0% found this document useful (0 votes)
11 views1 page

Info Sec Unit-2 Note-03

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

Info Sec Unit-2 Note-03

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Shift cipher:

The additive ciphers are also called shift cipher. The encryption algorithm can be
interpreted as “shift key characters down” and the decryption algorithm can be interpreted
as “shift key characters up”. For example, if the key=15, the encryption algorithm shifts 15
characters down (toward the end of the alphabet). The decryption algorithm shifts 15
characters up (toward the beginning of the alphabet). When we reach the end or beginning
of the alphabet, we wrap around using modulo 26.

Caesar cipher:
Julius Caesar used an additive cipher to communicate with his officers. For this reason,
additive cipher is sometimes called Caesar cipher. Caesar used a key of 3 for his
communications
Example1: Encrypt the message “GO” using Caesar cipher, K=3

P P’s value Encryption(C=(P+3) mod 26) C’s value C


G 6 (6+3) mod 26 = 22 9 J
O 14 (14+3) mod 26 = 19 17 R

Plaintext=”GO”
Ciphertext=”JR”
Example2: Decrypt the message “JR” using Caesar cipher, K=3

C C’s value Decryption(P=(C-3) mod 26) P’s value P


J 9 (9-3) mod 26 = 6 6 G
R 17 (17-3) mod 26 = 14 14 O

Ciphertext=”JR”
Plaintext=”GO ”

You might also like