In today\u2019s Knowledge Age, information transmission become part and parcel of our lives. In this scenario , computer networks holds pride of a Place. Now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming in the horizon as potentially massive problem. Hence this project aims at providing a modest solution to the problem using \u201cCryptology\u201d.
This project titled, \u201dCryptology And Communication \u201d, employs efficient algorithms such as Data Encryption Standard(DES)to tackle the problem of network security.
The project contains two parts viz.,COMMU NIC ATI ON andCRYPTO LOG Y. The communication part demonstrates that two or more computers can be linked together like a miniL AN . One computer was called
two .One exclusively for sending and receiving data (data can be files or messages) over the communication channel. This program is meant only for the nodes. The second program must be executed on a central computer, which was referred as FILE SERVER. A user working on the terminal can place a file in the server or get the file from the server. Some of the features offered in the
The other part,CRYPTOL OGY, demonstrates how the message in plain natural language called plaintext can be enciphered and again deciphered back to the plaintext. Many famous algorithms or ciphering techniques such as CAESAR CIPHER, NIHILIST TRANSPOSITION, VIGNERE CIPHER, UNIT TRANSPOSITION, GRONSFELD CIPHER, BEAUFORT CIPHER,VARIANT BEAUFORT,KNIGHT\u2019S TOUR etc \u2026. had been implemented successfully as one integrated package. The enciphering process scrambles the bits so thoroughly that a person wanting the information is unlikely to be able to unscramble them.
The concept of cryptography has great importance. right from the days of kings people want to communicate without being recognized. To acheive that they used to change the text into unreadable or un intelligible form.
The well recorded strategy is followed by ceaser who used to transfer data in encrypted form. in his method he used to replace every character by the character three places next to it in the alphabet, there by making it unreadable
During the second world war this concept played pivotal role the germans invented enigma machine, the Japanese purple .the allied forces had the great difficulty in decoding the actual text. Finally turing cracked the code and discovered the machine bomb which can decrypt the message .this led to the allied victory but the methods used for encryption are old they used rotors and machines to do that. with the advent of computer and the whole task is being done with the computer
The art of secret writing is not new today, It dates back to thousand of years. The content of this chapter describes general terms most often used in the field of \u201ccryptology\u201d. The moment you connect your computer to any other computer, whether by Local Area Network with coworkers or by a dial-up connection to an internet provider, you subject yourself to some risk that your data could be compromised. Your data could be stolen or destroyed. Your communications could be intercepted or misdirected.
The security of internet host sites is nebulous at best. Eventually all of them will face some sort of break-in. it might be a hacker trying to prove that he or she can gain unauthorized access to an internet site, or it might be a malicious attempt to destroy data. Being forewarned is your best defense against your data
This action might not be possible to undo. Are you sure you want to continue?