Number Theory Report FF

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

CRYPTOGRAPHY

ENCRYPTING AND DECRYPTING MESSAGES USING


CAESAR CIPHER
HISTORY OF
CRYPTOGRAPHY
CRYPTOGRAPHY
-originated from the Greek words, “krypto”
which means hidden and “graphene” which
means writing. It is the making or breaking of
secret codes. It is the making or breaking a
secret codes.
ANCIENT EGYPTIANS and
MESOPOTAMIANS were the first to use
basic encryption. The practice became
more sophisticated in ancient Greece with
philosophers like Polybios.
CRYPTOGRAPHY
-Leon Battista Alberti was the father of
Cryptography.
- It uses two processes namely:
1. Encryption
2. Decryption
ENCRYPTIO
N the process of transforming plain text into

code form using a certain algorithm.
EXAMPLE:
Math is fun (Plain Context)…….Original Message
PDWK LV IXQ (Coded form)…….Cipher text
DECRYPTION
 The process of converting back the
coded message into plain text.
KEY
- Refers to the strings of
information that is used to reveal
the encrypted message into
readable form.
METHODS OF
CRYPTOGRAPHY
• SHIFT CIPHER (CEASAR CIPHER)
• MODULO OPERATOR
“CAESAR CIPHER”

 Julius Caesar used this type of cipher when


sending messages to his military
commanders.
SHIFT CIPHER (CEASAR CIPHER)
 involves replacing each letter in the message
by a letter that is some fixed number of
positions further along in the alphabet. We'll
call this number the encryption key.
A B C D E F G H I J K L M N O
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14

P Q R S T U V W X Y Z
15 16 17 18 19 20 21 22 23 24 25
Thanks!
CREDITS: This presentation template was created by Slidesgo, and includes icons by Flaticon,
infographics & images by Freepik and content by Swetha Tandri

You might also like