KIM COMPUTER


Caesar Cipher Basics

The Caesar Cipher is one of the oldest and simplest forms of substitution cipher. It involves replacing each letter in the plaintext (original message) with a letter a fixed number of positions down or up the alphabet.


1. The Principle: Substitution

2. Encryption Process

Plaintext: ATTACK Key: 3 (Shift 3 positions to the right)

  1. A shifts 3 places: B, C, D $\rightarrow$ D
  2. T shifts 3 places: U, V, W $\rightarrow$ W
  3. T shifts 3 places: W $\rightarrow$ W
  4. A shifts 3 places: D $\rightarrow$ D
  5. C shifts 3 places: D, E, F $\rightarrow$ F
  6. K shifts 3 places: L, M, N $\rightarrow$ N

  7. Ciphertext: DWWDFN

Wrap-around (Circular) Handling: If the shift goes past Z, it wraps back to A. (This uses the mathematical operation Modulo 26, $\pmod{26}$).

3. Decryption

Decryption is the reverse process. If the encryption key was +3, the decryption key is -3 (or +23, since $26-3=23$).

4. Security Weakness

The Caesar Cipher is extremely weak by modern cryptographic standards.