reading-notes

Think you might be in the wrong place? Go home!

What is the basic principle behind the Caesar Cipher, and how was it used historically?

The Caesar Cipher is a simple substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

For example, with a shift of 3, ‘A’ would be replaced by ‘D’, ‘B’ would become ‘E’, and so on.

It was named after Julius Caesar, who reportedly used it to communicate with his generals. The Caesar Cipher provided a basic level of security by obscuring the contents of messages. Its simplicity, however, made it easy to crack, even in ancient times.

What are the key differences between symmetric and asymmetric encryption? How is asymmetric used in secure communication today?

Symmetric Encryption

Asymmetric Encryption

Usage in Secure Communication Today

Asymmetric encryption is widely used for secure communications over the internet, such as in HTTPS, email encryption, and secure file transfer protocols. It’s also crucial for establishing secure connections (like in SSL/TLS) where symmetric keys are exchanged securely using asymmetric methods.

How do computers generate random numbers, and what are the differences between true random number generation (TRNG) and pseudo-random number generation (PRNG)? Discuss their use cases in cryptography.

True Random Number Generation (TRNG)

Pseudo-Random Number Generation (PRNG)

Encryption

Imagine locking a valuable item in a safe. The ‘item’ is your data, and the ‘safe’ is the encryption algorithm. The key to the safe is the encryption key, which secures the data so that only authorized individuals can access it.

Decryption

Imagine unlocking the safe to retrieve the valuable item. Here, the correct key (decryption key) is used to unlock (decrypt) the data, returning it to its original, readable form.

Information modeled using ChatGPT