3 research outputs found

    A study of caesar cipher and transposition cipher in jawi messages

    Get PDF
    Cryptography known as art and science which is used to hide the messages that contain a few policy terminologies. These terminologies in cryptography are plaintext/ messages, ciphertext, encryption, decryption and key. Encryption is a proses to transform the plaintext together with key into ciphertext. Decryption is the reverse process of encryption. Caesar cipher and transposition cipher are two historical ciphers in cryptography. Caesar cipher is a monoalphabetic cipher. It is a substitution cipher which replace each letter in plaintext with another letter to form the ciphertext. Transposition cipher uses a technique which rearrangement letters in plaintext with a keyword and produce the ciphertext. Caesar cipher and Tansposition cipher both are commonly used to encrypt the English letters. The output of encrypted of English letters are known as ciphertext. The attacker can easily cryptanalysed the Caesar cipher by observing the frequency distribution English letters and ciphertext. For Transposition cipher, the cipher can be cracked by knowing the keyword. To date, there is no any research encrypt Jawi letters using Caesar cipher and Transposition cipher. Hence, in this paper encryption and decryption by using Caesar cipher and Transposition cipher in Jawi messages are proposed. Next, the security level of Caesar cipher and Transposition cipher in Jawi messages are compared. The result has shown that both ciphers are still not secure to protect the confidentiality of the Jawi messages

    Data wiping tool: ByteEditor Technique

    Get PDF
    This Wiping Tool is an anti-forensic tool that is built to wipe data permanently from laptop’s storage. This tool is capable to ensure the data from being recovered with any recovery tools. The objective of building this wiping tool is to maintain the confidentiality and integrity of the data from unauthorized access. People tend to delete the file in normal way, however, the file face the risk of being recovered. Hence, the integrity and confidentiality of the deleted file cannot be protected. Through wiping tools, the files are overwritten with random strings to make the files no longer readable. Thus, the integrity and the confidentiality of the file can be protected. Regarding wiping tools, nowadays, lots of wiping tools face issue such as data breach because the wiping tools are unable to delete the data permanently from the devices. This situation might affect their main function and a threat to their users. Hence, a new wiping tool is developed to overcome the problem. A new wiping tool named Data Wiping tool is applying two wiping techniques. The first technique is Randomized Data while the next one is enhancing wiping technique, known as ByteEditor. ByteEditor is a combination of two different techniques, byte editing and byte deletion. With the implementation of Object�Oriented methodology, this wiping tool is built. This methodology consists of analyzing, designing, implementation and testing. The tool is analyzed and compared with other wiping tools before the designing of the tool start. Once the designing is done, implementation phase take place. The code of the tool is created using Visual Studio 2010 with C# language and being tested their functionality to ensure the developed tool meet the objectives of the project. This tool is believed able to contribute to the development of wiping tools and able to solve problems related to other wiping tools
    corecore