caesar cipher mono alphabetic cipher

Caesar Cipher & Mono Alphabetic Cipher

Hello Friends, In this blog post I am going to let you know about the Caesar cipher and Mono Alphabetic cipher. Before going to explain this I want to provide you a small introduction with cipher or ciphertext so that those can also understand this who are totally unaware of cipher and ciphertext.

Cipher is a text and or encrypted text which is made after applying an encryption algorithm or certain rule to a plain text. So ultimately Cipher is the converted, encrypted text which generally gets decrypted when it finally reaches the receiver.

Types of Cipher :

Caesar Cipher:

The earliest known use of a substitution cipher, and the simplest, was by Julius caesar. The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet for example:

cipher1
Caesar cipher

Note that the alphabet is wrapped around so that the letter following Z is A. We can define the transformation by listing all possibilities as follows.

cipher3
Caesar Cipher

Let us assign a numerical equivalent to each letter.

cipher2
Caesar Cipher

Then the algorithm can be expressed as follows. For each plaintext letter P, Substitute the ciphertext letter C:

C = E(p) = (p+3)mod(26)

A shift may be of any amount so that the general caesar algorithm is

C = E (p) = (p+k)mod(26)

Where k takes on a value in the range 1 to 25. The decryption algorithm is simply
p = D (c) = (C-k) mod 26

If it is known that a given ciphertext is a caesar cipher, then brute force cryptanalysis is easily performed.

Mono Alphabetic Cipher:

With only 25 possible keys, the caesar cipher is far from secure. A dramatic increase in the keyspace can be achieved by allowing an arbitrary substitution. Recall the assignment for the caesar cipher:

cipher3
Mono Alphabetic Cipher

If instead, the ‘cipher’ line can be any permutation of the 26 alphabetic characters, then there are 26 ! or greater than 4 X 10pow26 possible keys.

This is 10 orders of magnitude greater than the keyspace for DES and would seem to eliminate brute-force techniques for cryptanalysis.

Such an approach is referred to as a monoalphabetic substitution cipher because a single cipher alphabet(mapping from the plain alphabet to cipher alphabet) is used per message.

An important point to note about this technique is that any letter in the plain text can be replaced by a pre-decided letter from the alphabet.

Since the substitution is random, thus the attacker can not easily find any relationship between the letters in the ciphertext, this is more effective than the Caesar cipher technique.

In the case of any queries, you can write to us at a5theorys@gmail.com we will get back to you ASAP.

Hope! you would have enjoyed this post about Caesar cipher and Mono Alphabetic Cipher.

Please feel free to give your important feedbacks in the comment section below.

Have a great time! Sayonara!