Question: Part 1 : The Caesar Cipher Since the beginning of time there has always been a need to keep information private and secure . One

Part 1: The Caesar Cipher
Since the beginning of time there has always been a need to keep information private and secure. One of the first know cyphers to date is the Caesar cipher. The Caesar cipher was invented by Julius Caesar and used for military communication. The premise of how the Caesar cipher worked was by taking the plain text message and shifting the letters by a fixed number of positions in the alphabet. Then to decode the message the receiver would have to know the shifted key and do the whole process in reverse.
Lets say that we have the normal alphabet listed below.
Figure 1
Now lets add a shift to the alphabet with a shift factor of 10.
Figure 2
If you look at the shifted text from far away it looks like gibberish but if you look at it closely you can see that the alphabet is still there but just moved to the right by a factor of 10. This is the basis of the Caesars cipher.
Lets Practice Together.
Lets encrypt the word Technology and have the key set to a shift of 10.
Figure 3
Now that you know the basics of the Caesar Cipher, it is your turn to encrypt and decrypt some messages. You can use online decoders to help.
Your turn.
1) Decrypt the message below.
Max Vtxltk vbiaxk lxkoxl tl t ablmhkbvte ikxvnklhk mh fhwxkg xgvkrimbhg fxmahwl, abzaebzambgz max xgwnkbgz gxxw yhk lxvnkx vhffngbvtmbhg makhnzahnm max tzxl. Bml lbfiebvbmr ngwxklvhkxl max hgzhbgz inklnbm hy fhkx lhiablmbvtmxw tgw lxvnkx xgvkrimbhg mxvagbjnxl bg max kxtef hy bgyhkftmbhg lxvnkbmr.
Plain Text Message -
Key -
2) Encrypt the message below.
As an IT professional you typically have a wide range of responsibilities that revolve around managing and maintaining technology systems to support an organizations objectives. What you are learning in class will help you with your professional career, but technology is always advancing so continued learning and exploration is imperative.
Encrypted Message
Key -
3) Can you identify any potential weaknesses that this cipher may possess? and explain?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!