Abubakar (AB-Yusuf)

AB-Yusuf

Geek Repo

Location:Nigeria

Github PK Tool:Github PK Tool

Abubakar's repositories

ChatBot-ABY

A conversational Bot that engages users using simple statements. Use of NLTK library in python.

Language:Jupyter NotebookStargazers:5Issues:0Issues:0

Learning_How_To_Use_GitHub

I am learning how to make use of GitHub. Getting used to the new terms such as Repositories, Branch used in this environment.

Stargazers:1Issues:0Issues:0

Caesar_Cipher

# Encryption Program using Ceasar Cipher This encryption program has been further improved compared to the original Ceasar Cipher. Improvements in this program has been made to improve its security to prevent breach and also eliminate the use of brute force attack in decrypting texts. # The mode of Operation in carrying out the encryption in this code can be explained below: A Ceasar cipher makes use of key size to perform its encrypting operations. The number of English alphabet is 26, incases of brute force attack on a ceasar cipher with an encryption list of 26. It will take 26 number of exhaustive methods to get the correct shift key. In tackling this, I used 70 elements conisisting of the English alphabets, numbers and special symbols. Use of Brute force in this approach will require 70 exhaustive methods of trial to get the shift key which is much more exhaustive. To make its security much more efficient, a complex sequence for my encryption list was formed. An encryption list is a list that contains the elements in which the Ceasar's encryption will be performed on by just shifting elements in that list based on the value of the shift key. Encryption list was formed by forming a sequence of: lowercase alphabets + numbers + Uppercase alphabets + numbers + Uppercase alphabets and symbols + numbers + Lowercase alphabets and symbols. This encryption list makes it more complicated to crack encrypted text, has the correct sequence of the encryption list must be gotten first. Before proceeding towards getting the value of the shift key or number of times it was rotated to fully decrypt the texts encrypted. # Running the code: The user is prompted to enter text to be decrypted, the program return the same text in an encryption form based on Caesar's algorithm To decrypt the encrypted texts that will be shown, the remaining line of code at the end of the notebook can be Uncommented The program prompts the user for the value of the shift key in place of a password. If the user gets it right, it displays the decrypted text, if the user fails the password. The program is terminated. # Considerations The code was developed and improved having the security and efficiency of the Ceasar's Cipher in mind. This makes its encryption very effective and it's code much more efficient.

Language:Jupyter NotebookStargazers:0Issues:0Issues:0

Day-4-Instance-vs-Objects

Solving daily programming problems in Python via Hackerrank.

Language:Jupyter NotebookStargazers:0Issues:0Issues:0

Day5-Loops

Learning how to use loops to perform multiple multiplication operations. While loop was used in this code.

Language:Jupyter NotebookStargazers:0Issues:0Issues:0

FlaskTrialApplication

A web based project built using flask framework to understand how the flask framework works in visual studio 2019

Language:PythonStargazers:0Issues:0Issues:0

FlaskWebProject

Building a web application using Flask Framework

Language:JavaScriptStargazers:0Issues:0Issues:0

LinkedList

Understanding the implementation of Linked List Data Structure

Language:PythonStargazers:0Issues:0Issues:0

Project-Wallet

Finance related projects

Stargazers:0Issues:0Issues:0

Wallet-Web-Project

A web based ATM that provides financial services.

Stargazers:0Issues:0Issues:0

Wallet_Project

A Web based ATM service

Stargazers:0Issues:0Issues:0