- 1、本文档共6页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Caesar cipher - Wikipedia
Caesar cipher 1
Caesar cipher
The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is
with a shift of three, so that a B in the plaintext becomes E in the ciphertext.
Detail
Structure substitution cipher
Best public cryptanalysis
Susceptible to frequency analysis and brute force attacks.
In cryptography, a Caesar cipher, also known as a Caesars cipher, the shift cipher, Caesars code or Caesar
shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which
each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example,
with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius
Caesar, who used it to communicate with his generals.
The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as
the Vigenère cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution
ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security.
Example
The transformation can be represented by aligning two alphabets; the cipher alphabet is the plain alphabet rotated left
or right by some number of positions. For instance, here is a Caesar cipher using a left rotation of three places (the
shift parameter, here 3, is used as the key):
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
When encrypting, a person looks up each letter of the message in the plain line and writes down the corresponding
letter in the cipher line. Deciphering is done in reverse.
Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ
Plaintext: the quick brown fox jumps over the lazy dog
The encryption can also be represented using modular arithmetic by first transforming the letters into numbers,
according to the scheme, A = 0,
您可能关注的文档
- B3SL-1002P;B3SL-1022P;中文规格书,Datasheet资料.pdf
- B5U4 period 3 learning about the language(完整免费).ppt
- B3942 data sheet(revise)MOS管规格书.pdf
- b4 U 4 Warming up & Reading.ppt
- B3SN-3012P;B3SN-3112P;B3SN-3012;中文规格书,Datasheet资料.pdf
- baby-jumping festival.ppt
- B82422H1684K;B82422H1103K;B82422H1102K;B82422H1223K;B82422H1222K;中文规格书,Datasheet资料.pdf
- B85-PRO_Gamer主板说明书.pdf
- BACKGROUND STUDIO-BASED LEARNING.pdf
- Babycook 食谱.pdf
文档评论(0)