Professional Documents
Culture Documents
Algorithms
11 12 13 14 15 16 17 18 19 20
U V W X Y Z
21 22 23 24 25 26
Algorithm
Let us encrypt Hello Dhiraj
Now first letter is H, start your
count 13 letters from it i.e. U.
Similarly for others.
But for O, we see, we reach Z
before reaching 13 count so we
will continue with A again. i.e. O
corresponds to B.
So, our cipher text is Uryyb
Quvenw
Decryption is same 13 is in
Base64
One of the most widely used and
popular.
Frequently used method for the
Binary data/printable string
conversion.
Method to convert 8-bit characters
to 7-bit characters, so that they can
be transferred over the Internet.
The Base64 system uses the
following table:
Code_table[0…63] =
“ABCD..XYZabcd…xyz012..9+/”
Algorithm (Base64)
Encoding
Step#1: password is cryptorzz ,
aim how-to encode
Step#2:convert into respective
ASCII values,
c(99),r(114),y(121)p(112)t(116),o(11
1),r(114),z(122),z(122).
Step#3 convert the decimal
number into binary form
99(01100011)114(01110010)121(0
1111001)…
Contd..
Step#4 all the binary equivalents
are joined or concatenated to
obtain a large set of binary
numbers
01100011011100100111100101
11000001110100011011110111
00100111101001111010.
Step#5 now divide into equal
sections only 6-bits, 12- such set
obtained
Contd…
Step#6 These 6-bit groups are now
converted into their equivalent
decimal number.
011000(24),110111(55),…
Step#7 now decimal equivalents
thus obtained are now changed into
their Base64 values, using Base64
alphabet chart
24(y),55(3),9(J)57(5),28(c)…
“cryptorzz” equivalent to
“Y3J5cHRvcnp6==“
“=“ is used as padding in Base64
encryption
IP Table
Iformation
Number of IP packets received
Range of size most encountered
in received IP packets
Average size of IP packets
received
Percent of total IP packets
received
Number of IP packets sent
Range of size most encountered
Thank you all
We look forward for your comments
and suggestion at the Google group
http://groups.google.com/group/cry
ptography_acem