0% found this document useful (0 votes)
578 views4 pages

Practical No. 05: Write A Program To Implement Caesar Cipher I. Practical Significance

This document outlines a practical assignment to implement a Caesar cipher encryption program. The key points are: 1) Students will design and develop a program to encrypt messages using the Caesar cipher technique, which shifts each letter by a fixed number. 2) The program will take a text string and shift value as inputs and return the encrypted text string. 3) Implementation of the cipher involves traversing the text and shifting each character according to the encryption rule.

Uploaded by

Omkar Khutwad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
578 views4 pages

Practical No. 05: Write A Program To Implement Caesar Cipher I. Practical Significance

This document outlines a practical assignment to implement a Caesar cipher encryption program. The key points are: 1) Students will design and develop a program to encrypt messages using the Caesar cipher technique, which shifts each letter by a fixed number. 2) The program will take a text string and shift value as inputs and return the encrypted text string. 3) Implementation of the cipher involves traversing the text and shifting each character according to the encryption rule.

Uploaded by

Omkar Khutwad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Practical No.

05: Write a program to implement Caesar cipher

I. Practical Significance

In cryptography, a Caesar cipher is categorized as a substitution cipher in which the alphabet in the plain
text is shifted by a fixed number down the alphabet. Advantages of using a Caesar cipher include: One of the
easiest methods to use in cryptography and can provide minimum security to the information.

Hence, students will be able to implement Caesar cipher

II. Relevant Program Outcomes

PO-1: Basic & Discipline Specific Knowledge


PO-2: Problem analysis
PO-3: Design/development of solutions
PO-4:Engineering Tools, Experimentation and Testing
PO-5: Engineering practices for society, sustainability and environment
PO-7: Life Long Learning
III Competency and Practical Skills

This practical is expected to develop the following skills

a. Design and Develop Caesar Cipher

IV. Relevant Course Outcomes

a. Apply cryptographic algorithms and protocols to maintain Computer Security


V. Practical Outcomes

a. Develop a program to encrypt a message using Caesar’s cipher substitution technique

VI. Relevant Affective domain related Outcomes

a. Follow safety Practices-I

b. Handle network component carefully

c. Demonstrate working as a leader/a team member


d. Follow ethical practices
VII. Minimum TheoreticalBackground

What is Caesar Cipher?

It is one of the simplest encryption technique in which each character in plain text is replaced by a
character some fixed number of positions down to it.

For example, if key is 3 then we have to replace character by another character that is 3 position down to it.
Like A will be replaced by D, C will be replaced by F and so on.

For decryption just follow the reverse of encryption process.

For example, here’s the Caesar Cipher encryption of a full message, using a left shift of 3.

VIII. Procedure

 Traverse the given text one character at a time.


 For each character, transform the given character as per the rule, depending on whether we’re encrypting
or decrypting the text.
 Return the new string generated.
 Program that receives a Text (string) and Shift value (integer) and returns the encrypted text. 
 
IX. Resource Required

Sr.N Name of Resource Specification Quantity Remark


o
1 Computer System Operating System- 1 Available
Windows
RAM-2GB
Processor-Intel
(R)Core(TM) 2Duo
2 Turbo C - 1 Available

X. Practical Related Questions

1. What is Cipher?
2. What is plain text?
3. What is cipher text?
4. Define: Encryption and decryption
5. List the advantages of cryptography?
6. What is substitution cipher?
7. Enist the types of substitution cipher.
8. Encrypt the message “I AM A HACKER” using Caesar’s substitution cipher . Consider shift of 3.

XI. References/ Learning Resources for Further Reading

a) http://nptel.ac.in/courses/106105162/  
b) https://www.tutorialspoint.com//computer_security/computer_security_quick_guide.htm  
c) http://learnthat.com/introduction-to-network-security/
d) https://freevideolectures.com/course/3027/cryptography-and-network-security  
e) https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-
security-fall-2014/video-lectures/  
f) http://stylesuxx.github.io/steganography/
g) https://smartninja-pgp.appspot.com/
h) http://www.cyberlawsindia.net/cyber-india.html 
i) https://www.upcounsel.com/cyber-law  
j) http://cyberlaws.net/cyber-law/
XII. Skills Developed:

a. Ability to design and implement Caesar Cipher Cryptographic technique


XIII. Assessment Scheme

Sr.No. Performance Indicators Weightage


in %
Process Related(15Marks) 70%
1 Logic Formation 30%
2 Effective practical Implementation 30%
3 Follow ethical practice 10%
product Related(10Marks) 30%
4 Practical related questions 10%
5 Completion and submission of practical in 10%
time
4 Expected output/observation 10%
Total(25 Marks) 100%

Names of Student Team Members

1. .....................................
2. .....................................
3. .....................................

Marks Obtained Dated Signature of


Teacher
Process related(15) Product Related(10) Total(25)

You might also like