1. Trang chủ
  2. » Giáo Dục - Đào Tạo

THE MIDTERM OF PROBABILITIES AND STATISTICS RESEARCH ON ENCRYPTION AND DECRYPTION

47 1 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

1 VIETNAM GENERAL CONFEDERATION OF LABOR TON DUC THANG UNIVERSITY FACULTY OF INFORMATION TECHNOLOGY THE MIDTERM OF PROBABILITIES AND STATISTICS RESEARCH ON ENCRYPTION AND DECRYPTION Instructors: MR.NGUYỄN QUỐC BÌNH Student: MAI BẢO THẠCH – 520H0490 Class: 20H50304 Course: HO CHI MINH CITY, 2021 24 VIETNAM GENERAL CONFEDERATION OF LABOR TON DUC THANG UNIVERSITY FACULTY OF INFORMATION TECHNOLOGY THE MIDTERM OF PROBABILITIES AND STATISTICS RESEARCH ON ENCRYPTION AND DECRYPTION Instructor: MR.NGUYỄN QUỐC BÌNH Student: MAI BẢO THẠCH – 520H0490 Class: 20H50304 Course: HO CHI MINH CITY, 2021 24 THANKFUL WORD After working for a half semester with the enthusiastic help and support of Mr Nguyễn Quốc Bình, I was able to complete the report in the most complete and effective way His teaching has given our students a lot of knowledge as well as full skills in the specialized subject Although couple of months is quite short, but that time has also helped me to easily approach the major step by step with a solid foundation, especially with the encouragement and help from seasoned lecturers I sincerely thank REPORT COMPLETED AT TON DUC THANG UNIVERSITY I hereby declare that this is my own report and is under the guidance of Mr Nguyễn Quốc B The research contents and results in this topic are honest and have not been published in any form before The data in the tables for analysis, comments and evaluation are collected by the author himself from different sources, clearly stated in the reference section In addition, the project also uses a number of comments, assessments as well as data of other authors, other agencies and organizations, with citations and source annotations If I find any fraud I take full responsibility for the content of my report Ton Duc Thang University is not related to copyright and copyright violations caused by me during the implementation process (if any) Ho Chi Minh city, 09 April, 2022 Author (sign and write full name) Mai Bảo Thạch TEACHER’S CONFIRMATION AND ASSESSMENT SECTION Confirmation section of the instructors _ _ _ _ _ _ _ Ho Chi Minh city, day month year (sign and write full name) The evaluation part of the lecturer marks the report _ _ _ _ _ _ _ Ho Chi Minh city, day month year (sign and write full name) SUMMARY The assignment is built for the purpose of testing python9s knowledge about selfstudy algorithms, but also for consolidating knowledge after studying at school The content of the assignment revolves around reviewing the basic knowledge of the logic algorithms as well as some theories about encryption and decryption of this subject Regarding the research method, the assignment is based on the learned knowledge, lecture slides, and textbooks given by the lecturer during the learning process The result obtained after this assignment is the knowledge that can be consolidated in the most general way as well as in place of the assignment of the 1st term during the period of extremely stressful epidemic developments TABLE OF CONTENTS THANKFUL WORD REPORT COMPLETED AT TON DUC THANG UNIVERSITY TEACHER’S CONFIRMATION AND ASSESSMENT SECTION SUMMARY TABLE OF CONTENTS LIST OF ABBREVIATION LIST OF DIAGRAMS, CHARTS AND TABLES CHAPTER 1: INTRODUCTION 1.1Encryption: 1.2Decryption: 1.3Symmetric: 1.4Asymmetric Cryptosystem: CHAPTER 2: MONOALPHABETICAL SUBSTITUTION CIPHER 2.1Definiton of substitution cipher: 2.2State the problem: 2.3Idea of solution and algorithm: 2.4Example and evaluation with analysis: CHAPTER 3: FREQUENCY ANALYSIS 3.1Definition of Frequency Analysis: 3.2State the problem: 3.3Idea of solution and algorithm: 3.4Example and evaluation: CHAPTER 4: EXPERIMENTS ON PYTHON 26 4.1 Experiments on Encryption: 26 4.2 Experiment on Decryption: 38 REFERENCES 45 APPENDIX 46 LIST OF ABBREVIATION AES: Advanced Encryption Standard 10 LIST OF DIAGRAMS, CHARTS AND TABLES Picture Asymmetric 17 Picture Encryption 17 Picture Symmetric 17 Picture Example of cipher keys 19 Picture Monoalphabetic Substitution Cipher Illustration 21 Picture Frequency table 22 Picture Values for Encryption 26 Picture Source code of Encryption algorithm 27 Picture Validation of letters 28 Picture 10 Algorithm 29 Picture 11 Importing testcases 30 Picture 12 Generated cipher keys 30 Picture 13 Testcase 30 Picture 14 Testcase 31 Picture 15 Generated cipher keys 31 Picture 16 Testcase 33 Picture 17 Generated cipher keys 33 Picture 18 Testcase 35 Picture 19 Generated cipher keys 36 Picture 20 Frequency table in Python .Error! Bookmark not defined Picture 21 Import from input values file 38 Picture 22 Source code for Decryption algorithm 39 Picture 23 Code of checking existing 40 Picture 24 Code of alpha-beta sorting 41 Picture 25 Code of replacing letter with frequency table 42 20 aphantasia and its polar-opposite hyperphantasia His team, based at the University of Exeter, coined the term aphantasia this year in a study in the journal Cortex.= With the support of the cipher alphabet fixed letter it will tranform into this:

Ngày đăng: 30/12/2022, 04:40

Xem thêm:

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w