--%>

Project to simulate network attack defense mechanism

Write an Idea for programming project to simulate a network attack or threat mechanism or a defense mechanism.

Encipher message by using a keyword;

Decipher message by using a keyword.

Here is an detailed example of a user interaction with the encipher a program: A Program output is in bold & user input is in italics.

 Enter keyword: Javabean

 Enter a message end with a blank line:

We are the ideal!

We jqe sde Amqc!

Resistance is futile!

Qerfrsjlve for ntsfie!

Here is an detailed example of a user interaction with a decipher program

Enter the keyword: Javabean

Enter the message end with a blank line

We jqe sde Amqc!

We are the Borg!

Qerfrsjlve fr ntsfie!

Resistance is futile!

 This is mechanism how enciphering works. First, the keyword is used to create a "ciphertext" alphabet. The keyword is written out with repeated letters removed, and then the remaining letters of the normal alphabet (the "plaintext" alphabet" are added). So

from "Javabean", we get:

plaintext:

a b c d e f g h i j k l m n o p q r s t u v w x y z

ciphertext:

j a v b e n c d f g h i k l m o p q r s t u w x y z

For above purpose, we ignore the case of the letters, treating them all in lowercase. Now to encipher a message, we have to replace each letter in the message with the corresponding ciphertext letter. Other characters, like spaces & punctuation, are left unchanged. Uppercase letters are converted to lowercase, substituted, and then converted to uppercase. For example, the letter 'B' is first converted to 'b', which is the second letter in the plaintext alphabet, and then substituted with the second letter of the ciphertext alphabet, which is 'a', and then converted back to uppercase, i.e. 'A'.

Deciphering is very similar, except which each letter is located in the ciphertext alphabet, and substituted with the corresponding letter from the plaintext alphabet. So, for example, 'f' is the 9th letter in the ciphertext alphabet, so it is substituted with the 9th letter is the plaintext alphabet, which is 'i'.

   Related Questions in Computer Network Security

  • Q : Wireless Antennas with significance

    Explain the term Wireless Antennas with significance?

  • Q : Advantages of ReefEdge technology

    Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc

  • Q : LAN Security Systems LAN Security

    LAN Security Systems: The threats might be of very serious concern to the organization and hence they should be addressed with the deployment of a security system which can prevent the attacker to access the information which is sensitive to the organ

  • Q : Types of information derived from

    Explain the types of information which are derived from the traffic analysis attack?

  • Q : Secure a network perimeter How can you

    How can you secure a network perimeter? Be ensure to discuss all three of the basic access points into most networks, as well as the different types of firewalls commonly used today.

  • Q : Final set of criteria to determine

    Explain the final set of criteria which is used by the NIST in order to determine the candidate AES ciphers?

  • Q : Primitive operations in RC5 Explain the

    Explain the primitive operations which are used in the RC5?

  • Q : AES and Rijndael State difference

    State difference between the AES and Rijndael?

  • Q : What is Service set id or SSID-LAN

    SSID (Service set id): SSID is an identifier of the users of the network. SSID acts as a password and it is of 32 characters. The users in the particular network need to know the SSID. Since only users have the 32 SSID, the attackers cannot access the

  • Q : What is message authentication Explain

    Explain what is meant by the term message authentication? Describe the classes of message authentication function.