Caesar Cipher

ByJayanthi

Caesar Cipher

After having done a couple of posts on the Blockchain technology for the A2Z Blogchatter challenge, I have resumed my writing in the Information security field and a fun cipher called the ‘Caesar cipher’. But before we see what is Caesar cipher, let us have a brief understanding of Cryptography.

From time immemorial, we are trying to make sure that important and crucial information is readable only by the right people once it has reached its destination. What if a crucial message falls into wrong hands and is read by them? This is prevented by making use of Cryptography and its various strategies.There are a number of ways(or technically called ‘ciphers’) to hide a message and the Caesar cipher is just one of them. This is done by encoding(converting to a special form) the information to be sent at the senderโ€™s end and decoding(re-converting to original form) the information on the receiverโ€™s end.

The field of cryptography is an old one and dates back to 2000 B.C. in Egypt. This same field is now gaining prominence thanks be to the Internet and the security lapses that have sprouted along with it. We see cryptographic principles being applied to many types of industries today.

Caesar Cipher:

Caesar cipher is one of the simplest ciphers to hide and send a message. It is a substitution cipher wherein the alphabets are moved right or left by a number of alphabets. 

For example, 

ABCDE

when shifted right by 3 places becomes 

CDEFG

The key is the number of alphabets that is shifted right or left. The receiver will have the key and he can decode the hidden message. 

For example,

BLOGGING becomes 

CMPHHJOH when shifted right by one alphabet.

Can you guess what this message this is? ๐Ÿ™‚

Scroll down for the answer!!

 

 

 

 

 

 

 

Have a nice day!! ๐Ÿ™‚

The previous post is here

 

How useful was this post?

Click on a star to rate it!

Average rating / 5. Vote count:

As you found this post useful...

Follow us on social media!

We are sorry that this post was not useful for you!

Let us improve this post!

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

About the author

Jayanthi administrator

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master's degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! :)

4 Comments so far

Reema DsouzaPosted on11:34 am - Apr 7, 2018

I love Caesar cipher. We used this a lot when organizing treasure hunts in college as well as while playing Secret Santa in office.

Sitharaam JayakumarPosted on12:34 pm - Sep 11, 2018

I am an IT professional and a coding enthusiast. I remember way back in 1996 when my boss wanted a set of text files to be encoded hurriedly and I just added thirty to the Ascii codes and put them in a text file and decoded by doing the reverse in programming code. LOL!! That was the silliest bit of work I have ever done, but then my boss was in a hurry and was not particularly worried how strongly the files were encoded. That was the pre-dynosaur era. Now of course we have powerful algorithms.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.