--%>

Project to simulate network attack defense mechanism

Write an Idea for programming project to simulate a network attack or threat mechanism or a defense mechanism.

Encipher message by using a keyword;

Decipher message by using a keyword.

Here is an detailed example of a user interaction with the encipher a program: A Program output is in bold & user input is in italics.

 Enter keyword: Javabean

 Enter a message end with a blank line:

We are the ideal!

We jqe sde Amqc!

Resistance is futile!

Qerfrsjlve for ntsfie!

Here is an detailed example of a user interaction with a decipher program

Enter the keyword: Javabean

Enter the message end with a blank line

We jqe sde Amqc!

We are the Borg!

Qerfrsjlve fr ntsfie!

Resistance is futile!

 This is mechanism how enciphering works. First, the keyword is used to create a "ciphertext" alphabet. The keyword is written out with repeated letters removed, and then the remaining letters of the normal alphabet (the "plaintext" alphabet" are added). So

from "Javabean", we get:

plaintext:

a b c d e f g h i j k l m n o p q r s t u v w x y z

ciphertext:

j a v b e n c d f g h i k l m o p q r s t u w x y z

For above purpose, we ignore the case of the letters, treating them all in lowercase. Now to encipher a message, we have to replace each letter in the message with the corresponding ciphertext letter. Other characters, like spaces & punctuation, are left unchanged. Uppercase letters are converted to lowercase, substituted, and then converted to uppercase. For example, the letter 'B' is first converted to 'b', which is the second letter in the plaintext alphabet, and then substituted with the second letter of the ciphertext alphabet, which is 'a', and then converted back to uppercase, i.e. 'A'.

Deciphering is very similar, except which each letter is located in the ciphertext alphabet, and substituted with the corresponding letter from the plaintext alphabet. So, for example, 'f' is the 9th letter in the ciphertext alphabet, so it is substituted with the 9th letter is the plaintext alphabet, which is 'i'.

   Related Questions in Computer Network Security

  • Q : Problems related to Cryptography and

    A) Provide a specific illustration of how inference control might be implemented in the database.B) For a public-key encryption system (like PGP), list some areas for and against utilizing the similar key pair for both encryption and signature.

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an

  • Q : IP addressing and Subnetting

    Assumption: All subnet values can be used and the all "0"s is the first subnet. Question 1 - You have been assigned the 160.5

  • Q : Explain Identifier Explain the term key

    Explain the term key Identifier?

  • Q : What is hash function Explain the term

    Explain the term hash function?

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : What is Service set id or SSID-LAN

    SSID (Service set id): SSID is an identifier of the users of the network. SSID acts as a password and it is of 32 characters. The users in the particular network need to know the SSID. Since only users have the 32 SSID, the attackers cannot access the

  • Q : Construction of S-box Explain how the

    Explain how the S-box is constructed?

  • Q : LAN and WAN components LO5: Design a

    LO5: Design a small routable network comprising LAN and WAN components Overview This case study based assignment assesses the student's ability to design the logical and physical netw

  • Q : Ip Question 4 - You have been asked to

    Question 4 - You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year. Each location should have a user network