Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

Like this presentation? Why not share!

10,223 views

Published on

A brief description about what Caesar Cipher is.

License: CC Attribution-NonCommercial License

No Downloads

Total views

10,223

On SlideShare

0

From Embeds

0

Number of Embeds

352

Shares

0

Downloads

0

Comments

0

Likes

23

No embeds

No notes for slide

- 1. CAESAR CIPHER Cryptography & Cryptanalysis Ramadhi Irawan
- 2. DEFINITION • Plaintext • Is a message to be communicated. • Ciphertext • A disguided version of a plaintext. • Encryption • The process of turning Plaintext into Ciphertext. • Decryption • The process of turning Ciphertext into Plaintext. • Encipher / Decipher • Are synonymous with the verb encrypt & decrypt.
- 3. DEFINITION • Cryptology • The study of encryption and decryption. • Cryptography • The application of Cryptology.
- 4. CAESAR CIPHER • One of the earliest known example of substitution cipher. • Said to have been used by Julius Caesar to communicate with his army (secretly). • Each character of a plaintext message is replaced by a character n position down in the alphabet. • Belongs to Substitution Cipher
- 5. CAESAR CIPHER A B C D E … … X Y Z D E F G H … … A B C • Example: • First row denotes the plaintext • Second row denotes the ciphertext • Ciphertext is obtain by “shifting” the orginal letter by N position to the right. • In This example, it is shifted by 3 to the right. • A becomes D • B becomes E • X becomes A, and so on…
- 6. CAESAR CIPHER A B C D E … … X Y Z D E F G H … … A B C • Suppose the following plaintext is to be encrypted: ATTACK AT DAWN • By shifting each letter by 3, to the right. Then the resulting ciphertext would be: DWWDFN DW GDZQ
- 7. CAESAR CIPHER • One could shift other than 3 letters apart. • The offset (Number of shift) is called the “Key” • Decryption Process: • Given that the key is known, just shift back N letter to the left. • Example: • Ciphertext: WJYZWS YT GFXJ • Key used: 3 • Plaintext: RETURN TO BASE
- 8. CAESAR CIPHER • Math behind this: • Can be represented using modular arithmetic • Assume that : • A = 0, B = 1, C = 2, …, Y = 24, Z = 25 • Encryption process can be represented as: • Such that: • X the plaintext. • k the number of shift (offset). • 26 There are 26 letters in the alphabet (English alphabet).
- 9. CAESAR CIPHER • Math behind this: • Can be represented using modular arithmetic • Assume that : • A = 0, B = 1, C = 2, …, Y = 24, Z = 25 • Decryption process can be represented as: • Such that: • X the plaintext. • k the key (number of shift or offset). • 26 There are 26 letters in the alphabet (English alphabet).
- 10. CAESAR CIPHER • Summary • Considerably easy to break. • Brute force attack works pretty well, due to relatively small keys (only allows 26 different keys). • Also known as monoalphabetic cipher, which the same plaintext letters are always replaced by the same ciphertext letters. • Mono – means one, indicates that each letter has a single substitute.

No public clipboards found for this slide

Be the first to comment