SlideShare a Scribd company logo
1 of 10
CODEBLANK
A STUDENT THOUGHT
A PROJECT ON
INFORMATION SECURITY
COMPUTER ENGINEERING SEM – 6TH DIV B
GOVERNMENT ENGINEERING COLLEGE
SECTOR – 28, GANDHINAGAR
A
Project Report
On
Information Security Concept
Codeblank is an encryption algorithm
Guided by Assist. Prof. - Mr. Jaimin Shroff
Developed By Group NO.2
Trivedi Jaydip (130133107022)
Patel Harsh (130133107016)
Vadher Mitesh (120130107068)
Patel Pratik (130133107017)
Prajapati Saajan (120130107093)
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
INTRODUCTION
• An algorithm based on playing with ASCII values of all input characters of
input string which is enter by end user.
• The codeblank cipher algorithm is a simple algorithm that works & play
with an ASCII values of characters.
• It works with symmetric key i.e. same key used for both encryption as well
as decryption.
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
DESCRIPTION
• Algorithm is similar to Ceaser cipher
• The twist is next thing in algorithm
• Codeblank algorithm is divided in six different steps
• To study codeblank algorithm is easy if you know how to play with ascii
codes of characters
• In the case of codeblank we consider an array of a to z characters
• But key point is randomly selection of key position means every time key is
change on execution
• Encryption & decryption is possible only one time because of key position
changing every execution.
• Same key is used for both encryption & decryption so symmetric key is
used.
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
STEP - 1 :
Convert input string character in respected ASCII codes and store it
in array like below mentioned example of JavaScript code.
for ( i = 0 ; i < inputString.length; i++ ){
asciiArr[i] = inputString[ i ].charCodeAt( 0 );
}
STEP - 2 :
Fill A to Z array in capital or small letter as below mentioned
example of JavaScript code:
for ( i = 0, code=65; i < 26; i++, code++) {
atozArr[ i ] = String.fromCharCode( code );
}
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
STEP - 3 :
Choose randomly single character index from A to Z and differentiate its
position in one variable and its respected ASCII value in second variable.
position = randomIndexFromInterval(0, atozArr.length – 1);
positionAscii = atozArr[position].charCodeAt(0);
NOTE:
Use third party function for getting random number between
limits.
function randomIndexFromInterval(min, max) {
return Math.floor( Math.random( )*(max - min+1)+ min);
}
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
STEP - 4 :
Addition of each & every input String element to
Position Ascii which is shown in below example:
for( i =0; i < inputString.length; i++) {
encryptedString[i] = parseInt( asciiArr[ i ] ) +
parseInt( atozArr[position].charCodeAt( 0 ));
}
STEP - 5 :
Your encryption is complete
Now the question is key attachment
Whether key is to be attached with an encrypted string or not
it’s depend on the developer of algorithm
In this JavaScript ex. Key attachment is possible like this
encryptedString[ asciiArr.length ] = positionAscii;
STEP - 6 :
Finally, all steps are executed. So, your encryption is ready to display on html
page or it’s your choice
where to display.
for ( i = 0; i < encryptedString.length; i++){
outputString.innerHTML = outputString.innerHTML +
String.fromCharCode( encryptedString[i] );
}
Example of Algorithm like this:
Plain Text:
Hello I am creating presentation.
Cipher Text:
•‘®µµ¸i’iª¶i¬»®ª½²·°i¹»®¼®·½ª½²¸·wSI
Note: On next execution output is change due to random choice
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
SCREENSHOT of web browser
GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.

More Related Content

What's hot

MATRIX HASHING WITH TWO LEVEL OF COLLISION RESOLUTION
MATRIX HASHING WITH TWO LEVEL OF COLLISION RESOLUTIONMATRIX HASHING WITH TWO LEVEL OF COLLISION RESOLUTION
MATRIX HASHING WITH TWO LEVEL OF COLLISION RESOLUTIONNvk Chaitanya
 
1 arithmetic
1 arithmetic1 arithmetic
1 arithmeticfyjordan9
 
Assignment premier academic writing agency with industry
Assignment premier academic writing agency with industry Assignment premier academic writing agency with industry
Assignment premier academic writing agency with industry Nicole Valerio
 
More on Data Types (Exponential and Scientific Notations)
More on Data Types (Exponential and Scientific Notations)More on Data Types (Exponential and Scientific Notations)
More on Data Types (Exponential and Scientific Notations)Nicole Ynne Estabillo
 
The BUT and NBUT Boolean logic
The BUT and NBUT Boolean logicThe BUT and NBUT Boolean logic
The BUT and NBUT Boolean logicsciomathman
 
Digital electronics nandhini kusuma
Digital electronics nandhini kusumaDigital electronics nandhini kusuma
Digital electronics nandhini kusumakusuma11
 
Check the following function headers and locate as many errors you ca
 Check the following function headers and locate as many errors you ca Check the following function headers and locate as many errors you ca
Check the following function headers and locate as many errors you calicservernoida
 
Type Conversion, Precedence and Associativity
Type Conversion, Precedence and AssociativityType Conversion, Precedence and Associativity
Type Conversion, Precedence and AssociativityAakash Singh
 
Digital logic gates
Digital logic gatesDigital logic gates
Digital logic gatesjsearle11
 
Introduction to digital logic
Introduction to digital logicIntroduction to digital logic
Introduction to digital logicKamal Acharya
 
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET Journal
 

What's hot (17)

MATRIX HASHING WITH TWO LEVEL OF COLLISION RESOLUTION
MATRIX HASHING WITH TWO LEVEL OF COLLISION RESOLUTIONMATRIX HASHING WITH TWO LEVEL OF COLLISION RESOLUTION
MATRIX HASHING WITH TWO LEVEL OF COLLISION RESOLUTION
 
1 arithmetic
1 arithmetic1 arithmetic
1 arithmetic
 
C programming Tutorial Session 3
C programming Tutorial Session 3C programming Tutorial Session 3
C programming Tutorial Session 3
 
Assignment premier academic writing agency with industry
Assignment premier academic writing agency with industry Assignment premier academic writing agency with industry
Assignment premier academic writing agency with industry
 
Operators in c++
Operators in c++Operators in c++
Operators in c++
 
More on Data Types (Exponential and Scientific Notations)
More on Data Types (Exponential and Scientific Notations)More on Data Types (Exponential and Scientific Notations)
More on Data Types (Exponential and Scientific Notations)
 
C programming Tutorial Session 4
C programming Tutorial Session 4C programming Tutorial Session 4
C programming Tutorial Session 4
 
The BUT and NBUT Boolean logic
The BUT and NBUT Boolean logicThe BUT and NBUT Boolean logic
The BUT and NBUT Boolean logic
 
Digital electronics nandhini kusuma
Digital electronics nandhini kusumaDigital electronics nandhini kusuma
Digital electronics nandhini kusuma
 
Logic gate
Logic gateLogic gate
Logic gate
 
Check the following function headers and locate as many errors you ca
 Check the following function headers and locate as many errors you ca Check the following function headers and locate as many errors you ca
Check the following function headers and locate as many errors you ca
 
Type Conversion, Precedence and Associativity
Type Conversion, Precedence and AssociativityType Conversion, Precedence and Associativity
Type Conversion, Precedence and Associativity
 
Digital logic gates
Digital logic gatesDigital logic gates
Digital logic gates
 
Oop december 2018
Oop december 2018Oop december 2018
Oop december 2018
 
Introduction to digital logic
Introduction to digital logicIntroduction to digital logic
Introduction to digital logic
 
Digital Logic Gates
Digital Logic GatesDigital Logic Gates
Digital Logic Gates
 
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
 

Viewers also liked

Computer Software Engineers
Computer Software EngineersComputer Software Engineers
Computer Software EngineersKerrie Kegg
 
Life of Software Engineer
Life of Software Engineer Life of Software Engineer
Life of Software Engineer Namrata Ukirde
 
Some skills required to be a computer hardware engineer professional
Some skills required to be a computer hardware engineer professionalSome skills required to be a computer hardware engineer professional
Some skills required to be a computer hardware engineer professionalSayed Ahmed
 
HCI 2014 (7 of 10): HCI Engineering. UI Evaluation. Models
HCI 2014 (7 of 10): HCI Engineering. UI Evaluation. ModelsHCI 2014 (7 of 10): HCI Engineering. UI Evaluation. Models
HCI 2014 (7 of 10): HCI Engineering. UI Evaluation. ModelsSabin Buraga
 
Software Engineer in Test at DeNA
Software Engineer in Test at DeNASoftware Engineer in Test at DeNA
Software Engineer in Test at DeNAMasaki Nakagawa
 
ME-172 computer hardware
ME-172 computer hardwareME-172 computer hardware
ME-172 computer hardwareAzmol Abir
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineeringsommerville-videos
 
Computer fundamental introduction_and_types
Computer fundamental introduction_and_typesComputer fundamental introduction_and_types
Computer fundamental introduction_and_typesChittagong University
 
Next Generation Software Engineers Program
Next Generation Software Engineers ProgramNext Generation Software Engineers Program
Next Generation Software Engineers ProgramAbobakr Shahrah
 
An Introduction into Philosophy of Science for Software Engineers
An Introduction into Philosophy of Science for Software Engineers An Introduction into Philosophy of Science for Software Engineers
An Introduction into Philosophy of Science for Software Engineers Daniel Mendez
 
DISE - Introduction to Software Engineering
DISE - Introduction to Software EngineeringDISE - Introduction to Software Engineering
DISE - Introduction to Software EngineeringRasan Samarasinghe
 
History of CPU Architecture
History of CPU ArchitectureHistory of CPU Architecture
History of CPU ArchitectureTim Hall
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer systemmkhisalg
 
Introduction to Computers Slides
Introduction to Computers SlidesIntroduction to Computers Slides
Introduction to Computers SlidesSaide OER Africa
 

Viewers also liked (19)

Biology for Computer Engineers, Part 2: The Cell
Biology for Computer Engineers, Part 2: The CellBiology for Computer Engineers, Part 2: The Cell
Biology for Computer Engineers, Part 2: The Cell
 
Computer Software Engineers
Computer Software EngineersComputer Software Engineers
Computer Software Engineers
 
Life of Software Engineer
Life of Software Engineer Life of Software Engineer
Life of Software Engineer
 
Some skills required to be a computer hardware engineer professional
Some skills required to be a computer hardware engineer professionalSome skills required to be a computer hardware engineer professional
Some skills required to be a computer hardware engineer professional
 
Computer Engineering - Intro to the LRC
Computer Engineering - Intro to the LRC Computer Engineering - Intro to the LRC
Computer Engineering - Intro to the LRC
 
HCI 2014 (7 of 10): HCI Engineering. UI Evaluation. Models
HCI 2014 (7 of 10): HCI Engineering. UI Evaluation. ModelsHCI 2014 (7 of 10): HCI Engineering. UI Evaluation. Models
HCI 2014 (7 of 10): HCI Engineering. UI Evaluation. Models
 
Software Engineer in Test at DeNA
Software Engineer in Test at DeNASoftware Engineer in Test at DeNA
Software Engineer in Test at DeNA
 
ME-172 computer hardware
ME-172 computer hardwareME-172 computer hardware
ME-172 computer hardware
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Computer fundamental introduction_and_types
Computer fundamental introduction_and_typesComputer fundamental introduction_and_types
Computer fundamental introduction_and_types
 
Next Generation Software Engineers Program
Next Generation Software Engineers ProgramNext Generation Software Engineers Program
Next Generation Software Engineers Program
 
Computer application
Computer applicationComputer application
Computer application
 
An Introduction into Philosophy of Science for Software Engineers
An Introduction into Philosophy of Science for Software Engineers An Introduction into Philosophy of Science for Software Engineers
An Introduction into Philosophy of Science for Software Engineers
 
DISE - Introduction to Software Engineering
DISE - Introduction to Software EngineeringDISE - Introduction to Software Engineering
DISE - Introduction to Software Engineering
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
History of CPU Architecture
History of CPU ArchitectureHistory of CPU Architecture
History of CPU Architecture
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 
Introduction to Computers Slides
Introduction to Computers SlidesIntroduction to Computers Slides
Introduction to Computers Slides
 

Similar to Codeblank - A student thought

A compact FPGA-based montgomery modular multiplier
A compact FPGA-based montgomery modular multiplierA compact FPGA-based montgomery modular multiplier
A compact FPGA-based montgomery modular multipliernooriasukmaningtyas
 
I need the code for a Java programming project. Allow the user to ty.pdf
I need the code for a Java programming project. Allow the user to ty.pdfI need the code for a Java programming project. Allow the user to ty.pdf
I need the code for a Java programming project. Allow the user to ty.pdfvenkatesh24685
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityDefconRussia
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud ComputingIRJET Journal
 
V design and implementation of network security using genetic algorithm
V design and implementation of network security using genetic algorithmV design and implementation of network security using genetic algorithm
V design and implementation of network security using genetic algorithmeSAT Journals
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmeSAT Publishing House
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...IRJET Journal
 
the code below is a recommendation system application to suggest a s.pdf
the code below is a recommendation system application to suggest a s.pdfthe code below is a recommendation system application to suggest a s.pdf
the code below is a recommendation system application to suggest a s.pdfrajatchugh13
 
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...IJECEIAES
 
Arrays, Structures And Enums
Arrays, Structures And EnumsArrays, Structures And Enums
Arrays, Structures And EnumsBhushan Mulmule
 
Microcontroller based Integrated Circuit Tester
Microcontroller based Integrated Circuit TesterMicrocontroller based Integrated Circuit Tester
Microcontroller based Integrated Circuit TesterIJERA Editor
 
WINSEM2020-21_STS3105_SS_VL2020210500169_Reference_Material_I_17-Feb-2021_L8-...
WINSEM2020-21_STS3105_SS_VL2020210500169_Reference_Material_I_17-Feb-2021_L8-...WINSEM2020-21_STS3105_SS_VL2020210500169_Reference_Material_I_17-Feb-2021_L8-...
WINSEM2020-21_STS3105_SS_VL2020210500169_Reference_Material_I_17-Feb-2021_L8-...MaruMengesha
 
Applying Compiler Techniques to Iterate At Blazing Speed
Applying Compiler Techniques to Iterate At Blazing SpeedApplying Compiler Techniques to Iterate At Blazing Speed
Applying Compiler Techniques to Iterate At Blazing SpeedPascal-Louis Perez
 
java program assigment -2
java program assigment -2java program assigment -2
java program assigment -2Ankit Gupta
 
Data Structure Radix Sort
Data Structure Radix SortData Structure Radix Sort
Data Structure Radix SortBhavik Vashi
 
Lab manual data structure (cs305 rgpv) (usefulsearch.org) (useful search)
Lab manual data structure (cs305 rgpv) (usefulsearch.org)  (useful search)Lab manual data structure (cs305 rgpv) (usefulsearch.org)  (useful search)
Lab manual data structure (cs305 rgpv) (usefulsearch.org) (useful search)Make Mannan
 

Similar to Codeblank - A student thought (20)

A compact FPGA-based montgomery modular multiplier
A compact FPGA-based montgomery modular multiplierA compact FPGA-based montgomery modular multiplier
A compact FPGA-based montgomery modular multiplier
 
I need the code for a Java programming project. Allow the user to ty.pdf
I need the code for a Java programming project. Allow the user to ty.pdfI need the code for a Java programming project. Allow the user to ty.pdf
I need the code for a Java programming project. Allow the user to ty.pdf
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software security
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud Computing
 
V design and implementation of network security using genetic algorithm
V design and implementation of network security using genetic algorithmV design and implementation of network security using genetic algorithm
V design and implementation of network security using genetic algorithm
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithm
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
 
the code below is a recommendation system application to suggest a s.pdf
the code below is a recommendation system application to suggest a s.pdfthe code below is a recommendation system application to suggest a s.pdf
the code below is a recommendation system application to suggest a s.pdf
 
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
 
BIT211_2.pdf
BIT211_2.pdfBIT211_2.pdf
BIT211_2.pdf
 
IT6712 lab manual
IT6712 lab manualIT6712 lab manual
IT6712 lab manual
 
Arrays, Structures And Enums
Arrays, Structures And EnumsArrays, Structures And Enums
Arrays, Structures And Enums
 
Microcontroller based Integrated Circuit Tester
Microcontroller based Integrated Circuit TesterMicrocontroller based Integrated Circuit Tester
Microcontroller based Integrated Circuit Tester
 
WINSEM2020-21_STS3105_SS_VL2020210500169_Reference_Material_I_17-Feb-2021_L8-...
WINSEM2020-21_STS3105_SS_VL2020210500169_Reference_Material_I_17-Feb-2021_L8-...WINSEM2020-21_STS3105_SS_VL2020210500169_Reference_Material_I_17-Feb-2021_L8-...
WINSEM2020-21_STS3105_SS_VL2020210500169_Reference_Material_I_17-Feb-2021_L8-...
 
Applying Compiler Techniques to Iterate At Blazing Speed
Applying Compiler Techniques to Iterate At Blazing SpeedApplying Compiler Techniques to Iterate At Blazing Speed
Applying Compiler Techniques to Iterate At Blazing Speed
 
java program assigment -2
java program assigment -2java program assigment -2
java program assigment -2
 
Data Structure Radix Sort
Data Structure Radix SortData Structure Radix Sort
Data Structure Radix Sort
 
Lab manual data structure (cs305 rgpv) (usefulsearch.org) (useful search)
Lab manual data structure (cs305 rgpv) (usefulsearch.org)  (useful search)Lab manual data structure (cs305 rgpv) (usefulsearch.org)  (useful search)
Lab manual data structure (cs305 rgpv) (usefulsearch.org) (useful search)
 
G05124550
G05124550G05124550
G05124550
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Codeblank - A student thought

  • 1. CODEBLANK A STUDENT THOUGHT A PROJECT ON INFORMATION SECURITY COMPUTER ENGINEERING SEM – 6TH DIV B GOVERNMENT ENGINEERING COLLEGE SECTOR – 28, GANDHINAGAR
  • 2. A Project Report On Information Security Concept Codeblank is an encryption algorithm Guided by Assist. Prof. - Mr. Jaimin Shroff Developed By Group NO.2 Trivedi Jaydip (130133107022) Patel Harsh (130133107016) Vadher Mitesh (120130107068) Patel Pratik (130133107017) Prajapati Saajan (120130107093) GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
  • 3. GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR. INTRODUCTION • An algorithm based on playing with ASCII values of all input characters of input string which is enter by end user. • The codeblank cipher algorithm is a simple algorithm that works & play with an ASCII values of characters. • It works with symmetric key i.e. same key used for both encryption as well as decryption.
  • 4. GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR. DESCRIPTION • Algorithm is similar to Ceaser cipher • The twist is next thing in algorithm • Codeblank algorithm is divided in six different steps • To study codeblank algorithm is easy if you know how to play with ascii codes of characters • In the case of codeblank we consider an array of a to z characters • But key point is randomly selection of key position means every time key is change on execution • Encryption & decryption is possible only one time because of key position changing every execution. • Same key is used for both encryption & decryption so symmetric key is used.
  • 5. GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR. STEP - 1 : Convert input string character in respected ASCII codes and store it in array like below mentioned example of JavaScript code. for ( i = 0 ; i < inputString.length; i++ ){ asciiArr[i] = inputString[ i ].charCodeAt( 0 ); } STEP - 2 : Fill A to Z array in capital or small letter as below mentioned example of JavaScript code: for ( i = 0, code=65; i < 26; i++, code++) { atozArr[ i ] = String.fromCharCode( code ); }
  • 6. GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR. STEP - 3 : Choose randomly single character index from A to Z and differentiate its position in one variable and its respected ASCII value in second variable. position = randomIndexFromInterval(0, atozArr.length – 1); positionAscii = atozArr[position].charCodeAt(0); NOTE: Use third party function for getting random number between limits. function randomIndexFromInterval(min, max) { return Math.floor( Math.random( )*(max - min+1)+ min); }
  • 7. GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR. STEP - 4 : Addition of each & every input String element to Position Ascii which is shown in below example: for( i =0; i < inputString.length; i++) { encryptedString[i] = parseInt( asciiArr[ i ] ) + parseInt( atozArr[position].charCodeAt( 0 )); } STEP - 5 : Your encryption is complete Now the question is key attachment Whether key is to be attached with an encrypted string or not it’s depend on the developer of algorithm In this JavaScript ex. Key attachment is possible like this encryptedString[ asciiArr.length ] = positionAscii;
  • 8. STEP - 6 : Finally, all steps are executed. So, your encryption is ready to display on html page or it’s your choice where to display. for ( i = 0; i < encryptedString.length; i++){ outputString.innerHTML = outputString.innerHTML + String.fromCharCode( encryptedString[i] ); } Example of Algorithm like this: Plain Text: Hello I am creating presentation. Cipher Text: •‘®µµ¸i’iª¶i¬»®ª½²·°i¹»®¼®·½ª½²¸·wSI Note: On next execution output is change due to random choice GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.
  • 9. GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR. SCREENSHOT of web browser
  • 10. GOVERNMENT ENGINEERING COLLEGE, SECTOR-28, GANDHINAGAR.