Result and Discussion

2
RESULT AND DISCUSSION This project is mainly intended to enhance security of a system. So our main motive is maximize the security by making cipher text in a confusing way. Each time we encrypt a same word, we are supposed to get a different cipher text. This will surely confuse hacker’s and cryptanalyst’s. Another thing we kept in mind is to minimize complexity of algorithms. This will enhance speed of execution and inturn increase performance of our project. This allows our XMODES to be incorporated with different kinds of other systems. Since the speed is quite good, it can be even used in online and cloud computing systems very effectively. TESTING- Our project has been tested with a varity of words and images. Almost all keybard inputs were successfully working in this software. Even out of keyboard characters are working as this project treats charactors as askii codes so there is nothing to be confuced about them. In case of images, this projects performance degrades as size of the image increases. For smaller images this works out very fine. But for larger images the time taken is too large. If image sixe is too greater, system sometimes hangs. SYSTEM EVALUATION BASED ON TESTING- As far as texts are concerned this works similar in all computes in the present day. Time required for encrypting text is too small the performance of a system is not much clear and vivid. But for images, the performance of image encryption is based on performance of system. For lower processor it takes more time to encrypt. ACCURACY- our project has high degree of accuracy. A small change in one character at any phase of processing will bring about a big change in outcome, whether it be concerned with encryption or decryption. There is no question about any word changing its form

description

Result and Discussion

Transcript of Result and Discussion

RESULT AND DISCUSSION

This project is mainly intended to enhance security of a system. So our main motive is maximize the security by making cipher text in a confusing way. Each time we encrypt a same word, we are supposed to get a different cipher text. This will surely confuse hacker’s and cryptanalyst’s. Another thing we kept in mind is to minimize complexity of algorithms. This will enhance speed of execution and inturn increase performance of our project. This allows our XMODES to be incorporated with different kinds of other systems. Since the speed is quite good, it can be even used in online and cloud computing systems very effectively.

TESTING- Our project has been tested with a varity of words and images. Almost all keybard inputs were successfully working in this software. Even out of keyboard characters are working as this project treats charactors as askii codes so there is nothing to be confuced about them. In case of images, this projects performance degrades as size of the image increases. For smaller images this works out very fine. But for larger images the time taken is too large. If image sixe is too greater, system sometimes hangs.

SYSTEM EVALUATION BASED ON TESTING- As far as texts are concerned this works similar in all computes in the present day. Time required for encrypting text is too small the performance of a system is not much clear and vivid. But for images, the performance of image encryption is based on performance of system. For lower processor it takes more time to encrypt.

ACCURACY- our project has high degree of accuracy. A small change in one character at any phase of processing will bring about a big change in outcome, whether it be concerned with encryption or decryption. There is no question about any word changing its form as this project is carefully created keeping all the accuracy conservative measures. The delimiter also is kept in a secure manner that will not be confused with cipher text or the key. In case of images also accuracy is kept high. Image can be conciderd as a large series of texts in our project. A small change in any word will change the image and the image becomes in a form that cannot be viewed. The image thus gets damaged. But since the accuracy is high this problem was never mett in testing phase. All images were successfully viewed and the encryption and decryption process was so successful. But when it comes to hackers a small change in any of the portion of image string, the outbecome becomes weird, so intrution and hacking is very difficult.

SUMMARY OF SYSTEM EVALUATION- enthenkilum ezhuthu….

CONCLUSION – testing was successful, no particular word or image went wrong in encryption or decryption. Project has very high degree of accurace and presession. Complexity is too small and performance is very high. The only problem is dealing with large sized images. So next level of this project will be making it more flexible with different sized images.