1 GOMBE STATE UNIVERSTITY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE NAME: FARUK ABUBAKAR UMAR REG/NO: UG16/SCCS/1115 PROJECT SUPERVISOR: Mrs. MAIMUNA TABRA COSC 400 (PROJECT) DATE: 15th February, 2021 PROPOSED TOPIC: DESIGN OF MULTIKEY TRANSPOSITION CIPHER. 1|Page CRYPTO SYSTEM USING NIHILIST 2 INTRODUCTION In the past, Security was simply a matter of the door or storing files in a locked filling cabinet or safe. Today, paper is no longer the only medium of choice for housing. Files are stored in computer databases as well file cabinets. Hard drive floppy disks hold many of our secret information’s. “Cryptography is the method that allows information to be sent in a secured form in such a way that the receiver is able to retrieve the information sent” by (Zimmermann, 2013). In the history of cryptography, the Nihilist cipher is a manually operated symmetric encryption cipher, originally used by Russian Nihilists in the 1880s to organize terrorism against the tsarist regime. The term is sometimes extended to several improved algorithms used much later for communication by the First Chief Directorate with its spies. Transposition Cipher: - is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the cipher text constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt. This project presents a new method of ciphering messages using Nihilist cipher. THE PROPOSED SYSTEM The proposed crypto system will provide high strength security to electronic file maintained at a centralized security in an automated form. In using the proposed system the electronic file is collected and it will be saved into the computer system. After the text file has been obtained, the encryption process can be achieved by placing the text file into the required text field for encryption. Once clicking on the encrypt button in the program interface the plain text is encrypted using the simple columnar transposition cipher and could be save as a cipher text on the computer. And when the scrambled (cipher text) is needed it must be decrypted before use. 2|Page 3 THE OBJECTIVES OF THE PROPOSED SYSTEM The Objectives of this Proposed System are: 1. Providing security to an electronic file by the design and implementation of userdefined application software that can be used concerning text and other symbols to a form that could only be understood by those authorized. 2. Data encryption (enciphering) and decryption (deciphering) to guide against unauthorized access to data or information in an electronic file 3. Also, the project work is aim at controlling the rate of data crimes inculcating the sale of organization’s secret and operational information to others. 4. The programming language I wish during the design is Microsoft Visual Basic.Net This language (Visual Basic .net) has been selected for use in the design and construction of the enciphering and deciphering routines which convert a group of text into their cipher. Also This work is limited to only file security encryption in computer system within an organization’s to protect their secret and operational information from others unauthorized access. REFERENCES http://en.wikipedia.org/wiki/Transposition_Cipher. http://www.tutorialpoints/introductiontocryptography.com http://pgpi.org/../introtocrypto.pdf http://www.researchgate.net/publication/342626467_A_Modified_Nihilist_Cipher_Based_on _XOR_Operation (International Journal of Advanced Trends in Computer Science and Engineering ) Arihant Online Academy (Online videos tutorials on Nihilist, Columnar Transposition Cipher) 3|Page