Sie sind auf Seite 1von 4

-CIPHER PROSubmission by DPS Gurgaon

INTRODUCTION
In todays world, where we depend on our computer for every task
from mail services to banking and shopping, it is vital to make sure
that our data is secure such that it is not leaked to any third party.
External access to personal data such as passwords, secure files and
credit card details may lead to the misuse of information entailing our
credentials.
This, is where the concept of cryptography comes into play.
Cryptography is the science or study of the techniques of secret
writing, especially code and cipher systems. Cryptography is used by
everyone from banks to army to government facilities. This is a
practice that ensure that even if the data is somehow intercepted,
translating the raw data into comprehensible code without knowledge
of the methods used to create it is close to impossible.

OVERVIEW OF CIPHER PRO


Cipher Pro provides a simple and efficient way to encrypt and decrypt
your messages so that they are secure.

NEED OF CIPHER PRO


Data security in modern days is a commonplace necessity. With
increasing quantities of data per person which might be misused, it is
important to provide ways to protect all sorts of information - from
identity based data to limited access files.
Thus, we need the power of cryptography a.k.a. encryptors and
decryptors to make sure our data is secure. Army needs ciphers to
make sure their messages are not leaked to spying countries, chat
programs also need ciphers to encrypt their messages so that the
privacy of users is protected.

ADVANTAGES OF CIPHER PRO


1 character could be replaced by 64 other characters.

5 letter word has a whooping 1,28,84,90,18,880 possible


combinations!
So the possibility of getting it right is less than 0.0000000038%
Thus, with a basic statistic, it can be established that the extent of
ciphering and the possibilities of creating a cipher algorithm are
endless.

WORKING OF CIPHER PRO


Let us take an example to understand how the encryption
process works:
INPUT:
ab ab
First of all the input is converted to binary. This is done for EACH WORD
SEPARATELY. The binary representation for the first word is
0110000101100010
Now 01 is removed from the front of all the characters. Now this is
stored in an 2D array while following a certain pattern.
100101
001000
Basically, the array is filled column-wise. Now the contents will be read
row-wise and stored inside another array. This gives us:
100101001000
Now the 01's which we removed previously are added again. Giving us
the final array.
0110010101001000
Now this is converted to characters giving us:
eH
After this is done for all the words, two in this case, the sentence looks
like this:
eH eH
Now this set of strings is stored in an 2D array following the pattern as
before, giving us:

e_H
He_
Underscore is used to represent a blank space. Now we read row-wise
to get the encrypted message:
e_HHe
Hence, using a 2 layer encryption method our messages are now
secure.
Second, we take an example to understand how the decryption
process works:
INPUT: e_HHe
First we fill a 2D array row-wise. This is done for EACH WORD
SEPARATELY.
e_H
He
Now this is read column-wise and stored in another array, giving us:
eH eH
Now this is converted to binary, the binary representation for the
above is:
0110010101001000
The 01 is removed from the front and it is filled in an 2D array rowwise, giving us:
100101
001000
Next, we read the characters column-wise to get the binary
100001100010
After adding the 01s which we removed previously, we get
0110000101100010
On converting this to characters we get
ab

After this is done for all the words, two in this case, the words are
combined to get the original sentence.
ab ab

Das könnte Ihnen auch gefallen