Caesar Cipher in Cryptography | Information Security

Cryptography: The field of study related to encoding information. The Caesar cipher was used by the Roman Army. The cipher was named after Julius Caesar who...

TechnoConfig•1.1K views•15:29

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Nigeria under the topic 'nysc portal registration batch c'.

About this video

Cryptography: The field of study related to encoding information. The Caesar cipher was used by the Roman Army. The cipher was named after Julius Caesar who used it to encrypt military and other official messages. Caesar cipher is a type of substitution cipher. Caesar cipher is a simple form of a “substitution cipher” where you replace each letter of the alphabet with another letter by shifting the whole alphabet a certain number of letters. Terms: Crypto: “secret“ Graphy: “writing” Encryption: is the process of translating plain text data (plaintext) into something meaningless (ciphertext). Decryption: is the process of converting ciphertext back to plaintext. Cipher: a method /algorithm that encrypts or disguises “text”; Key: the set of parameter that guide a cipher; Plaintext: The undisguised text is called “plaintext”; Ciphertext: The disguised text is called “ciphertext”; Cryptology “Science of secrets” Steps: Step 1. Write down each letter of the Alphabet (A-Z) in the plain row of the table. Step 2. Select Shift Key Value ( 1 – 25 ). Step 3. Using the shift Key value ( Key = 3), count the shift in the cipher row starting from left side of the row. Step 4. Write down each letter of the Alphabet (A-Z) in the cipher row of the table until the end. continue writing down the remaining of alphabet letters. Step 5 . Start encryption by selecting a message ( plaintext). Match the cipher letters ( cipher row) with each letter of your message ( plain row). Tutorial Parts: Introduction: 00:00 Terminology: 01:03 illustration: 02:04 Steps: 03:12 Encryption steps: 06:48 decryption steps: 10:54 Thank you for watching! Like & subscribe!

Video Information

Views
1.1K

Total views since publication

Likes
63

User likes and reactions

Duration
15:29

Video length

Published
Jun 25, 2020

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.