0% found this document useful (0 votes)
58 views5 pages

Caesar Cipher Encryption Guide

This document summarizes a Caesar cipher mini project. It explains that the Caesar cipher involves shifting each letter of a message by a set number of places in the alphabet, such as shifting each letter 3 places to encrypt as Caesar did. Only those who know the shift number can decrypt the message. The document notes that while the cipher provided secrecy, decryption tools were quickly developed. It concludes that the C code implementing the cipher is surprisingly simple, as it only deals with letter indexes and shifting them by the user-provided number.

Uploaded by

SANISETTY SATVIK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views5 pages

Caesar Cipher Encryption Guide

This document summarizes a Caesar cipher mini project. It explains that the Caesar cipher involves shifting each letter of a message by a set number of places in the alphabet, such as shifting each letter 3 places to encrypt as Caesar did. Only those who know the shift number can decrypt the message. The document notes that while the cipher provided secrecy, decryption tools were quickly developed. It concludes that the C code implementing the cipher is surprisingly simple, as it only deals with letter indexes and shifting them by the user-provided number.

Uploaded by

SANISETTY SATVIK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CEASER'S CIPHER

MINI
PROJECT
Darshan C
Satvik Sanisetty
Yukta
About
this project
Caesar cipher is a basic letters substitution algorithm. It takes as
input a message, and apply to every letter a particular shift. This shift
used to be 3 (Caesar shift), according to history, when it was used by
Caesar to encrypt war messages (so for example a would become d,
b wille be e, and so on and so forth). Of course you can choose any
shift you want.

This way, the message can only be decrypted by the one who knows
the shift number which is the number of times the letters is
increased or shifted.
PURPOSE
As mentioned earlier, this is a great
way to encrypt messages that needs
to be kept in secrecy. The only
downside to this method is that
tools such as The Decrypter was
developed shortly after the
introduction of this method.
Program
CODE
The code to this program, written in C is
surprisingly simple and short as it deals
with only the index of the letters,
increases the number by the shift
number given by the user and prints the
coninciding letter thus forming a
meaningless sentence to the naked eye.
THANK
YOU

You might also like