SlideShare a Scribd company logo
This is your
presentation title
CAESAR CIPHER
2
TEAM MEMBERS
DHIRENDRA SHANKRITYAN
SHIWANGI SRIVASTAVA
AVISHREE
SYAM
PROJECT DESCRIPTION
CAESAR CIPIHER: -
It is a platform where the users enjoy the various types of cipher
codes from the noob level to the pro level. In this people will find
various algorithms to encrypt and decrypt the code. like
alphabetic, polyalphabetic substitution, alphanumeric, etc.
3
Important points; -
Encryption-Decryption: -
encryption is the process of converting
data, within a database, in plain text
format into a meaningless cipher text by
means of a suitable algorithm.
decryption is converting the
meaningless cipher text into the original
information using keys generated by the
encryption algorithms
Plaintext: -
Let’s start with the most basic term to
know, which is simple but just as
important as the others: plaintext is a
readable, plain message that anyone
can read.
Cipher text: -
It is the result of the encryption
process. The encrypted plaintext
appears as apparently random strings
of characters, rendering them
useless. A cipher is another way of
referring to the encryption algorithm
that transforms the plaintext, hence
the term cipher text.
Keys: -
The encryption process requires
a cryptographic key that tells the
algorithm how to transform the
plaintext into cipher text
Hash: -
Hashing is generating a value or
values from a string of text using
a mathematical function.
4
INFORMATION
GATHERING
BUILDING
ALGORITHM
WEBSITE
CREATION
CREATING
INTERFACE
Our project shows the power of security at its peak . With the help
of cryptography now one can make their conversation private that
other will never be knowing.It can help in keeping one’s important
information safe.
We have completed our project in three stages like noob,
intermediate and ended it with the creation of our own very cipher
text.
1. The noob level comprises of the ancient cipher text name
before the great Julius Caeser, he used this method of
communication so no other but the person he is sending the text
will only understand it.
2. the intermediate level is a polyalphabetic cipher because it
uses two or more cipher alphabets to encrypt the data. In other
words, the letters in the Vigenère cipher are shifted by different
amounts, normally done using a word or phrase as the encryption
key .
3. And it ended with the creation of our own cipher text with our
own algorithm. Where the plain text is getting converted into
alphanumeric cipher text.
After that we created a website in which we uploaded our
cipher’s. So one can enjoy the benefit from any part of their world
at their finger tips.
This project is just not about encryption but at this stage
where nothing is secure cryptography is the only solution so that
we can protect our valuable documents safe and protect it from
getting vulnerable which in turn reduces the breech of security.
6
Thanks!
Any questions?
Find me at
dhirendrasngh81@gmail.com

More Related Content

PDF
Cryptology - The practice and study of hiding information
PPTX
Cryptography and encryption
PDF
Cryptology - Antônio Lacerda
PDF
Presentation on Cryptography
PPT
Cryptography basices
PPTX
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
PPTX
Cryptography ppt ,computer system security. PPT
Cryptology - The practice and study of hiding information
Cryptography and encryption
Cryptology - Antônio Lacerda
Presentation on Cryptography
Cryptography basices
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
Cryptography ppt ,computer system security. PPT

What's hot (20)

PPTX
Cryptography ppt by vaishnavi khandelwal
PPTX
Cryptography
PPTX
Crytography
PPT
Information Security & Cryptography
PPTX
Cryptography
PPT
Cryptography ppt
PPTX
Cryptography
PPTX
Advanced cryptography and implementation
PPTX
Cryptography.ppt
PPTX
Overview of cryptography
PPT
Cryptography and E-Commerce
PPS
Criptography
PPTX
Cryptography
PPT
Cryptography
PPTX
Cryptography.ppt
PDF
Information Security Cryptography ( L01- introduction )
PPTX
Cryptography
PDF
What is Cryptography?
PPT
Cryptography Fundamentals
PPTX
Cryptography
Cryptography ppt by vaishnavi khandelwal
Cryptography
Crytography
Information Security & Cryptography
Cryptography
Cryptography ppt
Cryptography
Advanced cryptography and implementation
Cryptography.ppt
Overview of cryptography
Cryptography and E-Commerce
Criptography
Cryptography
Cryptography
Cryptography.ppt
Information Security Cryptography ( L01- introduction )
Cryptography
What is Cryptography?
Cryptography Fundamentals
Cryptography
Ad

Similar to Caesar cipher (20)

PDF
Cryptography Intro - NCL
PPTX
Introduction to cryptography
PPTX
Fundamentals of cryptography workshop
PPTX
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
PPTX
Cryptography, Cryptology, Encryption and types
PPTX
IANSunit 1_cryptography_2.pptxv xvxvxvxv
PPTX
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
PPTX
Module 1.pptx
PPT
classicalencryptiontechniques.ppt
PPTX
Classical encryption technique -Cryptoggraphy.pptx
PPTX
cryptography symmentric.pptx
PDF
Bt0088 cryptography and network security1
PPT
CryptographyCryptographyCryptography.ppt
PPSX
Introductory Lecture on Cryptography and Information Security
DOC
MAJOR PROJECT FORMAT--2013(new 1)
PPT
unit 2.ppt
DOCX
Network Security
DOCX
Network Security
PDF
Cipher techniques
PDF
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Cryptography Intro - NCL
Introduction to cryptography
Fundamentals of cryptography workshop
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
Cryptography, Cryptology, Encryption and types
IANSunit 1_cryptography_2.pptxv xvxvxvxv
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
Module 1.pptx
classicalencryptiontechniques.ppt
Classical encryption technique -Cryptoggraphy.pptx
cryptography symmentric.pptx
Bt0088 cryptography and network security1
CryptographyCryptographyCryptography.ppt
Introductory Lecture on Cryptography and Information Security
MAJOR PROJECT FORMAT--2013(new 1)
unit 2.ppt
Network Security
Network Security
Cipher techniques
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Ad

More from Technical Hub (15)

PPTX
Vulnerability assessment
PPTX
Traffic sign reading robot
PPTX
Suggestion box
PPTX
Smart mirror
PPTX
Result management system
PPTX
Hostel gym
PPTX
Elastic Load Balancing
PPTX
Alexa voice bot
PPTX
Layer wise network security
PPTX
Resume builder
PPTX
Result management system
PPTX
Passive footprinting
PPTX
Co cubes analysis
PPTX
Automatic generation of 50 addresses
PPTX
Technical Hub @ Aditya Educational Institutions
Vulnerability assessment
Traffic sign reading robot
Suggestion box
Smart mirror
Result management system
Hostel gym
Elastic Load Balancing
Alexa voice bot
Layer wise network security
Resume builder
Result management system
Passive footprinting
Co cubes analysis
Automatic generation of 50 addresses
Technical Hub @ Aditya Educational Institutions

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
NewMind AI Monthly Chronicles - July 2025
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I
Machine learning based COVID-19 study performance prediction
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?

Caesar cipher

  • 1. This is your presentation title CAESAR CIPHER
  • 2. 2 TEAM MEMBERS DHIRENDRA SHANKRITYAN SHIWANGI SRIVASTAVA AVISHREE SYAM PROJECT DESCRIPTION CAESAR CIPIHER: - It is a platform where the users enjoy the various types of cipher codes from the noob level to the pro level. In this people will find various algorithms to encrypt and decrypt the code. like alphabetic, polyalphabetic substitution, alphanumeric, etc.
  • 3. 3 Important points; - Encryption-Decryption: - encryption is the process of converting data, within a database, in plain text format into a meaningless cipher text by means of a suitable algorithm. decryption is converting the meaningless cipher text into the original information using keys generated by the encryption algorithms Plaintext: - Let’s start with the most basic term to know, which is simple but just as important as the others: plaintext is a readable, plain message that anyone can read. Cipher text: - It is the result of the encryption process. The encrypted plaintext appears as apparently random strings of characters, rendering them useless. A cipher is another way of referring to the encryption algorithm that transforms the plaintext, hence the term cipher text. Keys: - The encryption process requires a cryptographic key that tells the algorithm how to transform the plaintext into cipher text Hash: - Hashing is generating a value or values from a string of text using a mathematical function.
  • 5. Our project shows the power of security at its peak . With the help of cryptography now one can make their conversation private that other will never be knowing.It can help in keeping one’s important information safe. We have completed our project in three stages like noob, intermediate and ended it with the creation of our own very cipher text. 1. The noob level comprises of the ancient cipher text name before the great Julius Caeser, he used this method of communication so no other but the person he is sending the text will only understand it. 2. the intermediate level is a polyalphabetic cipher because it uses two or more cipher alphabets to encrypt the data. In other words, the letters in the Vigenère cipher are shifted by different amounts, normally done using a word or phrase as the encryption key . 3. And it ended with the creation of our own cipher text with our own algorithm. Where the plain text is getting converted into alphanumeric cipher text. After that we created a website in which we uploaded our cipher’s. So one can enjoy the benefit from any part of their world at their finger tips. This project is just not about encryption but at this stage where nothing is secure cryptography is the only solution so that we can protect our valuable documents safe and protect it from getting vulnerable which in turn reduces the breech of security.
  • 6. 6 Thanks! Any questions? Find me at dhirendrasngh81@gmail.com