Breaking a Caesar Cipher / Vigenère Cipher Encryption for Secure Data Communication
This project had one purpose: creating almost unbreakable encryption by breaking a Caesar – and Vigenère Cipher and getting familiar with how they work. Created a program to encrypt and decrypt messages with a Caesar Cipher and Vigenère Cipher encryption. Breaking these encryptions in these programs will help to identify the factors that contribute to strong and weak encryption systems. A program was created to encrypt messages using Caesar Cipher with a key from 1 to 25 and decrypt messages without knowing the original key by doing different types of “attacks” on the system: a brute force and frequency analysis attack. Created another program to encrypt messages using Vigenère Cipher with a keyword or keyphrase and decrypted messages whilst knowing that original keyword. Tested and compared the two different cyphers when being attacked. This helped identify factors that influenced the strength of encryption and identified the advantages and disadvantages of each Cipher as well as the weaknesses in each attack. Through testing and breaking a Caesar and Vigenère Cipher successfully, multiple factors were identified that influenced the strength of the encryption system. These were used to ensure the new encryption created will be as strong as can be. Comparing the success rate of the different attacks on each Cipher, the similarities, weaknesses and strengths in the Brute Force and Frequency Analysis attacks were found.
Deciphering The Illusion: A Multi Faceted Algorithm in Deepfake Detection
AI (Artificial Intelligence) technology has developed very rapidly in recent years, to the point where it can make fake videos or photos called "deepfake''. According to Sumsub Identity Fraud Report 2023 just in the past year, in the APAC region the number of deepfakes has grown 1530%, in the philippines an astounding 4500% and in 馬來西亞 a 1000% increase, these numbers will continue to rise without a proper defense against them, With this rapidly developing technology, there are several threats from misuse deepfake, namely making fraud via video calls, fake videos to blame innocent people, and so on. Therefore, in this research project, an algorithm architecture will be created, namely a system and method used to detect "deepfake" images. The architecture of this algorithm involves convolution functions, neural networks, convolutional neural networks, data normalization functions, namely ReLu and SoftMax, and pooling. This architecture will then be trained over and over with 140,000 scrambled images, which then will make the architecture ready to be used. By researching and combining this algorithm architecture, a system is produced without a cost and with a final result of up to 90% accuracy and detection of 32 images faster than a human can blink.