13
CSIC Computing Project Vigenere Cipher Final Presentation Project co-ordinator: Dr. Naqvi Team members: Maryam Salar Kalantari Masood Khosroshahy Yong Wu December 09, 2005

CSIC Computing Project Vigenere Cipher - analytical.works

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

CSIC Computing ProjectVigenere CipherFinal Presentation

Project co-ordinator: Dr. Naqvi

Team members:Maryam Salar KalantariMasood KhosroshahyYong Wu

December 09, 2005

Requirements Capture -Major issues to consider:

Regardless of which method of ciphering/decipheringis going to be utilized, here are the FunctionalRequirements of the system:

1-An input interface which accepts a source file, a keyword and the intended operation(Ciphering/Deciphering)

2-Outputting the file (Saving on disk) afterperforming the intended operation

A quick overview of the DFD modifications:

A detailedUML design diagram

Our Development Environment:

Classes, their methodsand variablesAs depicted in Eclipse:

Program Behavior:

java Vigenere filename.txt operation keyword

Several checks before execution:-Correct number of arguments -File existence-Operation validity-Asking whether or not the user likes to see the fileon screen before processing (In both modes ofCiphering and Deciphering)

Since each module does the opposite of the other module, eachcan be considered as the test-module of the other one.

How the Vigenere table is utilized:(A trimmed down version)

Program Execution: -Ciphering

Program Execution: -Deciphering

Thank you for your attention.

- Live testing- Q & A