0% found this document useful (0 votes)
8 views2 pages

Report of Decoding

The document outlines the creation of an encoder and decoder in C programming, focusing on data security through encryption and decryption processes. It details the technical aspects, including time logging, character encryption, and key generation, while also discussing real-world applications such as secure communication and file storage. The report concludes with findings and considerations for future improvements and alternative solutions.

Uploaded by

aldamanapuerto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views2 pages

Report of Decoding

The document outlines the creation of an encoder and decoder in C programming, focusing on data security through encryption and decryption processes. It details the technical aspects, including time logging, character encryption, and key generation, while also discussing real-world applications such as secure communication and file storage. The report concludes with findings and considerations for future improvements and alternative solutions.

Uploaded by

aldamanapuerto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Advanced programming

Date 03/09/2024

1
effectively restoring the original content.
 Time Logging: The program records the exact
time of execution in a separate file (Llave.txt),
which can be used as a reference or part of the
Code Encoding and 
encryption key.
File Processing: The original file is read and

Decoding in C processed in chunks, with each character being


encrypted or decrypted before being written to the
output file.
Language 2.

Some of the real application for this problem are:
Data Encryption in Communication: This type
Alberto Puerto Rodriguez 326495 of solution can be applied in secure
communication systems where messages need to
In this report, I will explain what an encoder and decoder are be encrypted before transmission and decrypted
in the C programming language. Additionally, I will provide a upon receipt. For example, in email services or
step-by-step explanation of how I created my own encoder. messaging apps, where ensuring that the content
remains confidential during transit is crucial.
Code, Decoding, Encoding, Language C  Secure File Storage: In industries like finance or
healthcare, sensitive data needs to be stored
I. INTRODUCTION securely. A similar encryption and decryption
Encoding is the process of converting data from one format to approach could be used to protect files containing
another, usually to facilitate transmission, storage, or to personal or financial information.
protect the information. In the context of C programming,  Access Control Systems: The solution could be
encoding can involve various types of transformations. used in access control systems where logs need to
be securely recorded, ensuring that information
such as access times is encrypted to prevent
II. PROBLEM DESCRIPTION
tampering.
1. Specific needs:
 Data Security: The need to secure the contents of III. THEORETICAL BACKGROUND
a file by converting it into an encrypted format to
prevent unauthorized access. Encoding is the process of converting data from one format to
another, usually to facilitate transmission, storage, or to
 Decryption: The ability to accurately revert the
protect information. In the context of C programming,
encrypted data back to its original form.
encoding can involve various types of transformations:
 Time Logging: The requirement to log the exact Character Encoding: Converting text or data into an encoded
time when the encoding and decoding process is format, such as ASCII, UTF-8, or escape encoding to
executed. represent special characters.
 Efficiency: The program should handle files Data Encoding: Transforming data into a different
efficiently, processing the contents in a manner representation, such as base64 encoding, which converts
that maintains the integrity of the data while binary data into a readable text representation.
performing encryption and decryption. Encryption: A form of encoding intended to protect data by
 Key Generation: A key is generated using a converting plaintext into ciphertext using an algorithm and a
combination of a seed value (current time) and the key. This ciphertext is not understandable without the correct
character's position in the file. This ensures that the key.
encryption key is unique and unpredictable. Decoding is the reverse process of encoding, where the
 Character Encryption: Each character from the encoded data is transformed back to its original form.
original file is encrypted using a rotation-based Technically, decoding in C involves:
cipher, with the generated key being applied to Character Decoding: Converting data from an encoded
shift the ASCII value of each character. representation (such as UTF-8 or an escape sequence) back to
 Character Decryption: The encrypted characters its original format.
are then decoded by reversing the rotation process, Data Decoding: Reversing the transformation applied in data
encoding, such as converting a base64 string back to its
original binary form.
1

1
Advanced programming
Date 03/09/2024

Decryption: The process of converting ciphertext back to


plaintext using the correct key and the corresponding
algorithm. VIII. CONCLUSIONS
Technical Details:
A. General conclusion
Namespace: In C, data is processed through functions that
This section contains the findings observed in the practice.
operate on arrays of bytes or characters. For example,
encoding a string involves transforming each byte according
to a particular encoding scheme. B. Individual conclusion
Algorithms: The algorithms used for encoding and decoding This section contains the individual conclusion.
in C can vary in complexity, ranging from simple operations C. Individual contribution (what did you do for this
(like XOR for basic encryption) to advanced cryptographic work?)
algorithms (such as AES or RSA).
Key Management: In encryption, a key is required to encode, REFERENCES
and the same or a related key is needed to decode. The [1] F. N. Author1 and F. N. Author2, “The title of the conference,” in Title
security of the process depends on the robustness of the of the Proceeding, vol. 3, DOI XX/XXXX/ZZZ.XXXX.XXXXXXX,
algorithm and the protection of the key. pp. 1–6, Apr. 2003.
[2] F. N. Author1, F. N. Author2 and F. N. Author3, “The title of the
article,” Other Journal, vol. IA-21, DOI
IV. MATERIALS XX/XXXX/ZZZ.XXXX.XXXXXXX, no. 4, pp. 814–821, Mar. 1990.
[3] F. N. Author1, “The title of the article,” Journal title, vol. 56, DOI
Laptop: XX/XXXX/ZZZ.XXXX.XXXXXXX, no. 2, pp. 581–588, Feb. 2009.
[4] F. N. Author, F. N. Author2, and F. N. Author3, Title of the book, 2nd
V. METHODOLOGY ed., ser. 16, vol. 14. Country: The name of the publisher, Nov. 2013, an
optional note.
This section presents the flowchart that has to be carried out
to obtain the requested task.

Also, include a list to indicate the distribution of tasks for


the team members (at least two or three activities by member).
Specify the team’s leader.

Finally, add a schedule of activities.

VI. EXPERIMENTATION AND RESULTS


This section shows pictures, plots, tables, codes, and
numerical results that give evidence of the practice carried out.

● Alternative solutions
Describe at least three alternatives that can be used, e.g.,
different software, different hardware, different methods,
etc. highlighting advantages or improvements that can be
obtained (e.g., economical cost, computational cost,
complexity, etc.)

● Indicate new technologies (software/hardware) that


could be applied.

VII. DISCUSSION OF RESULTS

1. This section discusses the obtained results.


2. Answer the following question:
a. Why are the obtained results correct?

You might also like