3 research outputs found
A study of caesar cipher and transposition cipher in jawi messages
Cryptography known as art and science which is used to hide the messages that contain a few policy terminologies. These terminologies in cryptography are plaintext/ messages, ciphertext, encryption, decryption and key. Encryption is a proses to transform the plaintext together with key into ciphertext. Decryption is the reverse process of encryption. Caesar cipher and transposition cipher are two historical ciphers in cryptography. Caesar cipher is a monoalphabetic cipher. It is a substitution cipher which replace each letter in plaintext with another letter to form the ciphertext. Transposition cipher uses a technique which rearrangement letters in plaintext with a keyword and produce the ciphertext. Caesar cipher and Tansposition cipher both are commonly used to encrypt the English letters. The output of encrypted of English letters are known as ciphertext. The attacker can easily cryptanalysed the Caesar cipher by observing the frequency distribution English letters and ciphertext. For Transposition cipher, the cipher can be cracked by knowing the keyword. To date, there is no any research encrypt Jawi letters using Caesar cipher and Transposition cipher. Hence, in this paper encryption and decryption by using Caesar cipher and Transposition cipher in Jawi messages are proposed. Next, the security level of Caesar cipher and Transposition cipher in Jawi messages are compared. The result has shown that both ciphers are still not secure to protect the confidentiality of the Jawi messages
Data wiping tool: ByteEditor Technique
This Wiping Tool is an anti-forensic tool that is
built to wipe data permanently from laptop’s storage. This tool
is capable to ensure the data from being recovered with any
recovery tools. The objective of building this wiping tool is to
maintain the confidentiality and integrity of the data from
unauthorized access. People tend to delete the file in normal
way, however, the file face the risk of being recovered. Hence,
the integrity and confidentiality of the deleted file cannot be
protected. Through wiping tools, the files are overwritten with
random strings to make the files no longer readable. Thus, the
integrity and the confidentiality of the file can be protected.
Regarding wiping tools, nowadays, lots of wiping tools face issue
such as data breach because the wiping tools are unable to delete
the data permanently from the devices. This situation might
affect their main function and a threat to their users. Hence, a
new wiping tool is developed to overcome the problem. A new
wiping tool named Data Wiping tool is applying two wiping
techniques. The first technique is Randomized Data while the
next one is enhancing wiping technique, known as ByteEditor.
ByteEditor is a combination of two different techniques, byte
editing and byte deletion. With the implementation of Object�Oriented methodology, this wiping tool is built. This
methodology consists of analyzing, designing, implementation
and testing. The tool is analyzed and compared with other
wiping tools before the designing of the tool start. Once the
designing is done, implementation phase take place. The code of
the tool is created using Visual Studio 2010 with C# language
and being tested their functionality to ensure the developed tool
meet the objectives of the project. This tool is believed able to
contribute to the development of wiping tools and able to solve
problems related to other wiping tools