Ways of producing cipher text from plain text

November 29, 2016 · 1 mins read

As we have discussed in one of my another post that a cryptography is the way of producing encrypted text out of the simple or plane text. In that post we also talked in detail about the definition of cipher text and plain text.

So in this post we are going to discuss the ways in which we can convert the simple plain text to cipher text. I am
sure I will we able to keep this post more user friendly such that non-technical people can also read it easily.

I believe that anything that is introduced into the stream of computer science are taken from the real world
applications. So I will try to relate everything to the real world examples.

So after the first example we are definitely going to know the difference between the plain text and the cipher
text. So let us start the journey.

So the process of conversion of cipher text into plain text is divided into two parts, which are as follows.

* Substitution
* Transposition

Probably in this post we are only going to discuss about only a few of the substitution techniques and for the
    other one's you might like to read the follow ups.

    * **Ceaser cipher**

    Ceaser cipher is the one of the oldest techniques in which the every character in our message was replaced
        by a character that is a fixed distant far from the particular character. For example, if we want to convert
        tech zodiac into the encrypted form than we will use the letters that are 3 forward from the character in
        the plain text.

plain text : techzodiac

cipher text: whflcgmdf

Now this was not very difficult to crack but this is how it started. 

    * **Modified ceaser cipher **

    In this technique we converted the text such that the every character is not a fixed distance far i.e.
        earlier it was fixed to 3 but now the cipher text generator can keep it how much he wants. Thus, the cryptanalyst.
Please share your Feedback:

Did you enjoy reading or think it can be improved? Don’t forget to leave your thoughts in the comments section below! If you liked this article, please share it with your friends, and read a few more!

We don't share your details with others