PR2 - Caesar Cipher - OK
PR2 - Caesar Cipher - OK
PRACTICAL NO.2
THEORY:
The Caesar Cipher technique is one of the earliest and simplest method of encryption
technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter
some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by
B, B would become C, and so on. The method is apparently named after Julius Caesar, who apparently
used it to communicate with his officials. Thus to cipher a given text we need an integer value, known as
shift which indicates the number of position each letter of the text has been moved down.
The encryption can be represented using modular arithmetic by first transforming the letters into numbers,
according to the scheme, A = 0, B = 1,…, Z = 25. Encryption of a letter by a shift n can be described
mathematically
(Encryption Phase with shift n)
(Decryption Phase with shift n)
E &TC/SEM-VII/C&NS/PR02 Page 1
Sipna College of Engineering & Technology, Amravati.
Department of Electronics and Telecommunication Engineering
Examples :
Text : ABCDEFGHIJKLMNOPQRSTUVWXYZ
Shift: 23
Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW
Text : ATTACKATONCE
Shift: 4
Cipher: EXXEGOEXSRGI
Input:
1. A String of lower case letters, called Text.
2. An Integer between 0-25 denoting the required shift.
Procedure:
Traverse the given text one character at a time.
For each character, transform the given character as per the rule, depending on whether we’re
encrypting or decrypting the text.
Return the new string generated.
Program :
#include <iostream>
E &TC/SEM-VII/C&NS/PR02 Page 2
Sipna College of Engineering & Technology, Amravati.
Department of Electronics and Telecommunication Engineering
if (isupper(text[i]))
else
return result;
}
// Driver program to test the above function
int main()
{
string text="ATTACKATONCE";
int s = 4;
return 0;
Output:
Text : ATTACKATONCE
Shift: 4
Cipher: EXXEGOEXSRGI
E &TC/SEM-VII/C&NS/PR02 Page 3