Caesar Cipher
Caesar Cipher
Caesar Cipher
Cryptography is derived from the word Kryptos, meaning secret, in Greek. It is a secure
communications technique that keeps information secure and that allows the contents to be
accessed only by the sender and its intended recipient of a message.
Encryption is the process wherein the sender encodes the message or information into an
unrecognizable message that only the receiver can access it while decryption is the process
wherein the receiver converts the encrypted message back into the original message.
In real-life situations, email encryption uses the process of encryption and decryption. It is a
means of protecting the content of emails from those trying to access the data of a party outside
of the email conversation. Emails sent were encrypted by the computer and only the person with
the required private key can decrypt the email and read its contents.
Caesar Cipher
Caesar Cipher, also known as a shift cipher, is one of the earliest and simplest encryption
techniques. This technique was named after Julius Caesar who used this to negotiate with
his officials. In this technique, it replaces each letter in the message with the letters in the
alphabet with fixed positions and the encryption key is the length of the shift we use.
Example:
Encrypted message: ERLMJ (ANGIE)
Key: (encryption key: 4)
ABCDEFGHIJKLMNOPQRSTUVWXYZ
EFGHIJKLMNOPQRSTUVWXYZABCD
Transposition Cipher
A transposition cipher is moving each letter into a different position while maintaining its
identity. It is simply moving the letters around.
Example:
ANGIE - EAGNI - GINAE
Symmetric encryption uses only a single key to encrypt and decrypt messages, whereas
asymmetric encryption uses a public key pair and a private key to encrypt and decrypt messages
when communicating.
7. Explain the procedure on how the public key and private key of an RSA cryptosystem are
generated.
Two separate keys are used for encryption and decryption in this cipher which is the public key
and the private key. The public key can be used to encrypt the message then you share the public
key with others who want to send you a message while the recipient is kept in the dark about the
private key to assure communication security between the sender and the receiver.
9. Explain how the private key is used to retrieve the plaintext to ciphertext.
The sender uses just a single key to encrypt a message and the receiver applies the same key to
decrypt the message. In this cipher, the plaintext and corresponding ciphertext are even known to
the attacker. There must be a pre-shared key for the sender and receiver. The common key from
all other parties is kept hidden and is used for encryption as well as decryption.