Info Sec Unit-2 Note-03
Info Sec Unit-2 Note-03
The additive ciphers are also called shift cipher. The encryption algorithm can be
interpreted as “shift key characters down” and the decryption algorithm can be interpreted
as “shift key characters up”. For example, if the key=15, the encryption algorithm shifts 15
characters down (toward the end of the alphabet). The decryption algorithm shifts 15
characters up (toward the beginning of the alphabet). When we reach the end or beginning
of the alphabet, we wrap around using modulo 26.
Caesar cipher:
Julius Caesar used an additive cipher to communicate with his officers. For this reason,
additive cipher is sometimes called Caesar cipher. Caesar used a key of 3 for his
communications
Example1: Encrypt the message “GO” using Caesar cipher, K=3
Plaintext=”GO”
Ciphertext=”JR”
Example2: Decrypt the message “JR” using Caesar cipher, K=3
Ciphertext=”JR”
Plaintext=”GO ”