Professional Documents
Culture Documents
5. Polyalphabetic Substitution Cipher a cipher that uses a key to select the letters of the
message from the 26 alphabets for different parts of the plain text.
6. Vigenere Cipher- cipher which utilizes a one-time pad that involves an arbitrarily long
nonrepeating sequence of numbers that are combined with the plaintext.
7. Data Encryption Standard (DES) a system developed for plaintext to be encrypted into
text strings after permutations and substitutions for the subscript list bit string using
among the 2^64 possible arrangements of 64 bits using key sizes of 56- bits . The keys
are actually stored as being 64 bits long whereby every 8th bit is left unused for bits
numbered 8, 16, 24, 32, 40, 48, 56, and 64.
2. Overall Description
This introduction is intended to give a brief overview of the Encryption Project for this term.
The following section will give background information that is necessary to fully understand
the functional and non-functional requirements of the system. All of the requirements of the
system will be stated, and each requirement must be testable.
2.1
Product Perspective
The ciphers that we are going to use are mono-alphabetic Caeser cipher. Specifically, for
these ciphers, encryption is accomplished by replacing each character in the plaintext
with a different letter in the ciphertext.
that displays any output that will attempt to give the user some insight into how the
encryption schemes work.
cleartext inverted. That is, this method is passed an array that contains the ciphertext, as well as a
key k by which to reverse the shift of each character. The method is bound to return a newly
constructed array that contains the recovered cleartext.
4.1 Encryption Algorithm Selection
The user must be able to select the encryption mechanism to be used to create the ciphertext.
DES encryption key is derived and encrypted. A simple iterative test was desired, so that the only
storage requirements were the desired starting value, the desired ending value, and the number of
DES iterations to perform. Alternation of encryption and decryption was chosen in order to
exercise both modes equally.
4.2 Viewing Messages
4.2.1 Plaintext
The user must be able to view the plaintext message that he or she has input.
4.2.2Ciphertext
The user must be allowed to view the encoded ciphertext in one of a variety of forms that are
used in encodings today, mainly the ASCII standard, decimal, hexadecimal, and binary.
4.3 View Console
The user must be able to view any messages that will give them insight into the inner workings
of the particular encryption algorithm.
Reference