SlideShare a Scribd company logo
1 of 10
Caesar Cipher
 Presented By:
1. Ali (2020-SE-33)
2. Hashar Ahmed (2020-SE-12)
Terms:
 Plaintext
 Is a message to be communicated.
 Ciphertext
 A disguised version of a plaintext.
 Encryption
 The process of turning Plaintext into Ciphertext.
 Decryption
 The process of turning Ciphertext into Plaintext.
Caesar Cipher
 One of the earliest known examples of substitution cipher.
 Said to have been used by Julius Caesar to communicate with his army (secretly).
 Each character of a plaintext message is replaced by a character n position down in the alphabet.
 Belongs to Substitution Cipher.
Caesar Cipher
Example:
 The first row denotes the plaintext
 Second row denotes the ciphertext
 The ciphertext is obtained by "shifting" the original letter by the N position to the right.
 In this example, it is shifted by 3 to the right.
 A becomes D
 B becomes E
 X becomes A, and so on...
A B C D E … … X Y Z
D E F G H … … A B C
Caesar Cipher
 Suppose the following plaintext is to be encrypted:
ATTACK AT DAWN
 By shifting each letter by 3, to the right. Then the resulting ciphertext would be:
DWWDFN DW GDZQ
A B C D E … … X Y Z
D E F G H … … A B C
Caesar Cipher
 One could shift other than 3 letters apart.
 The offset (Number of shifts) is called the "Key"
Decryption Process:
 Given that the key is known, just shift back N letter to the left.
Example:
 Ciphertext: WJYZWS YT GFXJ
 Key used: 5
 Plaintext: RETURN TO BASE
Caesar Cipher
Math Behind Encryption:
 This can be represented using modular arithmetic.
 Assume that : A = 0, B = 1, C = 2, ..., Y = 24, Z = 25.
 Encryption process can be represented as:
 Such that: e(x) = (x + k) (mod 26)
 X → the plaintext.
 K → the number of shifts (offset).
 26 → There are 26 letters in the alphabet (English alphabet).
Caesar Cipher
Math Behind Decryption:
 Can be represented using modular arithmetic.
 Assume that : A = 0, B = 1, C = 2, ..., Y = 24, Z = 25.
 The decryption process can be represented as:
 Such that: e(x) = (x - k) (mod 26).
 X → the plaintext.
 k → the key (number of shifts or offset).
 26 → There are 26 letters in the alphabet (English alphabet).
Example
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
 Then have Caesar cipher as:
 c = E(p) = (p + k) mod (26)  12%26  12 = M
 p = D(c) = (c – k) mod (26)  7%26  7 = H
 Example: HOWDY (7,14,22,3,24) encrypted using key k (i.e a shift of 5) is MTBID
Can Define Transformation as:
Mathematically Give Each Letter a number :
Thank You

More Related Content

Similar to Caesar Cipher.pptx Information Security ppt

27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
Mohamedshabana38
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf
Meera357768
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
keyurbz
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Kelly Bresnahan
 

Similar to Caesar Cipher.pptx Information Security ppt (20)

Cryptography (Affine Cipher) Ian Christine Mario.pptx
Cryptography (Affine Cipher) Ian Christine Mario.pptxCryptography (Affine Cipher) Ian Christine Mario.pptx
Cryptography (Affine Cipher) Ian Christine Mario.pptx
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
 
06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf06.03.2022 Reference Polyalphabetic Substitution.pdf
06.03.2022 Reference Polyalphabetic Substitution.pdf
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Cryptography
Cryptography Cryptography
Cryptography
 
6.5 determinant x
6.5 determinant x6.5 determinant x
6.5 determinant x
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1
 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Recently uploaded (20)

Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
 
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid Environments
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 

Caesar Cipher.pptx Information Security ppt

  • 1. Caesar Cipher  Presented By: 1. Ali (2020-SE-33) 2. Hashar Ahmed (2020-SE-12)
  • 2. Terms:  Plaintext  Is a message to be communicated.  Ciphertext  A disguised version of a plaintext.  Encryption  The process of turning Plaintext into Ciphertext.  Decryption  The process of turning Ciphertext into Plaintext.
  • 3. Caesar Cipher  One of the earliest known examples of substitution cipher.  Said to have been used by Julius Caesar to communicate with his army (secretly).  Each character of a plaintext message is replaced by a character n position down in the alphabet.  Belongs to Substitution Cipher.
  • 4. Caesar Cipher Example:  The first row denotes the plaintext  Second row denotes the ciphertext  The ciphertext is obtained by "shifting" the original letter by the N position to the right.  In this example, it is shifted by 3 to the right.  A becomes D  B becomes E  X becomes A, and so on... A B C D E … … X Y Z D E F G H … … A B C
  • 5. Caesar Cipher  Suppose the following plaintext is to be encrypted: ATTACK AT DAWN  By shifting each letter by 3, to the right. Then the resulting ciphertext would be: DWWDFN DW GDZQ A B C D E … … X Y Z D E F G H … … A B C
  • 6. Caesar Cipher  One could shift other than 3 letters apart.  The offset (Number of shifts) is called the "Key" Decryption Process:  Given that the key is known, just shift back N letter to the left. Example:  Ciphertext: WJYZWS YT GFXJ  Key used: 5  Plaintext: RETURN TO BASE
  • 7. Caesar Cipher Math Behind Encryption:  This can be represented using modular arithmetic.  Assume that : A = 0, B = 1, C = 2, ..., Y = 24, Z = 25.  Encryption process can be represented as:  Such that: e(x) = (x + k) (mod 26)  X → the plaintext.  K → the number of shifts (offset).  26 → There are 26 letters in the alphabet (English alphabet).
  • 8. Caesar Cipher Math Behind Decryption:  Can be represented using modular arithmetic.  Assume that : A = 0, B = 1, C = 2, ..., Y = 24, Z = 25.  The decryption process can be represented as:  Such that: e(x) = (x - k) (mod 26).  X → the plaintext.  k → the key (number of shifts or offset).  26 → There are 26 letters in the alphabet (English alphabet).
  • 9. Example A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z F G H I J K L M N O P Q R S T U V W X Y Z A B C D E  Then have Caesar cipher as:  c = E(p) = (p + k) mod (26)  12%26  12 = M  p = D(c) = (c – k) mod (26)  7%26  7 = H  Example: HOWDY (7,14,22,3,24) encrypted using key k (i.e a shift of 5) is MTBID Can Define Transformation as: Mathematically Give Each Letter a number :