Uploaded by Farooq Omaar

ORIGINAL PROPOSAL PROJECT

advertisement
1
GOMBE STATE UNIVERSTITY
FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
NAME: FARUK ABUBAKAR UMAR
REG/NO: UG16/SCCS/1115
PROJECT SUPERVISOR: Mrs. MAIMUNA TABRA
COSC 400 (PROJECT)
DATE: 15th February, 2021
PROPOSED TOPIC:
DESIGN
OF
MULTIKEY
TRANSPOSITION CIPHER.
1|Page
CRYPTO
SYSTEM
USING
NIHILIST
2
INTRODUCTION
In the past, Security was simply a matter of the door or storing files in a locked filling cabinet
or safe. Today, paper is no longer the only medium of choice for housing. Files are stored in
computer databases as well file cabinets. Hard drive floppy disks hold many of our secret
information’s.
“Cryptography is the method that allows information to be sent in a secured form in such a
way that the receiver is able to retrieve the information sent” by (Zimmermann, 2013).
In
the history
of
cryptography,
the Nihilist
cipher is
a
manually
operated symmetric encryption cipher, originally used by Russian Nihilists in the 1880s to
organize terrorism against the tsarist regime. The term is sometimes extended to several
improved algorithms used much later for communication by the First Chief Directorate with
its spies.
Transposition Cipher: - is a method of encryption by which the positions held by units
of plaintext (which are commonly characters or groups of characters) are shifted according to
a regular system, so that the cipher text constitutes a permutation of the plaintext. That is, the
order of the units is changed (the plaintext is reordered). Mathematically a bijective function is
used on the characters' positions to encrypt and an inverse function to decrypt.
This project presents a new method of ciphering messages using Nihilist cipher.
THE PROPOSED SYSTEM
The proposed crypto system will provide high strength security to electronic file maintained at
a centralized security in an automated form. In using the proposed system the electronic file is
collected and it will be saved into the computer system. After the text file has been obtained,
the encryption process can be achieved by placing the text file into the required text field for
encryption. Once clicking on the encrypt button in the program interface the plain text is
encrypted using the simple columnar transposition cipher and could be save as a cipher text on
the computer. And when the scrambled (cipher text) is needed it must be decrypted before use.
2|Page
3
THE OBJECTIVES OF THE PROPOSED SYSTEM
The Objectives of this Proposed System are:
1. Providing security to an electronic file by the design and implementation of userdefined application software that can be used concerning text and other symbols to a
form that could only be understood by those authorized.
2. Data encryption (enciphering) and decryption (deciphering) to guide against
unauthorized access to data or information in an electronic file
3. Also, the project work is aim at controlling the rate of data crimes inculcating the sale
of organization’s secret and operational information to others.
4. The programming language I wish during the design is Microsoft Visual Basic.Net This
language (Visual Basic .net) has been selected for use in the design and construction of
the enciphering and deciphering routines which convert a group of text into their cipher.
Also
This work is limited to only file security encryption in computer system within an
organization’s to protect their secret and operational information from others unauthorized
access.
REFERENCES
 http://en.wikipedia.org/wiki/Transposition_Cipher.
 http://www.tutorialpoints/introductiontocryptography.com
 http://pgpi.org/../introtocrypto.pdf
 http://www.researchgate.net/publication/342626467_A_Modified_Nihilist_Cipher_Based_on
_XOR_Operation (International Journal of Advanced Trends in Computer Science and
Engineering )
 Arihant Online Academy (Online videos tutorials on Nihilist, Columnar Transposition Cipher)
3|Page
Download