The Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by B, B would become C, and so on. The method is apparently named after Julius Caesar, who apparently used it to communicate with his officials.
Thus to cipher a given text we need an integer value, known as shift which indicates the number of position each letter of the text has been moved down.
The encryption can be represented using modular arithmetic by first transforming the letters into numbers, according to the scheme, A = 0, B = 1,…, Z = 25. Encryption of a letter by a shift n can be described mathematically as.
(Encryption Phase with shift n)
(Decryption Phase with shift n)
Text : ABCDEFGHIJKLMNOPQRSTUVWXYZ Shift: 23 Cipher: XYZABCDEFGHIJKLMNOPQRSTUVW Text : ATTACKATONCE Shift: 4 Cipher: EXXEGOEXSRGI
Algorithm for Caesar Cipher:
- A String of lower case letters, called Text.
- An Integer between 0-25 denoting the required shift.
- Traverse the given text one character at a time .
- For each character, transform the given character as per the rule, depending on whether we’re encrypting or decrypting the text.
- Return the new string generated.
Program that receives a Text (string) and Shift value( integer) and returns the encrypted text.
Text : ATTACKATONCE Shift: 4 Cipher: EXXEGOEXSRGI
How to decrypt?
We can either write another function decrypt similar to encrypt, that’ll apply the given shift in the opposite direction to decrypt the original text. However we can use the cyclic property of the cipher under modulo , hence we can simply observe
Cipher(n) = De-cipher(26-n)
Hence, we can use the same function to decrypt, instead we’ll modify the shift value such that shift = 26-shift (Refer this for a sample run in C++).
This article is contributed by Ashutosh Kumar. If you like GeeksforGeeks and would like to contribute, you can also write an article and mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above
Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready.
- Vernam Cipher in Cryptography
- Bifid Cipher in Cryptography
- Custom Building Cryptography Algorithms (Hybrid Cryptography)
- Difference between Block Cipher and Transposition Cipher
- Difference between Monoalphabetic Cipher and Polyalphabetic Cipher
- Difference between Block Cipher and Stream Cipher
- Classical Cryptography and Quantum Cryptography
- Difference between Substitution Cipher Technique and Transposition Cipher Technique
- Caesar Concatenation
- DNA Cryptography
- Development of Cryptography
- Quantum Cryptography
- Cryptography and its Types
- RSA Algorithm in Cryptography
- Cryptography Introduction
- The CIA triad in Cryptography
- Difference between Cryptography and Cryptology
- Easy Key Management in Cryptography
- Image Steganography in Cryptography
- Avalanche Effect in Cryptography