After having done a couple of posts on the Blockchain technology for the A2Z Blogchatter challenge, I have resumed my writing in the Information security field and a fun cipher called the ‘Caesar cipher’. But before we see what is Caesar cipher, let us have a brief understanding of Cryptography.
From time immemorial, we are trying to make sure that important and crucial information is readable only by the right people once it has reached its destination. What if a crucial message falls into wrong hands and is read by them? This is prevented by making use of Cryptography and its various strategies.There are a number of ways(or technically called ‘ciphers’) to hide a message and the Caesar cipher is just one of them. This is done by encoding(converting to a special form) the information to be sent at the sender’s end and decoding(re-converting to original form) the information on the receiver’s end.
The field of cryptography is an old one and dates back to 2000 B.C. in Egypt. This same field is now gaining prominence thanks be to the Internet and the security lapses that have sprouted along with it. We see cryptographic principles being applied to many types of industries today.
Caesar cipher is one of the simplest ciphers to hide and send a message. It is a substitution cipher wherein the alphabets are moved right or left by a number of alphabets.
when shifted right by 3 places becomes
The key is the number of alphabets that is shifted right or left. The receiver will have the key and he can decode the hidden message.
CMPHHJOH when shifted right by one alphabet.
Can you guess what this message this is? 🙂
Scroll down for the answer!!
Have a nice day!! 🙂
The previous post is here…
Click on a star to rate it!
Average rating / 5. Vote count:
Let us improve this post!
Thanks for your feedback!
Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.
She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂