The document describes different cipher techniques including the Caesar cipher, keyword cipher, Giovanni's cipher method, and transposition cipher. These techniques encrypt messages by shifting or rearranging letters based on a key or keyword.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
38 views2 pages
TP For Cybersec
The document describes different cipher techniques including the Caesar cipher, keyword cipher, Giovanni's cipher method, and transposition cipher. These techniques encrypt messages by shifting or rearranging letters based on a key or keyword.