Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
33 views1 page

Project 3

Uploaded by

Riya Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views1 page

Project 3

Uploaded by

Riya Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Cryptography

Part 1
Implement a cryptography software system which implement different algorithms.
The system must include some basic cipher algorithms:
• Substitution ciphers
• Transposition ciphers
• Rotor machines ciphers
• Xor ciphers

Part 2
For every implemented algorithm, you should include a open source library which implement the
same functionality and calls it to compare your work.

Part 3
At least one advanced algorithm should be used. Proposed algorithms could be but not limited to:
• Triple DES
• RSA
• Blowfish
• Twofish
• AES

Part 4
For every implemented advanced algorithm, you should include a open source library which
implement the same functionality and calls it to compare your work.

Note: The project is not about how strong the algorithms are, but only for learning purpose. You
can suggest other well known algorithms.

You might also like