Computing

4.2 Background
The Caesar Cipher is named after roman ruler Julius Caesar (100B.C.-44 B.C) , used
for secret communication .He replaced each letter of the alphabet with a letter three
position further long. After that, any cipher that used this “displacement” concept for the
invention of cipher alphabet was known as Caesar Cipher. Caesar Cipher is easiest
way to solve because there are only 25 possible combinations. (Hal Abelson, 2008)

4.3 Advantages
1. Caesar Cipher is easy to learn and use.
2. It is quite simple than other algorithms
3. It doesn’t need many computer resources
4. It is one of the best techniques to use if computer system cannot use
complicated coding method. (Kwang, 2019)

4.4 Disadvantages
1. It’s frequency of letter pattern provides a huge clue while decrypting the message.
2. It is very easy to crack.
3. It provides minimum security to data.
4. It has simple structure. (Kwang, 2019)

9
Prakriti Kadel
CC5004NI Security in Computing

5 Caesar cipher Development


5.1 Introduction to Newly Modified Algorithm
The name of my algorithm is ASCII algorithm. As we know, Caesar Cipher is one of the
oldest and simplest forms of algorithm. The various researchers have introduced
different types of Caesar Cipher.. The original Caesar cipher is done always with using
key 3 for the communication, but the new modified Caesar Cipher, I have done is with
the help of ASCII (American Standard Code For Information Exchange) which provides
the standard method to represent character. These contain lower-case, upper case
numbers including punctuation symbol. (Udepal Singh, 2013).In this modified cipher I
have used the upper case ASCII of 26characters for encrypting and decrypting the
Caesar cipher. The technique of generating key in new modified Caesar Cipher is
(ASCII value/26), where the divided quotients value is Key(K).

The modification for Caesar Cipher was necessary to make because the old technique
was easy to crack for cryptanalysis. The new modification makes Caesar Cipher more
secure .The ASCII character helps to encrypt and decrypt the message by finding the
value of key. Each letter has different key while encrypting and decrypting. The below
table represent each Caesar Cipher and ASCII characters.

Normal Caesar Cipher

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Table 2 Normal Caesar Cipher

ASCII Value

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90
Table 3 ASCII Value

5.2 The New Encryption Algorithm


1. First creating a cipher, writing all the letters of alphabet sequentially.
2. See the both tables Normal Caesar Cipher and ASCII upper-case to assign
the assign the value in formula.
3. The new formula to convert plain text into cipher text is C= (P+A/26)mod52,
where the plaintext value and ASCII value should be added .
4. The quotient that results from (A/26) is Key (K).

10
Prakriti Kadel
CC5004NI Security in Computing

5.3 The New Decryption Algorithm


1. Firstly, the encrypted cipher, should be written sequentially.
2. See the both tables Normal Caesar Cipher and ASCII upper-case to assign the
assign the value in formula
3. The new formula to convert plain text into cipher text is P= (C-A/26)mod52,
where the cipher text value and ASCII value should be subtracted.
4. The quotient that results from (A/26) is Key (K).

6 Flowchart
6.1 Flowchart for Encrypted Cipher Text

Figure 4 Encryption Caesar Cipher Flowchart

11
Prakriti Kadel
CC5004NI Security in Computing

6.2 Decrypted Cipher Text Flowchart

Figure 5 Decryption Caesar Cipher Flowchart

12
Prakriti Kadel
CC5004NI Security in Computing

7 Testing
7.1 Test no.1
The formula for enciphering plain text of ASCII is C=(P+A/26) mod52 where, K=(A/26)

Where C= Cipher text, P= Plain Text , A= ASCII Value and K= Key

Now, encrypting the plaintext TRAIN as follows:-

T:-C=(P+A/26) mod 52=(19+85/26)mod52=(19+3)mod 52=22=W, where K=3

R:- C=(P+A/26) mod 52=(17+82/26)mod52=(17+3) mod 52=21=U, where K=3

A:- C=(P+A/26) mod 52=(0+65/26)mod52=(0+2)mod 52=2=C, where K=2

I:- C=(P+A/26) mod 52=(8+74/26)mod52=(8+2) mod 52=10=K, where K=2

N:- C=(P+A/26) mod 52=(13+78/26)mod52=(13+3) mod 52=16=Q, where K=3

Hence, the cipher text is WUCKQ

The formula for deciphering cipher text of ASCII P=(C-A/26) mod52 where,
Key(K)=(A/26)

Now, decrypting the cipher text WUCKQ as follows:-

W:-P=(C-A/26) mod 52=(22-87/26) mod52 =(22-3) mod 52=19=T, where K=3

U:-P=(C-A/26) mod 52=(20-85/26) mod52=(20-3) mod 52=17=R, where K=3

C:-P=(C-A/26) mod 52=(2-67/26) mod52=(2-2) mod 52=0=A, where K=2

K:-P=(C-A/26) mod 52=(10-75/26) mod52=(10-2) mod 52=8=I, where K=2

Q:-P=(C-A/26) mod 52=(16-81/26) mod52=(16-3) mod 52=13=N, where K=3

Hence, the plain text is TRAIN.

13
Prakriti Kadel
CC5004NI Security in Computing

7.2 Test No.2


The formula for enciphering plain text of ASCII is C=(P+A/26) mod52 where,
Key(K)=(A/26)

Now, encrypting the plaintext SECURITY as follows:-

S:- C=(P+A/26) mod52 =(18+ 83/26) mod 52=(18+3) mod 52 =21=V , where K= 3

E:-C= (P+K/26) mod 52=(4+69/26) mod 52= (4+2) mod 52=6=G, where K= 2

C:- C=(P+A/26) mod 52=(2+67/26) mod 52 =(2+2) mod 52=4=E, where K=2

U:- C=(P+A/26) mod 52=(20+85/26) mod52 =(20+3) mod 52=23=X, where K= 3

R:- C=(P+A/26) mod 52=(17+82/26)mod52=(17+3) mod 52=U, where K= 3

I:- C=(P+A/26) mod 52=(8+73/26) mod52 =(8+2) mod 52=10=K ,where K= 2

T:- C=(P+A/26) mod 52=(19+84/26) mod 52=(19+3) mod 52=22=W ,where K=3

Y:- C=(P+A/26) mod 52=(24+89/26)mod 52=(24+3) mod 52=27=B ,where K= 3

Hence, the cipher text is VGEXUKWB

The formula for deciphering cipher text of ASCII P=(C-A/26) mod52 where,
Key(K)=(A/26)

Now, decrypting the cipher text VGEXUKWB as follows:-

V:-P=(C-A/26) mod 52=(21-86/26)mod52=(21-3) mod 52=S, where K= 3

G:-P=(C-A/26) mod 52=(6-71/26)mod52=(6-2) mod 52=4=E, where K= 2

E:-P=(C-A/26) mod 52=(4-69/26)mod52=(4-2) mod 52=2=C, where K= 2

X:- P=(C-A/26) mod 52=(23-88/26)mod52=(23-3) mod 52=20=U, where K= 3

U:- P=(C-A/26) mod 52=(20-85/26)mod52=(20-3) mod 52=17=R, where K= 3

K:- P=(C-A/26) mod 52=(10-75/25)mod 52=(10-2) mod 52=8=I ,where K= 2

W:- P=(C-A/26) mod 52=(22-87/26) mod 52=(22-3) mod 52=19=T, where K= 3

B:- P=(C-A/26) mod 52=(1-66/26)mod 52=(1-2) mod 52=-1=Y, where K= 2

14
Prakriti Kadel
CC5004NI Security in Computing

Hence, the plain text is SECURITY.

7.3 Test No 3
The formula for enciphering plain text of ASCII is C=(P+A/26) mod52 where,
Key(K)=(A/26)

C:- C=(P+A/26) mod 52=(2+67/26) mod 52=(2+2) mod 52=4=E ,where K= 2

H:- C=(P+A/26) mod 52=(7+72/26) mod 52=(7+2) mod 52=9=J, where K= 2

A:- C=(P+A/26) mod 52=(0+65/6) mod 52=(0+2) mod 52=2=C, where K= 2

N:- C=(P+A/26) mod 52=(13+78/26) mod 52=(13+3) mod 52=16=Q, where K= 3

G:- C=(P+A/26) mod 52=(6+71/26) mod 52=(6+2) mod 52=8=I, where K= 2

E:- C=(P+A/26) mod 52=(4+69/26) mod 52=(4+2) mod 52=6=G, where K= 2

Hence, the cipher text is:- EJCQIG

The formula for deciphering cipher text of ASCII P=(C-A/26) mod52 where,
Key(K)=(A/26)

Now, decrypting the cipher text EJCQIG

E: - P=(C-A/26) mod 52= (4-69/26) mod52= (4-2) mod 52=2=C , where K= 2

J: - P=(C-A/26) mod 52= (9-74/26) mod52= (9-2) mod 52=7=H, where K= 2

C: - P=(C-A/26) mod 52= (2-67/26) mod52= (2-2) mod 52 =0=A, where K= 2

Q: - P=(C-A/26) mod 52= (16-81/26) mod52= (16-3) mod 52 =13=N, where K= 3

I: - P=(C-A/26) mod 52= (8-73/26) mod 52= (8-2) mod 52=6=G, where K= 2

G: - P=(C-A/26) mod 52= (6-71/2) mod 52= (6-2) mod 52=4=E, where K= 2

Hence, the plain text is CHANGE,

15
Prakriti Kadel
CC5004NI Security in Computing

8 Critical Analysis
The main propose of this modified Caesar Cipher is to provide more security in
algorithm. This ASCII Caesar cipher uses both normal and ASCII value for encrypting
and decrypting the message. There is also the newly modified formula for encrypting
and decrypting the message. With the help of newly modified formula I have done this
algorithm.

Strength

1. Use of two different characters Caesar Cipher and ASCII.


2. Each and every letters key is different.
3. It depends on ASCII value.
4. Changes in key every time makes difficult to identify the key for hacker.
5. This ASCII Caesar cipher provides better security than the original one.

Weakness
1. It can be encrypted and decrypted only with upper-case ASCII characters.
2. It can only be used in small networks.
3. In the scenario of cipher text, it can be easily broken because it consists less key.
4. The simple substitution cipher can be guessed by the attacker.
5. The attacker can reveal the whole message if he figures out the shift.

Application Area

The new modified algorithm can be used in simple pythons for encrypting and
decrypting the message. It can be used in java for encryption and decryption. It can also
be used in small organization for passing secret message.

16
Prakriti Kadel
CC5004NI Security in Computing

9 Conclusion
This coursework presents the evaluation about Security and it’s importance , CIA
triad and detail study about cryptography. Since ,every data and information, that
passes through computer network is not secure, the security helps in controlling the
illegal activities. Security provides an important role in helping organization to make
a profit and control the risk.

There is a detail study about Cryptography, its history and its algorithm .The
Cryptography is used for achieving the certain goals like Data Integrity,
Authentication, and Confidentiality e.t.c. So, to achieve these goals people are
introducing different kinds of algorithm. In this coursework I have introduced about
the Caesar cipher and its history advantages and disadvantages. It also includes
the newly modified Caesar Cipher and its detail.

17
Prakriti Kadel
CC5004NI Security in Computing

10 Bibliography
Adil Zaru, M.K. (2018) General Summary Of Cryptography , (2), p.4.

Aurora, R. (June 2012) Internation Jornal Of Computer Application. Performance


Analysis Of Cryptography Algorithms , 48(21), p.5.

Bubendorfer, K. (2011-16) Master in Software Development: Cyber Security, p.20.

Davies, D. (1997) Information Security Techinical Report. A Brief History Of


Cryptography, 2(2), p.5.

Hal Abelson, K.L..L. (2008) Blown to Bits: Your Life, Liberty, and Happiness After the
Digital Explosion. 1st ed.

HENDERSON, A. (2017) THE CIA


TRAID:CONFIDENTIALITY,INTEGRITY,AVAILABILITY. INFORMATION
TECHNOLOGY, p.1.

Kinamik. (2007) Have you thought about Intergrity? The CIA traid , p.14.

Kwang, H.L. (2019) Chap 2. Basic Encryption and Decryption. KAIST.

Lampson, B.W. (2004) Computer Security in the Real World. Principles of Computer
Systems , p.14.

M.Damico, T. (2009) A Brief History of Cryptography. Inquiries Journal, 1(11), p.1.

Malygin, E. (2014) Creation of Self-signed certificate on Windows 8. Bachelor's Thesis.


UK: MAMK University Of Applied Sciences MAMK University Of Applied Sciences..

S.Sunguna, D.V.D.R.M. (Apr-2016) IRJET. A Study on Symmetric and Assymetric Key


Encryption Algorithm , 3(4), p.5.

Sandeep Bhatt, P.K.M.a.L.Z. (2015) The Operational Role of Security Information and
Event Management Systems. CSIRTS, p.8.

Shilpa Pareek, A.G.D. (2017) Different Type Network Security Threats and Solutions, A
Review. IPASJ International Journal of Computer Science (IIJCS), 5(4), p.11.

Techopedia. (2019) Physical Security [Online]. Available from:


https://www.techopedia.com/definition/14514/physical-security [Accessed 3 February
2019].

Udepal Singh, U.G. (2013) An ASCII value based text data encryption. International
Journal of Scientific and Research Publications, 3(11), p.5.

18
Prakriti Kadel
CC5004NI Security in Computing

19
Prakriti Kadel

Potrebbero piacerti anche