Cryptography Showcase

Encrypt & Decrypt using 6 different algorithms

Encrypt/Decrypt
What It Teaches
Final Documentation
Report
No file selected
Result will appear here...
Explanation will appear here...

What This Cryptography Showcase Teaches:

Core Concepts

Historical Context

These algorithms span from ancient Rome (Caesar) to modern secure communication (AES/RSA), showing the evolution of cryptography through history.

Security Principles

Programming Concepts

This showcase demonstrates:

Final Documentation

Please enter the link to your final documentation below:

Documentation Instructions

  • Complete your final documentation in a Google Doc or similar platform
  • Paste the shareable link in the input field above
  • Click "Save Link" to store your submission
  • Share the generated URL with your professor so they can access your documentation
  • Make sure your document permissions allow viewing access

Cryptography Report

Encryption Activity Log

No encryption activities recorded yet.

Algorithm Performance

Algorithm Avg. Processing Time Usage Count Security Level
Caesar Cipher < 1ms 0 Very Low
Atbash Cipher < 1ms 0 Very Low
Vigenère Cipher < 1ms 0 Low
Transposition Cipher < 1ms 0 Low
RSA ~5ms 0 High
AES ~2ms 0 High

Security Analysis

The implemented algorithms vary greatly in security:

  • Caesar & Atbash: Historical interest only; can be broken instantly with modern computing
  • Vigenère: More complex but still vulnerable to frequency analysis with sufficient ciphertext
  • Transposition: Security depends on key length, but generally weak against modern cryptanalysis
  • RSA: Modern asymmetric algorithm with strong security when properly implemented
  • AES: Industry standard symmetric encryption with excellent security properties