Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Caesar ROT3 Cipher

When it comes to encrypting and decrypting the data, it is important to ensure the sensitive
data, or the entire data is masked for the user. That way, any unwanted access for any
unauthorized users can be prevented. Ciphers are basically referred to as substitutions for the
words (Goodwin, S. 2003). These are initially used by Julius Cipher and later on, substitutions
for all the words have been found.

An example of encryption can be seen below after encrypting my name. Caesar Cipher works as
the plain text is shifted to a certain number of places in the word. So that, it cannot be easily
tracked or found by the people who try to read the text.

After Decryption of “My name is Srinivas”, the decrypted cipher text result is rd sfrj nx xwnsnafx

The same method can also be followed if the user wants to view the encrypted data by
decrypting it. This operation can only be done if the user has enough access to that particular
data as only selected users can perform this operation. Likewise, ROT13 is used for serious
encryption procedures of data where most companies use this methodology to protect their
sensitive information such as PHI and PII.

Reference

Goodwin, S. (2003). CODES AND CIPHERS: Julius Caesar, the Enigma, and the Internet (Book).
Computing & Control Engineering, 14(3), 46.

You might also like