0% found this document useful (0 votes)
50 views21 pages

2609 Nis

......................................................................................................................................................................................................scsdc

Uploaded by

harshkale38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views21 pages

2609 Nis

......................................................................................................................................................................................................scsdc

Uploaded by

harshkale38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Institute Code: 0141

Title of Micro project: Implement modifier Caesar’s cipher with shift of any key
Academic Year: 2023-2024 Program Code: AN
Course: Network & Information Security Course Code: 22620

Submitted by

Roll No Name Sign of student

2609 Sarang Jagdale

Under the Guidance of: -


Ms.R.G. Waghmare

1
Institute Code: 0141
CERTIFICATE

Certified that this micro project report titled “Implement modifier Caesar’s cipher
with shift of any key” is the bonafide work of Mr. Sarang Jagdale Roll no 2609 of
third year diploma in Artificial intelligence and machine learning for the
course: Network & Information Security code 22620 during the academic year
2023-2024, who carried out the micro project work under my supervision.

Name & signature of Course Teacher


Ms.R.G.Waghmare

2
ACKNOWLEDGEMENT

We would like to express our special thanks of gratitude to our teachers, who gave us
opportunity to do this wonderful micro project on the topic “ Implement modifier
Caesar’s cipher with shift of any key ” which also helped us in doing a lot of Research
and we came to know about so many new things we all really thankful to all who help us doing
this micro project.
Secondly we would also like to thank our parents and friends who helped us a lot in finalizing
this project within the limited time frame.

Name Signature
Sarang Jagdale

3
ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETY’S POLYTECHNIC, PUNE -1

Department of Artificial Intelligence and Machine Learning


VISION AND MISSION OF THE INSTITUTE

 VISION:

Achieve excellence in quality technical education by imparting knowledge,


skills and abilities to build a better technocrat.

 MISSION:

M1: Empower the students by inculcating various technical and soft skills.
M2: Upgrade teaching-learning process and industry-institute interaction
continuously

VISION AND MISSION OF THE AI & ML DEPARTMENT

 Vision

To serve the society by imparting knowledge in artificial intelligence and machine


Learning along with professional skills to build a responsible human being.

 Mission

M1:To fulfill industrial requirement in the area of artificial intelligence and machine
Learning.

M2: To motivate students for continuous learning with entrepreneurial skills.

M3: To inculcate ethical values, soft skills and leadership skills in students for

Overall personality development. 6


ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETY’S POLYTECHNIC, PUNE -1

Department of Artificial Intelligence and Machine Learning

PROGRAM OUTCOMES (POs)


PO1 Basic and Discipline specific knowledge: Apply knowledge of basic
mathematics, science and engineering fundamentals and engineering
specialization to solve the engineering problems.
PO2 Problem analysis: Identify and analyze well-defined engineering problems using
codified standard methods.
PO3 Design/ development of solutions: Design solutions for well-defined technical
problems and assist with the design of systems components or processes to meet
specified needs.
PO4 Engineering Tools, Experimentation and Testing: Apply modern engineering
tools and appropriate technique to conduct standard tests and measurements.
PO5 Engineering practices for society, sustainability and environment: Apply
appropriate technology in context of society, sustainability, environment and
ethical practices.
PO6 Project Management: Use engineering management principles individually, as
a team member or a leader to manage projects and effectively communicate
about well-defined engineering activities.
PO7 Life-long learning: Ability to Analize individual needs and engage in updating
in the context of technological changes.

PROGRAM SPEICIFIC OUTCOMES (POs)

Students will be able to:


PSO 1: Apply computing knowledge with standard practices to develop software.

PSO 2: Maintain Computer Hardware and Software System.

7
INDEX

Sr. No. Content Page No.

1. Title 1

2. Certificate 2

3. Acknowledgement 3

4. Annexure I 9

5. Annexure II 12

6. Annexure III 21

7. Annexure IV 23

8. Log Book 24

9. Rubrics Used for Evaluation 25

10. Evaluation Sheet 26

8
Annexure-I
Micro-Project Proposal
Title of Micro-Project: Implement modifier Caesar’s cipher with shift of any key

1.0Aims/Benefits of the Micro-Project Aim: -


Easy to implement and use.
Suitable for beginners to learn about encryption.
Can be modified easily to create a more secure variant.

Benefits: -
Understood the concepts of Encryption & Decryption.
Easy to memorize the cipher, so you can easily expand.
One of the simplest and easiest encryption methods.

2.0Course Outcomes Addressed


CO a) Interprete features of Network & Information Security.
CO b) Analyze and design classical encryption techniques.
CO c) Apply Cryptographic Algorithms and Protocol to maintain computer security..
CO d) Understand and analyze data encryption standard.

3.0 Proposed Methodology


1. Arrangement of groups and representatives for groups that are not usually represented as
partners in main projects.
2. Capacity building and networking in relation to the role as partners in micro
projects. 3.Collected materials related to project.
4.Support development of more need and user driven projects.
5.Contribute to the maximum requirements of project.
6. An eligible project idea addressing one of the four Priority Axes and a work plan for a
micro project including a description of how the capacity building and networking should
take place.
7. The project involves maximum three partners. From three partners, the contributions of
micro project are distributed.
8. An eligible Lead member who will guide the group members and analyzed the
data. 9.Eligible match finding the proper information.
10.Softcopy corrections by respective teachers.
11.Completion of the micro project properly.
12.Final copy and submission.

9
4.0 Action Plan
Sr. Details of Activity Planned Planned Name of Responsible
No. Start date Finish date Team Members
1. Introduction to Micro-project: Study for 07/08/23 11/08/23 Sarang Jagdale
selecting Micro project topic

2. Introduction to Micro-project: Discussion 11/08/23 14/08/23 Sarang Jagdale


about selected Micro project topic with
concerned Course Teacher

3. Introduction to Micro-project: Finalize and 14/08/23 21/08/23 Sarang Jagdale


Study for selected topic

4. Drafting Proposals 21/08/23 25/08/23 Sarang Jagdale

5. Proposal submission 25/08/23 29/08/23 Sarang Jagdale

6. Micro project Proposal Presentation 29/08/23 01/09/23 Sarang Jagdale

7. Making Changes in presentation, if suggested 01/09/23 05/09/23 Sarang Jagdale


by concerned teacher
8 Executing Micro-Project: Study from 05/09/23 11/09/23 Sarang Jagdale
different resources
9. Executing Micro-Project: Collect 11/09/23 15/09/23 Sarang Jagdale
information from studied resources
10. Executing Micro-Project: Arrange collected 15/09/23 20/09/23 Sarang Jagdale
information
11. Executing Micro project 20/09/23 22/09/23 Sarang Jagdale

12. Drafting Methodology 22/09/23 26/09/23 Sarang Jagdale

13. Drafting Literature Review 26/09/23 29/09/23 Sarang Jagdale

14. Drafting Result, Discusser 29/09/23 03/10/23 Sarang Jagdale


15. Micro project Presentation 03/10/23 13/10/23 Sarang Jagdale
16. Micro Project final submission 13/10/23 13/10/23 Sarang Jagdale

10
5.0 Resources Required
Sr. Name of Specifications Qty. Remarks
No. Resources/material
1. Computer System Laptop i5 11th gen, RAM –7GB 1
2. Operating System Windows 11 1
3. Printer - -
4. Internet/Websites https://github.com/topics/memorygame?l=java

Names of Team Members with Roll Nos.


Roll No Name

2609 Sarang Jagdale

Ms.R.G. Waghmare
(To be approved by the Concerned Teacher)

11
Annexure-II

Micro-Project Report
Title of Micro-Project: Implement modifier Caesar’s cipher with shift of any key

1.0 Rationale:

Caesar Cipher is named after Julius Caesar and is one of the simplest and weakest encryption
algorithms. Therefore it is used only in parts of other complex encryption algorithms making the
Cipher Text harder to decode.

Caesar cipher or Shift Cipher is a Substitution cipher algorithm in which each letter of the plain text
(message) is substituted with another letter. In this algorithm, cach letter of the Plaintext is shifted a
number of positions based the Key provided. 2.0 Aim/Benefits of the Micro-Project:

Aim: -
To understand the concept of Android.
To identify different types of methods used in Android.
To understand benefits and future scope of the Android.

Benefits: -
Understood the concepts of Encryption & Decryption.
Easy to memorize the cipher, so you can easily expand.
One of the simplest and easiest encryption methods.

3.0Course Outcomes Addressed


CO a) Interprete features of Network & Information Security.
CO b) Analyze and design classical encryption techniques.
CO c) Apply Cryptographic Algorithms and Protocol to maintain computer security..
CO d) Understand and analyze data encryption standard.

4.0 Literature Review:


https://github.com/CrypTools/CaesarCipher
https://github.com/topics/caesar-cipher

12
5.0 Actual Methodology Followed
Sr. No./ Date Work Done
Hour No.
1. 11/08/23 Finalize the Topic
2. 14/08/23 Distribution of Work
3. 21/08/23 Distribution of Topic
4. 25/08/23 Collecting Images/Information
5. 29/08/23 Starting animation
6. 01/09/23 Completing animation
7. 05/09/23 Creating a Word Document
8. 11/09/23 Inserting information
9. 15/09/23 Arranged the Information
10. 20/09/23 Proofread the Information
11. 22/09/23 Editing the Word Document
12. 26/09/23 Review from the Teacher
13. 29/09/23 Editing the Project Report as per Teacher’s suggestion
14. 03/10/23 Proofread and Finalize the Report
15. 13/10/23 Finalize the report
16. 13/10/23 Final submission of the Report

6.0 Actual Resources Used


Sr . Name of Specifications Qty. Remarks
No Resources/
material

1. Computer System Laptop i5 11th gen, RAM –7GB 1


2. Operating System Windows -
11
3. Printer - -
4. Internet/Websites https://github.com/topics/ 7
memory-game?l=java

13
7.0 Code of Micro-Project:

import java.util.*;
public class Caesar Cipher Program {
public static void main(String args[]) {
Scanner sc = new Scanner(System.in);

String k="y";
while(k.equals("y")||k.equals("Y"))
{
String plaintext="";
int shift=0;
System.out.println("1. Encrypt Message \n2. Decrpyt Message ");
System.out.println("\nEnter your Choice:");
int ch=sc.nextInt();
System.out.println(" Enter Message: ");
Plaintext = sc.next();
System.out.println(" Enter the value by which cach character in the plaintext message gets shifted: ");
shift = sc.nextInt();

switch(ch)
case 1:
String ciphertext = encrypt(plaintext, shift);
System.out.println(" ciphertext:" + ciphertext);
break;
case 2:
String ptext = decrypt(plaintext,shift);
System.out.println("plaintext:" + ptext);
break;
default:
System.out.println("Option not Selected.. Please Select an option: ");
}
System.out.println("Do you want to continue? [y/n]: ");
K = sc.next();
}
}
private static String decrypt(String ciphertext.int shift)
{
String decrypt Message = “ ”;
for(int i=0;i<ciphertext.length();i++)
{
char alphabet = ciphertext.charAt(i);
if(alphabet >='a' && alphabet <= ‘z’)
{
alphabet =(char) (alphabet - shift);
if (alphabet<'a') {
alphabet =(char) (alphabet-‘a’+‘z’+1);
14
}
decryptMessage = decryptMessage + alphabet;
}
else if(alphabet >= ‘A’ && alphabet ‘Z’)
{
alphabet (char) (alphabet – shift);
if (alphabet <'A')
alphabet = (char) (alphabet--‘A’+‘Z’+1);
}
decryptMessage = decryptMessage + alphabet;
}
else
{
decryptMessage = decryptMessage + alphabet;
}
}
retum decryptMessage;
}
private static String encrypt(String plaintext.int shift)
{
char alphabet;
String ciphertext";
for(int i=0; i < plaintext.length();i++)
{
alphabet = plaintext.charAt(i);
if(alphabet >='a' && alphabet <= ‘z’)
{
alphabet = (char) (alphabet+shift);
if(alphabet > ‘z’){
alphabet = (char) (alphabet+ ‘a’+ ‘z’-1);
}
ciphertext = ciphertext + alphabet;
}
else if(alphabet >=‘A’ && alphabet <= ‘Z’){
alphabet = (char) (alphabet + shift);
if(alphabet > 'Z') {
alphabet = (char) (alphabet+ ‘A’ - ‘Z’ - 1);
}
Ciphertext = ciphertext + alphabet;
}
else
{
ciphertext = ciphertext + alphabet;
}
}
return ciphertext;
}
}
15
Screenshots of the output

16
8.0 Skill Developed/Learning Outcomes of this Micro-Project:

 During the course of developing this micro-project we learnt many practical applications
of Cryptography concepts in theory and practical.
 We learnt to Implement Modifier Caesar's Cipher with shift of any key.
 We also learnt how to develop, compile and execute code for cryptographic techniques .
Applications of this Micro project:
 Used to achieve Integrity.

 Used to save the important message or data from the attackers.

 Used to achieve Confidentiality.

 Used to do secure Communication.

Names of Team Members with Roll Nos.


1. 2609 Sarang Jagdale

Ms.R.G. Waghmare

(To be evaluated by the Concerned Teacher)

17
Annexure - III
Rubric for Assessment of Micro Project

S. Characteristics to Poor Average Good Excellent


No be assessed (Marks 1-3) (Marks 4-5) (Marks 6-8) (Marks 9-10)
1. Relevance to the Related to very Related to some Addressed at- Addressed more
Course few LOs Los least one CO than one CO
2. Literature Not more than two At-least 5 At-least 7 About 10
Review/information sources (Primary relevant sources, relevant sources, relevant sources,
collection and Secondary), at least 2 latest most latest most latest
very old reference
3. Completion of Completed less Completed 50 to Completed 60 Completed more
Target as per than 50% 60% to70% than70%
Project proposal
4. Analysis of Data Sample Size all, Sufficient and Sufficient and Enough data
and representation data neither appropriate appropriate collected by
organized nor sample, enough sample, enough sufficient and
presented well data generated but data generated appropriate
not organized and which is sample size.
not well presented organized and Proper inferences
well. No or poor presented well. drawn by
inferences drawn But poor organizing and
inferences presenting data
drawn through tables,
charts and graphs
5. Quality of Incomplete Just assembled/ Well a Just Well a Just
prototype/Model fabrication/ fabricated and assembled/ assembled/
assembly parts are not fabricated with fabricated with
functioning well. proper proper
Not in proper functioning functioning
shape, dimensions parts.in proper parts.in proper
beyond tolerance shape, within shape, within
limit. tolerance tolerance
Appearance/ dimensions and dimensions and
finish is shabby. good finish. But good finish/
no creativity in appearance.
design and use Creativity in
of material design and use of
material.
6. Report Preparation Very short, poor Nearly sufficient Detailed, correct Very detailed,
quality sketches, and correct details and clear correct, clear
Details about about methods, description of description of
methods, materials, methods, methods,
materials, precautions and materials, materials,

18
Precautions and conclusion. but precautions and precautions and
Conclusions clarity is not there conclusion. conclusion.
omitted, some in presentation. Sufficient Enough tables,
details are wrong. But not enough graphic charts and
graphic description sketches
description

7. Presentation of the Major information Includes major Includes major Well organized,
Micro-Project is not included, information but information but Includes major
information is not not well not well information,
well organized. organized not organized not presented well.
presented well. presented well.

8. Viva Could not reply to Replied to Replied properly Replied most of


considerable considerable considerable the questions
number of number of number of properly
question questions nut not question.
very properly

19
Annexure IV

Micro Project Evaluation Sheet


Name of Student: Sarang Jagdale Enrollment No: 2101410027
Name of Program: AI & ML Semester: AN6I
Course Title: Network & Information Security Code: 22620
Title of the Micro-project: Implement modifier Caesar’s cipher with shift of any key
Course Outcomes Achieved: -
CO1. Create interactive web pages using program flow control structure.
CO2. Implement the Arrays and functions in Android.
CO3. Create event-based web forms using Android.
CO4. Create Menus and navigations in web Pages.
Sr Characteristic to be Poor Average Good Excellent Sub Total
No. accessed (Marks 1- (Marks 4-5) (Marks 6- (Marks 9-
3) 8) 10)
(A) Process and Product Assessment (Convert above total marks out of 6 Marks)
1 Relevance to the
course
2 Literature
Review/information
collection
3 Completion of the
Target as per project
proposal
4 Analysis of Data and
representation
5 Quality of the
Prototype/Model
6 Report Preparation
(B) Individual Presentation/ Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Viva

(A) (B) Total Marks


Process and Product Individual Presentation/ 10
Assessment (6 Marks) Viva
(4 Marks)

Comments/ suggestions about Team work/ Leadership/Inter-Personal communication


(If any)
……………………………………………………………………………………………
Name and Designation of the Teacher…………………………………….
Dated Signature……………………………………………………………

20
Log Book of the Student (Hourly Work Report)
Academic Year: 2023-2024
Name of Student: Sarang Jagdale
Title of the Project: Implement modifier Caesar’s cipher with shift of any key
Course: Network & Information Security Course Code: 22620
Semester: AN6I
Sr. No. Date Time Work Done

1. 11/08/23 4 PM - 5PM Study for selecting Micro project topic

2. 14/08/23 4 PM - 5PM Discussion about selected Micro project topic


with concerned Course Teacher
3. 21/08/23 4 PM - 5PM Finalize and Study for selected topic

4. 25/08/23 4 PM - 5PM Drafting Proposals

5. 29/08/23 4 PM - 5PM Proposal submission

6. 01/09/23 4 PM - 5PM Micro project Proposal Presentation

7. 05/09/23 4 PM - 5PM Making Changes in presentation, if suggested by


concerned teacher
8. 11/09/23 4 PM - 5PM Study from different resources

9. 15/09/23 4 PM - 5PM Collect information from studied resources

10. 20/09/23 4 PM - 5PM Arrange collected information

11. 22/09/23 4 PM - 5PM Executing Micro project

12. 26/09/23 4 PM - 5PM Drafting Methodology

13. 29/09/23 4 PM - 5PM Drafting Literature Review

14. 03/10/23 4 PM - 5PM Drafting Result, Discusser

15. 13/10/23 4 PM - 5PM Micro project Presentation

16. 13/10/23 4 PM - 5PM Micro Project final submission

Ms.R.G. Waghmare

21
Rubrics Used for Evaluation of a Micro Project

Program/Semester /Master: AN6I Course Code: 22620


Course : Network & Information Security
Title of the Micro project: “Implement modifier Caesar’s cipher with shift of any key”

Course Outcome Achieved: -


CO1. Create interactive web pages using program flow control structure.
CO2. Implement the Arrays and functions in Android.
CO3. Create event-based web forms using Android.
CO4. Create Menus and navigations in web Pages.
Assessment of micro project based on rubrics for performance in group activity :( Marks to be
given out of 06
Assessment of performance in individual presentation/Viva of micro project: (Marks to be given
out of 04
Scale used for assessment: Poor (1-3), Average (4-5), Good (6-8), Excellent (9-10)
A) Process and Product Assessment (A):

Rubric
Characteristics to be assessed Marks Obtained out of 10
No.
1 Relevance to course
2 Literature review/information collection
3 Completion of target as per project proposal
4 Analysis of data and representation
5 Quality of prototype/model
6 Report Preparation
Total Out of (60)
Process and Product Assessment (A): Total Out of
(06)

B) Individual Presentation/Viva(B)

Rubric 7 Rubric7 Individual


Individual
Presentation/
Presentation/
Viva
Viva Total
Individual Individu (Convert out
Roll Enrollment No. (Addition of (A+B)
Name of Student Presentation al Viva of 08 marks
No. marks in
into out of 4)
Rubric 7 to7) (B)
Marks Marks Marks out of Marks out of Marks
out of 10 out of 10 20 04 out of 10
2609 2101410027 Sarang Jagdale

Name & signature of Faculty

22
Evaluation Sheet for the Micro Project
Academic Year: 2023-2024 Name of Faculty: Ms.R.G.Waghmare
Course: Network & Information Security
Course Code: 22620
Semester: AN6I
Title of the Project: Implement modifier Caesar’s cipher with shift of any key

COs addressed by the Micro Project:


CO1. Create interactive web pages using program flow control structure.
CO2. Implement the Arrays and functions in Android.
CO3. Create event-based web forms using Android.
CO4. Create Menus and navigations in web Pages.

Major Learning Outcomes achieved by students by doing the project:

(a) Practical Outcomes:


2. Develop Android to use decision making and looping statements.
3. Develop Android to implement Array functionalities.
4. Develop Android to implement functions.
5. Develop Android to implement Strings.

(b) Unit Outcomes in Cognitive domain:


1c. Develop Android to implement loop for solving the given iterative problem.
1e. Develop program using basic features of Android to solve the given Problem.
2b. Perform the specified string manipulation operation on the given String(s).
3a. Write Android to design a form to accept input values for the given problem.
3b. Use Android to implement form events to solve the given problem.
6c. Develop Android to create the given Slideshow.

(c) Outcomes in Affective Domain:


a. Follow safety practices.
c. Demonstrate working as a leader/a team member.
d. Follow ethical Practices

Comments/Suggestions about team work/leadership/inter-personal communication


Roll No. Student Name Marks out of (6) for Marks out of (4) Total
performance in group For performance in (10)
activity oral /presentation

2609 Sarang Jagdale

(Dated Signature of Faculty)

23

You might also like