{"id":93,"date":"2023-06-11T19:37:33","date_gmt":"2023-06-11T19:37:33","guid":{"rendered":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?page_id=93"},"modified":"2023-06-11T19:38:40","modified_gmt":"2023-06-11T19:38:40","slug":"caesar-cipher","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/","title":{"rendered":"Caesar Cipher"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Intro<\/h2>\n<div class=\"tabcontent\">\n\n<h2>Encryption Algorithms<\/h2>\n<p><strong>What is encryption?<\/strong><\/p>\n<p>Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption!<\/p>\n<p><strong>What is it used for?<\/strong><\/p>\n<p>Encryption is used for a wide variety of purposes, including:<\/p>\n<ul>\n<li>Stopping unauthorised people accessing your school reocrds<\/li>\n<li>Protecting internet shopping transactions<\/li>\n<li>Securing online banking transactions<\/li>\n<li>Keeping your social media messages private<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Caesar<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Caesar Shift Cipher<\/h3>\n<p>The Caesar Shift is named after Julius Caesar, who used it to encrypt all messages of military significant. It is a form of substitution cipher, where letters were &#8216;shifted&#8217; along the alphabet by a certain number of letters. Caesar used a shift of 3 in all his ciphers.<\/p>\n<p><strong>3 Shift example<\/strong><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-32\" src=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift.png\" alt=\"caesar-shift-3-shift\" width=\"739\" height=\"87\" \/><\/p>\n<p>Using the 3 Shift example above you can encrypt a message&#8230;<\/p>\n<p><span style=\"color: #333399;\">Original: \u00a0\u00a0IHATESPROUTS<\/span><\/p>\n<p><span style=\"color: #333399;\">Coded: \u00a0 \u00a0 \u00a0LKDWHVSURXWV<\/span><\/p>\n<p>As you can see by the table above, letter G would be changed to J, M to P. To decrypt the message, you simply reverse the process.<\/p>\n<p><strong>Encryption Strength<\/strong><\/p>\n<ul>\n<li>In Caesar&#8217;s lifetime there were no known records of his cipher being broken by the enemy, although this is likely because often the enemy would be illiterate.<\/li>\n<li>In practice this algorithm is very easy to break, either manually, or with the aid of a computer and is extremely insecure.<\/li>\n<\/ul>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Encryption Algorithms What is encryption? Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption! What is it used for? Encryption is used for a&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Caesar Cipher<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Caesar Cipher - Edexcel iGCSE Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Caesar Cipher - Edexcel iGCSE Computer Science\" \/>\n<meta property=\"og:description\" content=\"Encryption Algorithms What is encryption? Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption! What is it used for? Encryption is used for a&hellip;&nbsp;Read More &raquo;Caesar Cipher\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/\" \/>\n<meta property=\"og:site_name\" content=\"Edexcel iGCSE Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-11T19:38:40+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/\",\"url\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/\",\"name\":\"Caesar Cipher - Edexcel iGCSE Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website\"},\"datePublished\":\"2023-06-11T19:37:33+00:00\",\"dateModified\":\"2023-06-11T19:38:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Caesar Cipher\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website\",\"url\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/\",\"name\":\"Edexcel iGCSE Computer Science\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Caesar Cipher - Edexcel iGCSE Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/","og_locale":"en_GB","og_type":"article","og_title":"Caesar Cipher - Edexcel iGCSE Computer Science","og_description":"Encryption Algorithms What is encryption? Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption! What is it used for? Encryption is used for a&hellip;&nbsp;Read More &raquo;Caesar Cipher","og_url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/","og_site_name":"Edexcel iGCSE Computer Science","article_modified_time":"2023-06-11T19:38:40+00:00","og_image":[{"url":"http:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/caesar-shift-3-shift.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/","url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/","name":"Caesar Cipher - Edexcel iGCSE Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website"},"datePublished":"2023-06-11T19:37:33+00:00","dateModified":"2023-06-11T19:38:40+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/caesar-cipher\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/"},{"@type":"ListItem","position":2,"name":"Caesar Cipher"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website","url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/","name":"Edexcel iGCSE Computer Science","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Encryption Algorithms What is encryption? Encryption is the scrambling of data so that only the intended recipient of data can decode and read it. In the starter you successfully decrypted anagrams to read the hidden word. This is a form (albeit very weak!!!) of encryption! What is it used for? Encryption is used for a&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/93"}],"collection":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":2,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/93\/revisions"}],"predecessor-version":[{"id":103,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/93\/revisions\/103"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/media?parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}