Question: Part 1 : The Caesar Cipher Since the beginning of time there has always been a need to keep information private and secure . One
Part : The Caesar Cipher
Since the beginning of time there has always been a need to keep information private and secure One of the first know cyphers to date is the Caesar cipher. The Caesar cipher was invented by Julius Caesar and used for military communication. The premise of how the Caesar cipher worked was by taking the plain text message and shifting the letters by a fixed number of positions in the alphabet. Then to decode the message the receiver would have to know the shifted key and do the whole process in reverse.
Lets say that we have the normal alphabet listed below.
Figure
Now lets add a shift to the alphabet with a shift factor of
Figure
If you look at the shifted text from far away it looks like gibberish but if you look at it closely you can see that the alphabet is still there but just moved to the right by a factor of This is the basis of the Caesars cipher.
Lets Practice Together.
Lets encrypt the word Technology and have the key set to a shift of
Figure
Now that you know the basics of the Caesar Cipher, it is your turn to encrypt and decrypt some messages. You can use online decoders to help.
Your turn.
Decrypt the message below.
Max Vtxltk vbiaxk lxkoxl tl t ablmhkbvte ikxvnklhk mh fhwxkg xgvkrimbhg fxmahwl, abzaebzambgz max xgwnkbgz gxxw yhk lxvnkx vhffngbvtmbhg makhnzahnm max tzxl Bml lbfiebvbmr ngwxklvhkxl max hgzhbgz inklnbm hy fhkx lhiablmbvtmxw tgw lxvnkx xgvkrimbhg mxvagbjnxl bg max kxtef hy bgyhkftmbhg lxvnkbmr
Plain Text Message
Key
Encrypt the message below.
As an IT professional you typically have a wide range of responsibilities that revolve around managing and maintaining technology systems to support an organizations objectives. What you are learning in class will help you with your professional career, but technology is always advancing so continued learning and exploration is imperative.
Encrypted Message
Key
Can you identify any potential weaknesses that this cipher may possess? and explain?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
