最好的洗发水是什么牌子| 清远车牌是粤什么| 牛郎织女是什么意思| 狐臭挂什么科| 内脂是什么| 多肽是什么意思| 痃癖是什么病| 来月经同房有什么影响| 11.28什么星座| 义齿是什么| 七年之痒是什么意思| 屁股眼痒是什么原因| 中元节注意什么| sigma是什么牌子| 什么时候进伏| 什么的夏夜| 老头乐是什么| 伤疤好了变黑了是什么原因| 梦见捡到钱是什么意思| 什么叫捞女| 04年是什么年| ber是什么意思| 看静脉曲张挂什么科| 喝黑苦荞茶有什么好处和坏处| 壬申日是什么意思| 乳糖不耐受喝什么牛奶| 今年养殖什么最挣钱| 15是什么意思| 眼睑炎用什么药效果好| cyan是什么颜色| 刘备是一个什么样的人| 右佐匹克隆是什么药| 颈椎做什么检查| 9月1号什么星座| 什么是割包皮| 显著是什么意思| 结石不能吃什么| 一饿就胃疼什么原因| 新生儿血糖低是什么原因| 人品好是什么意思| 痛经吃什么好| 也是什么意思| 肝腹水是什么病| 例假量多是什么原因| 手足口病有什么症状| 区长是什么级别的干部| 硫酸羟氯喹片治什么病| 手指甲上有白点是什么原因| 迅雷不及掩耳之势是什么意思| 西游记是一部什么小说| 瑗字五行属什么| 智商什么意思| 生肖牛和什么生肖最配| 杭字五行属什么| 孕妇吃火龙果有什么好处| 窦性心律不齐什么意思| 卜留克是什么菜| 跌水是什么意思| 喉咙红肿吃什么药| by是什么意思| 埃及是什么人种| 久坐脚肿是什么原因| 阑尾炎做什么检查| 子宫内膜厚是什么原因引起的| 两个山念什么| 小便是红色的是什么原因男性| 成人打虫吃什么药| 2026是什么年| 陶渊明字什么| 嘴唇干是什么原因| 什么时候测血压最准| sweet什么意思| 不齿是什么意思| 痔疮挂什么科室| 黄芪泡水喝有什么作用| 癌症病人吃什么| 一五行属性是什么| 什么是菩提心| 脸容易红是什么原因| 腰痛是什么原因| 梦见吃药是什么意思| 医院按摩挂什么科| 茂密的枝叶像什么| 舌苔发白是什么原因呢| 桃花眼的女人什么命| 精卫填海是什么意思| 安全总监是什么级别| 卒中什么意思| 尿肌酐高是什么原因| 生长痛是什么| 家里放什么最招财| 下水道井盖为什么是圆的| 女性看乳房应该挂什么科| 90年是什么年| 什么书最香| 无与伦比是什么意思| 恒牙是什么牙| 小狗什么时候可以洗澡| 决明子有什么作用| 什么样的白带是怀孕了| 硬下疳长什么样| 鱼靠什么呼吸| 小孩睡觉流鼻血是什么原因引起的| 手抖是什么原因| 对牛弹琴代表什么生肖| 3月28日什么星座| 经常闪腰是什么原因引起的| 什么茶助眠| 明矾和白矾有什么区别| 舌苔发黄吃什么药| 91年出生的属什么| 肝胆胰脾挂什么科| lcu是什么意思| 心脏跳动过快吃什么药| 包皮垢是什么| 红豆薏仁水有什么功效| 5d电影是什么| d是什么意思| 直肠炎有什么症状| 鱿鱼属于什么类| 布加综合征是什么病| 培土什么意思| 三角梅什么时候换盆| 天什么海什么| 什么是跑马| 火为什么没有影子| 倒打一耙的前一句是什么| 生菜有什么营养价值| 跟着好人学好人下句是什么| 太阳出来我爬山坡是什么歌| 男生做爱什么感觉| 双肺局限性气肿是什么病| 印迹杂交技术检查什么| 拖什么东西最轻松| jk什么意思| 输血四项检查是什么| 身体发烧是什么原因| 脖子后面有痣代表什么| 前列腺炎吃什么食物好| 红楼梦为什么是四大名著之首| 今期难过美人关是什么生肖| 一什么蔷薇| 英语6级是什么水平| 高血压应该吃什么| 什么是山海经| 为什么虾煮熟了会变红| 9月3号是什么日子| chd医学上是什么意思| 高贵的什么| 女m是什么意思| 推迟月经吃什么药| 什么叫管状腺瘤| 牛角尖是什么意思| 什么是医学检验技术| 什么叫内分泌失调是什么意思| 糖尿病患者可以吃什么水果| 副高是什么意思| 嘴角长水泡是什么原因| 张良属什么生肖| 覃读什么| 大门是什么生肖| 不小心怀孕了吃什么药可以流掉| 数字绘画是什么| 什么是感觉| 孤僻是什么意思| 两颗星是什么军衔| 别有洞天是什么生肖| 泥鳅什么人不能吃| 腹泻吃什么好| 气山读什么| 血糖低是什么原因| 男性婚检都检查什么项目| 窜稀是什么意思| 喉咙痛吃什么药好得快| 1880年是什么朝代| 手术后可以吃什么水果| 史努比是什么意思| 眼屎多是什么原因| 调羹是什么意思| 腋窝疼是什么原因| 势利是什么意思| 做放疗的人吃什么好| 老日念什么| 蒙脱石是什么| 盆腔炎用什么药最好| 旭五行属性是什么| 过敏用什么药膏| 主动脉壁钙化是什么意思| 人为什么会觉得累| 孩子咳嗽吃什么饭菜好| 昙花什么时间开花| secret是什么意思| 随诊什么意思| 纯原是什么意思| 不对劲是什么意思| 前列腺不能吃什么食物| 极差是什么| trendiano什么牌子| 眼睛胀痛是什么原因| 做提肛运动有什么好处| 小鸟来家里有什么预兆| 贝塔是什么意思| cp感什么意思| 八字五行属什么| 转载是什么意思| 什么是县级市| 回忆杀是什么意思| 18号来月经什么时候是排卵期| 积水是什么意思| 貂蝉原名叫什么| 细菌性阴道炎是什么原因引起的| 大拇指麻木是什么原因| 梦见自己有孩子了是什么预兆| 公安局大队长是什么级别| 子宫内膜厚吃什么食物好| 双歧杆菌三联和四联有什么区别| 才思敏捷是什么意思| 克感敏又叫什么| 替代品是什么意思| 猪吃什么食物| 六味地黄丸的功效是什么| 见好就收是什么意思| 夏枯草有什么作用| 什么食物对眼睛好| 狂野是什么意思| 晚上7点到9点是什么时辰| 胡子变白是什么原因| 左肾肾盂分离什么意思| 什么是蚂蚁上树| 妊娠是什么意思| touch什么意思| 口腔科主要看什么| 属猴和什么属相相克| nag是什么意思| 说什么好| 胰岛素是什么| 预热是什么意思| 公招是什么意思| 气血两虚吃什么药| 囊肿是什么引起的| opo是什么意思| 红烧肉配什么菜好吃| 孩子打呼噜是什么原因| 减肥吃什么肉类| 肿瘤是什么意思| fl是胎儿的什么| 甲状腺是什么部位| in77是什么意思| 妇科湿疹用什么药膏最有效| 肚子腹泻是什么原因| 脑梗吃什么药效果好| 今年52岁属什么生肖| 警察为什么叫条子| 1963属什么生肖| 肚脐上面疼是什么原因| 耳石症看什么科| 4月28号是什么星座| 人为什么需要诗歌| 什么然而生| 肚子左边疼是什么原因| 咕咾肉是什么肉| 唐伯虎是什么生肖| 纤维蛋白原是什么意思| 翊字是什么意思| 百度Jump to content

台风为什么叫台风

From Wikipedia, the free encyclopedia
百度 比亚祝贺栗战书当选全国人大常委会委员长,高度赞赏中国对非政策,感谢中方对喀麦隆长期一贯支持,愿支持两国立法机构加强交往,推动两国关系进一步发展。

The action of a Caesar cipher is to replace each plaintext letter with a different one a fixed number of places down the alphabet. The cipher illustrated here uses a left shift of 3, so that (for example) each occurrence of E in the plaintext becomes B in the ciphertext.

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on.[1] The method is named after Julius Caesar, who used it in his private correspondence.

The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenère cipher, and still has modern application in the ROT13 system. As with all single-alphabet substitution ciphers, the Caesar cipher is easily broken and in modern practice offers essentially no communications security.

Example

[edit]

The transformation can be represented by aligning two alphabets; the cipher is the plain alphabet rotated left or right by some number of positions. For instance, here is a Caesar cipher using a left rotation of three places, equivalent to a right shift of 23 (the shift parameter is used as the key):

Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher XYZABCDEFGHIJKLMNOPQRSTUVW

When encrypting, a person looks up each letter of the message in the "plain" line and writes down the corresponding letter in the "cipher" line.

Plaintext:  THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
Ciphertext: QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD

Deciphering is done in reverse, with a right shift of 3.

The encryption can also be represented using modular arithmetic by first transforming the letters into numbers, according to the scheme, A → 0, B → 1, ..., Z → 25.[2] Encryption of a letter x by a shift n can be described mathematically as,[3][4]

Decryption is performed similarly,

(Here, "mod" refers to the modulo operation. The value x is in the range 0 to 25, but if x + n or x ? n are not in this range then 26 should be added or subtracted.)

The replacement remains the same throughout the message, so the cipher is classed as a type of monoalphabetic substitution, as opposed to polyalphabetic substitution.

History and usage

[edit]
The Caesar cipher is named for Julius Caesar, who used an alphabet where decrypting would shift three letters to the left.

The Caesar cipher is named after Julius Caesar, who, according to Suetonius, used it with a shift of three (A becoming D when encrypting, and D becoming A when decrypting) to protect messages of military significance.[5] While Caesar's was the first recorded use of this scheme, other substitution ciphers are known to have been used earlier.[6][7]

"If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others."

His nephew, Augustus, also used the cipher, but with a right shift of one, and it did not wrap around to the beginning of the alphabet:

"Whenever he wrote in cipher, he wrote B for A, C for B, and the rest of the letters on the same principle, using AA for Z."

Evidence exists that Julius Caesar also used more complicated systems,[8] and one writer, Aulus Gellius, refers to a (now lost) treatise on his ciphers:

"There is even a rather ingeniously written treatise by the grammarian Probus concerning the secret meaning of letters in the composition of Caesar's epistles."

—?Aulus Gellius, Attic Nights 17.9.1–5

It is unknown how effective the Caesar cipher was at the time; there is no record at that time of any techniques for the solution of simple substitution ciphers. The earliest surviving records date to the 9th-century works of Al-Kindi in the Arab world with the discovery of frequency analysis.[9]

A piece of text encrypted in a Hebrew version of the Caesar cipher not to be confused with Atbash, is sometimes found on the back of Jewish mezuzah scrolls. When each letter is replaced with the letter before it in the Hebrew alphabet the text translates as "YHWH, our God, YHWH", a quotation from the main part of the scroll.[10][11]

In the 19th century, the personal advertisements section in newspapers would sometimes be used to exchange messages encrypted using simple cipher schemes. David Kahn (1967) describes instances of lovers engaging in secret communications enciphered using the Caesar cipher in The Times.[12] Even as late as 1915, the Caesar cipher was in use: the Russian army employed it as a replacement for more complicated ciphers which had proved to be too difficult for their troops to master; German and Austrian cryptanalysts had little difficulty in decrypting their messages.[13]

Caesar cipher can be constructed into a disk with outer rotating wheel as plain text and the inner fixed wheel as cipher text. Both outer and inner plates should have alphabets in the same direction.
Caesar cipher translated to a disk has both outer and inner plates having alphabets in the same direction and not the reverse as seen in CipherDisk2000.

Caesar ciphers can be found today in children's toys such as secret decoder rings. A Caesar shift of thirteen is also performed in the ROT13 algorithm, a simple method of obfuscating text widely found on Usenet and used to obscure text (such as joke punchlines and story spoilers), but not seriously used as a method of encryption.[14]

The Vigenère cipher uses a Caesar cipher with a different shift at each position in the text; the value of the shift is defined using a repeating keyword.[15] If the keyword is as long as the message, is chosen at random, never becomes known to anyone else, and is never reused, this is the one-time pad cipher, proven unbreakable. However the problems involved in using a random key as long as the message make the one-time pad difficult to use in practice. Keywords shorter than the message (e.g., "Complete Victory" used by the Confederacy during the American Civil War), introduce a cyclic pattern that might be detected with a statistically advanced version of frequency analysis.[16]

In April 2006, fugitive Mafia boss Bernardo Provenzano was captured in Sicily partly because some of his messages, clumsily written in a variation of the Caesar cipher, were broken. Provenzano's cipher used numbers, so that "A" would be written as "4", "B" as "5", and so on.[17]

In 2011, Rajib Karim was convicted in the United Kingdom of "terrorism offences" after using the Caesar cipher to communicate with Bangladeshi Islamic activists discussing plots to blow up British Airways planes or disrupt their IT networks. Although the parties had access to far better encryption techniques (Karim himself used PGP for data storage on computer disks), they chose to use their own scheme (implemented in Microsoft Excel), rejecting a more sophisticated code program called Mujahedeen Secrets "because 'kaffirs', or non-believers, know about it, so it must be less secure".[18]

Breaking the cipher

[edit]
Decryption
shift
Candidate plaintext
0 exxegoexsrgi
1 dwwdfndwrqfh
2 cvvcemcvqpeg
3 buubdlbupodf
4 attackatonce
5 zsszbjzsnmbd
6 yrryaiyrmlac
...
23 haahjrhavujl
24 gzzgiqgzutik
25 fyyfhpfytshj

The Caesar cipher can be easily broken even in a ciphertext-only scenario. Since there are only a limited number of possible shifts (25 in English), an attacker can mount a brute force attack by deciphering the message, or part of it, using each possible shift. The correct description will be the one which makes sense as English text.[19] An example is shown on the right for the ciphertext "exxegoexsrgi"; the candidate plaintext for shift four "attackatonce" is the only one which makes sense as English text. Another type of brute force attack is to write out the alphabet beneath each letter of the ciphertext, starting at that letter. Again the correct decryption is the one which makes sense as English text. This technique is sometimes known as "completing the plain component".[20][21]

The distribution of letters in a typical sample of English language text has a distinctive and predictable shape. A Caesar shift "rotates" this distribution, and it is possible to determine the shift by examining the resultant frequency graph.

Another approach is to match up the frequency distribution of the letters. By graphing the frequencies of letters in the ciphertext, and by knowing the expected distribution of those letters in the original language of the plaintext, a human can easily spot the value of the shift by looking at the displacement of particular features of the graph. This is known as frequency analysis. For example, in the English language the plaintext frequencies of the letters E, T, (usually most frequent), and Q, Z (typically least frequent) are particularly distinctive.[22] Computers can automate this process by assessing the similarity between the observed frequency distribution and the expected distribution. This can be achieved, for instance, through the utilization of the chi-squared statistic[23] or by minimizing the sum of squared errors between the observed and known language distributions.[24]

The unicity distance for the Caesar cipher is about 2, meaning that on average at least two characters of ciphertext are required to determine the key.[25] In rare cases more text may be needed. For example, the words "river" and "arena" can be converted to each other with a Caesar shift, which means they can produce the same ciphertext with different shifts. However, in practice the key can almost certainly be found with at least 6 characters of ciphertext.[26]

With the Caesar cipher, encrypting a text multiple times provides no additional security. This is because two encryptions of, say, shift A and shift B, will be equivalent to a single encryption with shift A + B. In mathematical terms, the set of encryption operations under each possible key forms a group under composition.[27]

See also

[edit]

Notes

[edit]
  1. ^ Smith, James (2025-08-07). "Writing Secret Messages With a Caesar Cipher". Golang Project Structure. Retrieved 2025-08-07.
  2. ^ Luciano, Dennis; Gordon Prichett (January 1987). "Cryptology: From Caesar Ciphers to Public-Key Cryptosystems". The College Mathematics Journal. 18 (1): 2–17. CiteSeerX 10.1.1.110.6123. doi:10.2307/2686311. JSTOR 2686311.
  3. ^ Wobst, Reinhard (2001). Cryptology Unlocked. Wiley. p. 19. ISBN 978-0-470-06064-3.
  4. ^ "Caesar Cipher". Solidify Software. Retrieved 2025-08-07.
  5. ^ Suetonius. "56.6". Vita Divi Julii (in Latin).
  6. ^ "Cracking the Code". Central Intelligence Agency. Archived from the original on 26 December 2020. Retrieved 21 February 2017.
  7. ^ Singh, Simon (2000). The Code Book. Anchor. pp. 289-290. ISBN 0-385-49532-3.
  8. ^ Reinke, Edgar C. (December 1962). "Classical Cryptography". The Classical Journal. 58 (3): 114.
  9. ^ Singh, Simon (2000). The Code Book. Anchor. pp. 14–20. ISBN 0-385-49532-3.
  10. ^ Eisenberg, Ronald L. (2004). Jewish Traditions (1st ed.). Philadelphia: Jewish Publication Society. p. 582. ISBN 9780827610392.
  11. ^ Sameth, Mark (2020). The Name : a history of the dual-gendered Hebrew name for God. Eugene, Oregon: Wipf & Stock. pp. 5–6. ISBN 9781532693830.
  12. ^ Kahn, David (1967). The Codebreakers. pp. 775–6. ISBN 978-0-684-83130-5.
  13. ^ Kahn, David (1967). The Codebreakers. pp. 631–2. ISBN 978-0-684-83130-5.
  14. ^ Wobst, Reinhard (2001). Cryptology Unlocked. Wiley. p. 20. ISBN 978-0-470-06064-3.
  15. ^ Kahn, David (1967). The Codebreakers. pp. 148–149. ISBN 978-0-684-83130-5.
  16. ^ Kahn, David (1967). The Codebreakers. pp. 398–400. ISBN 978-0-684-83130-5.
  17. ^ Leyden, John (2025-08-07). "Mafia boss undone by clumsy crypto". The Register. Retrieved 2025-08-07.
  18. ^ "BA jihadist relied on Jesus-era encryption". The Register. 2025-08-07. Retrieved 2025-08-07.
  19. ^ Beutelspacher, Albrecht (1994). Cryptology. Mathematical Association of America. pp. 8–9. ISBN 0-88385-504-6.
  20. ^ Leighton, Albert C. (April 1969). "Secret Communication among the Greeks and Romans". Technology and Culture. 10 (2): 139–154. doi:10.2307/3101474. JSTOR 3101474.
  21. ^ Sinkov, Abraham; Paul L. Irwin (1966). Elementary Cryptanalysis: A Mathematical Approach. Mathematical Association of America. pp. 13–15. ISBN 0-88385-622-0.
  22. ^ Singh, Simon (2000). The Code Book. Anchor. pp. 72–77. ISBN 0-385-49532-3.
  23. ^ Savarese, Chris; Brian Hart (2025-08-07). "The Caesar Cipher". Trinity College. Retrieved 2025-08-07.
  24. ^ Eisele, Robert (2025-08-07). "Caesar Cipher Decryption". Retrieved 2025-08-07.
  25. ^ Lubbe, Jan C. A. (12 March 1998). Basic Methods of Cryptography. Cambridge University Press. pp. 47–8. ISBN 9780521555593.
  26. ^ Pardo, José Luis Gómez (19 December 2012). Introduction to Cryptography with Maple. Springer Berlin Heidelberg. p. 5. ISBN 9783642321665.
  27. ^ Wobst, Reinhard (2001). Cryptology Unlocked. Wiley. p. 31. ISBN 978-0-470-06064-3.

Bibliography

[edit]

Further reading

[edit]
  • Bauer, Friedrich Ludwig (2000). Decrypted Secrets: Methods and Maxims of Cryptology (2nd and extended ed.). Berlin: Springer. ISBN 3-540-66871-3. OCLC 43063275.
[edit]
情缘是什么意思 乳腺囊性增生是什么意思 什么蛋营养价值最高 过敏性鼻炎吃什么药好 点了斑不能吃什么
玫瑰金是什么颜色 氨咖黄敏胶囊是治什么的 五年生存率是什么意思 户主有什么权利 新生儿什么时候上户口
小米叫什么 反酸是什么症状 发泡实验阳性说明什么 睡莲为什么不开花 什么洗衣液是中性的
尿道口流脓什么病 可什么可什么成语 头孢不能和什么食物一起吃 盐的主要成分是什么 面基什么意思
我是什么课文hcv8jop8ns0r.cn 巴适什么意思hcv8jop2ns8r.cn 什么水果不能放冰箱hcv7jop5ns5r.cn 贡菜是什么菜hcv9jop3ns0r.cn 头部检查挂什么科hcv8jop9ns7r.cn
新生儿c反应蛋白高说明什么hcv8jop5ns6r.cn 飞行模式和关机有什么区别hcv9jop1ns3r.cn 刻板印象是什么意思520myf.com 尿液泡沫多是什么原因hcv8jop0ns5r.cn 04属什么生肖hcv9jop1ns8r.cn
马凡氏综合症是什么病hcv8jop6ns9r.cn 属牛男和什么属相最配hcv8jop8ns9r.cn 硌脚是什么意思hcv7jop5ns4r.cn 银花有焰万家春是什么生肖hcv8jop8ns8r.cn 形婚是什么意思啊hcv9jop0ns2r.cn
华侨是什么hcv8jop2ns8r.cn 作梁是什么意思wmyky.com 病人打白蛋白意味着什么hcv7jop9ns6r.cn 眼睛有重影是什么原因hcv7jop9ns0r.cn 鲶鱼吃什么食物hcv8jop9ns7r.cn
百度