0% found this document useful (0 votes)
84 views3 pages

Caesar

substition cryptography

Uploaded by

Ashagrie Goshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views3 pages

Caesar

substition cryptography

Uploaded by

Ashagrie Goshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

The Caesar Cipher: An Introduction

The Caesar cipher is one of the simplest and most widely known encryption techniques. Named
after Julius Caesar, who reportedly used it to secure military communications, it is a type of
substitution cipher in which each letter in the plaintext is shifted by a certain number of places
down or up the alphabet.

Key Features of the Caesar Cipher

1. Substitution Cipher: Each letter in the plaintext is replaced by another letter, which is a
fixed number of positions away in the alphabet.
2. Key: The number of positions to shift is the key. For example, with a key of 3:
o A becomes D
o B becomes E
o Z becomes C
3. Alphabet Wrapping: When the shift exceeds the end of the alphabet, it wraps around to
the beginning.

Example of a Caesar Cipher

Key = 5

Plaintext Letter Encrypted Letter


A F
B G
C H
... ...
X C
Y D
Z E

Encryption Process:

Plaintext: HELLO

1. Shift each letter by 5:


o H -> M
o E -> J
o L -> Q
o L -> Q
o O -> T
Ciphertext: MJQQT

Decryption of the Caesar Cipher

To decrypt, reverse the process by shifting the letters back by the same key.

For example: Ciphertext: MJQQT


Key: 5

1. Shift each letter backward by 5:


o M -> H
o J -> E
o Q -> L
o Q -> L
o T -> O

Plaintext: HELLO

Strengths and Weaknesses

Strengths:

 Simple and easy to implement.


 Good for learning the basics of cryptography.

Weaknesses:

 Vulnerable to brute force attacks (only 25 possible keys).


 Easily broken with frequency analysis since it does not disguise letter frequencies.

Caesar Cipher Substitution Table (Key = 5)

Letter Shifted Letter


A F
B G
C H
D I
E J
F K
Letter Shifted Letter
G L
H M
I N
J O
K P
L Q
M R
N S
O T
P U
Q V
R W
S X
T Y
U Z
V A
W B
X C
Y D
Z E

Conclusion

The Caesar cipher is an excellent starting point for understanding cryptography. While it is no
longer used for secure communication due to its simplicity, its historical significance and
pedagogical value make it a key topic in the study of encryption techniques.

You might also like