Visual execution of caesar cipher methods and its application

Visual Execution Of Caesar Cipher Methods And Its Application is developed for beginner to learn basic encryption process and inspect what is actually happen during encryption and decryption process in visualization approach. Most of cryptography tools developed and provide in the net is only able...

Full description

Bibliographic Details
Main Author: Nur Syafiqa, Ismail
Format: Undergraduates Project Papers
Language:English
Published: 2014
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/13353/1/FSKKP%20-%20NUR%20SYAFIQA%20ISMAIL.PDF
_version_ 1825822966690086912
author Nur Syafiqa, Ismail
author_facet Nur Syafiqa, Ismail
author_sort Nur Syafiqa, Ismail
collection UMP
description Visual Execution Of Caesar Cipher Methods And Its Application is developed for beginner to learn basic encryption process and inspect what is actually happen during encryption and decryption process in visualization approach. Most of cryptography tools developed and provide in the net is only able to encrypt and decrypt the data without explaining how do the process take place. The methodology used to implement this project is based on the Object Oriented Cycle Model. This project can contribute on logical understanding and to ensure beginner able to applied the theory in a real environment. The important things considered in this program is explanation as an introduction about the Cipher chosen before continue to next lesson. This program is divided into three sequential phase for each cipher. The first phase is briefly explanation about the cipher and how it work. The explanation is deliver in form of wording explanation. Second phase is demo on how the cipher is encrypted and decrypted. The last phase need totally user interaction with the application where the user need to enter the plaintext, enter the key, execute and exit. The process is presented by using visualization execution. This program also considered more about the interface. Simple interface which holds two panels dedicated to write or paste the text for encryption or decryption, and the other panel for viewing execution concept is implement. Besides that, button for play, pause, stop, next, previous and end also provided to ensure user can use the application easily. This can help user easily do understand the concept well. Other than that, this program also provide brute force attack panel to view brute force list for each keys. The cipher covered for this program is Caesar Cipher methods.
first_indexed 2024-03-06T12:04:24Z
format Undergraduates Project Papers
id UMPir13353
institution Universiti Malaysia Pahang
language English
last_indexed 2024-03-06T12:04:24Z
publishDate 2014
record_format dspace
spelling UMPir133532021-02-12T15:22:39Z http://umpir.ump.edu.my/id/eprint/13353/ Visual execution of caesar cipher methods and its application Nur Syafiqa, Ismail QA76 Computer software T Technology (General) Visual Execution Of Caesar Cipher Methods And Its Application is developed for beginner to learn basic encryption process and inspect what is actually happen during encryption and decryption process in visualization approach. Most of cryptography tools developed and provide in the net is only able to encrypt and decrypt the data without explaining how do the process take place. The methodology used to implement this project is based on the Object Oriented Cycle Model. This project can contribute on logical understanding and to ensure beginner able to applied the theory in a real environment. The important things considered in this program is explanation as an introduction about the Cipher chosen before continue to next lesson. This program is divided into three sequential phase for each cipher. The first phase is briefly explanation about the cipher and how it work. The explanation is deliver in form of wording explanation. Second phase is demo on how the cipher is encrypted and decrypted. The last phase need totally user interaction with the application where the user need to enter the plaintext, enter the key, execute and exit. The process is presented by using visualization execution. This program also considered more about the interface. Simple interface which holds two panels dedicated to write or paste the text for encryption or decryption, and the other panel for viewing execution concept is implement. Besides that, button for play, pause, stop, next, previous and end also provided to ensure user can use the application easily. This can help user easily do understand the concept well. Other than that, this program also provide brute force attack panel to view brute force list for each keys. The cipher covered for this program is Caesar Cipher methods. 2014 Undergraduates Project Papers NonPeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/13353/1/FSKKP%20-%20NUR%20SYAFIQA%20ISMAIL.PDF Nur Syafiqa, Ismail (2014) Visual execution of caesar cipher methods and its application. Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang.
spellingShingle QA76 Computer software
T Technology (General)
Nur Syafiqa, Ismail
Visual execution of caesar cipher methods and its application
title Visual execution of caesar cipher methods and its application
title_full Visual execution of caesar cipher methods and its application
title_fullStr Visual execution of caesar cipher methods and its application
title_full_unstemmed Visual execution of caesar cipher methods and its application
title_short Visual execution of caesar cipher methods and its application
title_sort visual execution of caesar cipher methods and its application
topic QA76 Computer software
T Technology (General)
url http://umpir.ump.edu.my/id/eprint/13353/1/FSKKP%20-%20NUR%20SYAFIQA%20ISMAIL.PDF
work_keys_str_mv AT nursyafiqaismail visualexecutionofcaesarciphermethodsanditsapplication