Practical No. 05: Write A Program To Implement Caesar Cipher I. Practical Significance
Practical No. 05: Write A Program To Implement Caesar Cipher I. Practical Significance
I. Practical Significance
In cryptography, a Caesar cipher is categorized as a substitution cipher in which the alphabet in the plain
text is shifted by a fixed number down the alphabet. Advantages of using a Caesar cipher include: One of the
easiest methods to use in cryptography and can provide minimum security to the information.
It is one of the simplest encryption technique in which each character in plain text is replaced by a
character some fixed number of positions down to it.
For example, if key is 3 then we have to replace character by another character that is 3 position down to it.
Like A will be replaced by D, C will be replaced by F and so on.
For example, here’s the Caesar Cipher encryption of a full message, using a left shift of 3.
VIII. Procedure
1. What is Cipher?
2. What is plain text?
3. What is cipher text?
4. Define: Encryption and decryption
5. List the advantages of cryptography?
6. What is substitution cipher?
7. Enist the types of substitution cipher.
8. Encrypt the message “I AM A HACKER” using Caesar’s substitution cipher . Consider shift of 3.
a) http://nptel.ac.in/courses/106105162/
b) https://www.tutorialspoint.com//computer_security/computer_security_quick_guide.htm
c) http://learnthat.com/introduction-to-network-security/
d) https://freevideolectures.com/course/3027/cryptography-and-network-security
e) https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-
security-fall-2014/video-lectures/
f) http://stylesuxx.github.io/steganography/
g) https://smartninja-pgp.appspot.com/
h) http://www.cyberlawsindia.net/cyber-india.html
i) https://www.upcounsel.com/cyber-law
j) http://cyberlaws.net/cyber-law/
XII. Skills Developed:
1. .....................................
2. .....................................
3. .....................................