Caesar cipher

Caesar cipher
The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is with a shift of three, so that a B in the plaintext becomes E in the ciphertext.Detail Structure substitution cipher Best public cryptanalysis Susceptible to frequency analysis and brute force attacks. In cryptography, a Caesar cipher, also known as a Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals.
The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenère cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in modern practice offers essentially no communication security.
Contents
Example
The transformation can be represented by aligning two alphabets; the cipher alphabet is the plain alphabet rotated left or right by some number of positions. For instance, here is a Caesar cipher using a left rotation of three places (the shift parameter, here 3, is used as the key):
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
When encrypting, a person looks up each letter of the message in the "plain" line and writes down the corresponding letter in the "cipher" line. Deciphering is done in reverse.
Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ Plaintext: the quick brown fox jumps over the lazy dog
The encryption can also be represented using modular arithmetic by first transforming the letters into numbers, according to the scheme, A = 0, B = 1,..., Z = 25.^{[1]} Encryption of a letter x by a shift n can be described mathematically as,^{[2]}
Decryption is performed similarly,
(There are different definitions for the modulo operation. In the above, the result is in the range 0...25. I.e., if x+n or xn are not in the range 0...25, we have to subtract or add 26.)
The replacement remains the same throughout the message, so the cipher is classed as a type of monoalphabetic substitution, as opposed to polyalphabetic substitution.
History and usage
The Caesar cipher is named after Julius Caesar, who, according to Suetonius, used it with a shift of three to protect messages of military significance. While Caesar's was the first recorded use of this scheme, other substitution ciphers are known to have been used earlier.
If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.—Suetonius, Life of Julius Caesar 56His nephew, Augustus, also used the cipher, but with a right shift of one, and it did not wrap around to the beginning of the alphabet:
Whenever he wrote in cipher, he wrote B for A, C for B, and the rest of the letters on the same principle, using AA for X.—Suetonius, Life of Augustus 88There is evidence that Julius Caesar used more complicated systems as well,^{[3]} and one writer, Aulus Gellius, refers to a (now lost) treatise on his ciphers:
There is even a rather ingeniously written treatise by the grammarian Probus concerning the secret meaning of letters in the composition of Caesar's epistles.—Aulus Gellius, Attic Nights 17.9.1–5It is unknown how effective the Caesar cipher was at the time, but it is likely to have been reasonably secure, not least because most of Caesar's enemies would have been illiterate and others would have assumed that the messages were written in an unknown foreign language.^{[4]} There is no record at that time of any techniques for the solution of simple substitution ciphers. The earliest surviving records date to the 9th century works of AlKindi in the Arab world with the discovery of frequency analysis.^{[5]}
A Caesar cipher with a shift of one is used on the back of the Mezuzah to encrypt the names of God. This may be a holdover from an earlier time when Jewish people were not allowed to have Mezuzahs. The letters of the cryptogram themselves comprise a religiously significant "divine name" which Orthodox belief holds keeps the forces of evil in check.^{[6]}
In the 19th century, the personal advertisements section in newspapers would sometimes be used to exchange messages encrypted using simple cipher schemes. Kahn (1967) describes instances of lovers engaging in secret communications enciphered using the Caesar cipher in The Times.^{[7]} Even as late as 1915, the Caesar cipher was in use: the Russian army employed it as a replacement for more complicated ciphers which had proved to be too difficult for their troops to master; German and Austrian cryptanalysts had little difficulty in decrypting their messages.^{[8]}
Caesar ciphers can be found today in children's toys such as secret decoder rings. A Caesar shift of thirteen is also performed in the ROT13 algorithm, a simple method of obfuscating text widely found on Usenet and used to obscure text (such as joke punchlines and story spoilers), but not seriously used as a method of encryption.^{[9]}
The Vigenère cipher uses a Caesar cipher with a different shift at each position in the text; the value of the shift is defined using a repeating keyword. If the keyword is as long as the message, chosen random, never becomes known to anyone else, and is never reused, this is the onetime pad cipher, proven unbreakable. The conditions are so difficult they are, in practical effect, never achieved. Keywords shorter than the message (e.g., "Complete Victory" used by the Confederacy during the American Civil War), introduce a cyclic pattern that might be detected with a statistically advanced version of frequency analysis.^{[10]}
In April 2006, fugitive Mafia boss Bernardo Provenzano was captured in Sicily partly because some of his messages, written in a variation of the Caesar cipher, were broken. Provenzano's cipher used numbers, so that "A" would be written as "4", "B" as "5", and so on.^{[11]}
In 2011, Rajib Karim was convicted in the United Kingdom of "terrorism offences" after using the Caesar cipher to communicate with Bangladeshi Islamic activists discussing plots to blow up British Airways planes or disrupt their IT networks. Although the parties had access to far better encryption techniques (Karim himself used PGP for data storage on computer disks), they chose to use their own scheme instead (implemented in Microsoft Excel) "because 'kaffirs', or nonbelievers, know about it [ie, PGP] so it must be less secure". ^{[12]}
Breaking the cipher
Decryption
shiftCandidate plaintext 0 exxegoexsrgi 1 dwwdfndwrqfh 2 cvvcemcvqpeg 3 buubdlbupodf 4 attackatonce 5 zsszbjzsnmbd 6 yrryaiyrmlac ... 23 haahjrhavujl 24 gzzgiqgzutik 25 fyyfhpfytshj The Caesar cipher can be easily broken even in a ciphertextonly scenario. Two situations can be considered:
 an attacker knows (or guesses) that some sort of simple substitution cipher has been used, but not specifically that it is a Caesar scheme;
 an attacker knows that a Caesar cipher is in use, but does not know the shift value.
In the first case, the cipher can be broken using the same techniques as for a general simple substitution cipher, such as frequency analysis or pattern words.^{[13]} While solving, it is likely that an attacker will quickly notice the regularity in the solution and deduce that a Caesar cipher is the specific algorithm employed.
In the second instance, breaking the scheme is even more straightforward. Since there are only a limited number of possible shifts (26 in English), they can each be tested in turn in a brute force attack.^{[14]} One way to do this is to write out a snippet of the ciphertext in a table of all possible shifts^{[15]} — a technique sometimes known as "completing the plain component".^{[16]} The example given is for the ciphertext "EXXEGOEXSRGI"; the plaintext is instantly recognisable by eye at a shift of four. Another way of viewing this method is that, under each letter of the ciphertext, the entire alphabet is written out in reverse starting at that letter. This attack can be accelerated using a set of strips prepared with the alphabet written down them in reverse order. The strips are then aligned to form the ciphertext along one row, and the plaintext should appear in one of the other rows.
Another brute force approach is to match up the frequency distribution of the letters. By graphing the frequencies of letters in the ciphertext, and by knowing the expected distribution of those letters in the original language of the plaintext, a human can easily spot the value of the shift by looking at the displacement of particular features of the graph. This is known as frequency analysis. For example in the English language the plaintext frequencies of the letters E, T, (usually most frequent), and Q, Z (typically least frequent) are particularly distinctive.^{[17]} Computers can also do this by measuring how well the actual frequency distribution matches up with the expected distribution; for example, the chisquared statistic can be used.^{[18]}
For natural language plaintext, there will, in all likelihood, be only one plausible decryption, although for extremely short plaintexts, multiple candidates are possible. For example, the ciphertext MPQY could, plausibly, decrypt to either "aden" or "know" (assuming the plaintext is in English); similarly, "ALIIP" to "dolls" or "wheel"; and "AFCCP" to "jolly" or "cheer" (see also unicity distance).
Multiple encryptions and decryptions provide no additional security. This is because two encryptions of, say, shift A and shift B, will be equivalent to an encryption with shift A + B. In mathematical terms, the encryption under various keys forms a group.^{[19]}
Notes
 ^ Luciano, Dennis; Gordon Prichett (January 1987). "Cryptology: From Caesar Ciphers to PublicKey Cryptosystems". The College Mathematics Journal 18 (1): 2–17. doi:10.2307/2686311. JSTOR 2686311.
 ^ Wobst, Reinhard (2001). Cryptology Unlocked. Wiley. pp. 19. ISBN 9780470060643.
 ^ Reinke, Edgar C. (December 1992). "Classical Cryptography". The Classical Journal 58 (3): 114.
 ^ Pieprzyk, Josef; Thomas Hardjono, Jennifer Seberry (2003). Fundamentals of Computer Security. Springer. pp. 6. ISBN 3540431012.
 ^ Singh, Simon (2000). The Code Book. Anchor. pp. 14–20. ISBN 0385495323.
 ^ Alexander Poltorak. "Mezuzah and Astrology". chabad.org. http://www.chabad.org/library/article_cdo/aid/312102/jewish/MezuzahandAstrology.htm. Retrieved 20080613.
 ^ Kahn, David (1967). The Codebreakers. pp. 775–6. ISBN 9780684831305).
 ^ Kahn, David (1967). The Codebreakers. pp. 631–2. ISBN 9780684831305).
 ^ Wobst, Reinhard (2001). Cryptology Unlocked. Wiley. pp. 20. ISBN 9780470060643.
 ^ Kahn, David (1967). The Codebreakers. ISBN 9780684831305).
 ^ Leyden, John (20060419). "Mafia boss undone by clumsy crypto". The Register. http://www.theregister.co.uk/2006/04/19/mafia_don_clueless_crypto/. Retrieved 20080613.
 ^ "BA jihadist relied on Jesusera encryption". The Register. 20110322. http://www.theregister.co.uk/2011/03/22/ba_jihadist_trial_sentencing/. Retrieved 20110401.
 ^ Beutelspacher, Albrecht (1994). Cryptology. Mathematical Association of America. pp. 9–11. ISBN 0883855046.
 ^ Beutelspacher, Albrecht (1994). Cryptology. Mathematical Association of America. pp. 8–9. ISBN 0883855046.
 ^ Leighton, Albert C. (April 1969). "Secret Communication among the Greeks and Romans". Technology and Culture 10 (2): 139–154. doi:10.2307/3101474. JSTOR 3101474.
 ^ Sinkov, Abraham; Paul L. Irwin (1966). Elementary Cryptanalysis: A Mathematical Approach. Mathematical Association of America. pp. 13–15. ISBN 0883856220.
 ^ Singh, Simon (2000). The Code Book. Anchor. pp. 72–77. ISBN 0385495323.
 ^ Savarese, Chris; Brian Hart (20020715). "The Caesar Cipher". http://starbase.trincoll.edu/~crypto/historical/caesar.html. Retrieved 20080716.
 ^ Wobst, Reinhard (2001). Cryptology Unlocked. Wiley. pp. 31. ISBN 9780470060643.
Bibliography
 David Kahn, The Codebreakers — The Story of Secret Writing, 1967. ISBN 0684831309.
 F.L. Bauer, Decrypted Secrets, 2nd edition, 2000, Springer. ISBN 3540668713.
 Chris Savarese and Brian Hart, The Caesar Cipher, 1999
External links
Listen to this article (info/dl)
This audio file was created from a revision of Caesar cipher dated 20050414, and does not reflect subsequent edits to the article. (Audio help)More spoken articles Weisstein, Eric W., "Caesar's Method" from MathWorld.
 The Caesar Shift discussed on The Beginner's Guide to Cryptography
 A simple approach to crack a Caesar cipher
Classical cryptography Ciphers: ADFGVX · Affine · Alberti · Atbash · Autokey · Bifid · Book · Caesar · Dvorak · Foursquare · Great · Hill · Keyword · Nihilist · Onetime pad · Permutation · Pigpen · Playfair · Polyalphabetic · Polybius · Rail Fence · Reihenschieber · Reservehandverfahren · ROT13 · Running key · Scytale · Smithy code · Solitaire · Straddling checkerboard · Substitution · Tap code · Transposition · Trifid · Twosquare · VIC cipher · Vigenère
Cryptanalysis: Frequency analysis · Index of coincidence · Kasiski examination
Misc: Cryptogram · Bacon · Scytale · Straddling checkerboard · Tabula recta
Cryptography Categories: Julius Caesar
 Classical ciphers
 Group theory
Wikimedia Foundation. 2010.
Look at other dictionaries:
Caesar cipher — noun A simple form of encryption in which each letter in the plaintext is shifted through the alphabet a number of positions (for example A rarr;D, B rarr;E, C rarr;F, etc.) … Wiktionary
julius caesar cipher — jülyə(s)sēzə(r) noun Usage: usually capitalized J & 1st C Etymology: after Gaius Julius Caesar died 44 B.C. Roman general and statesman : a substitution cipher replacing each plaintext letter by one that stands later in the alphabet … Useful english dictionary
Caesar — or Cæsar may refer to: Contents 1 People 1.1 Given name 1.2 Surname … Wikipedia
caesar substitution — noun also caesar shift Usage: usually capitalized C cryptography : the replacement of each letter in a text by the one at a certain constant distance in the alphabet, especially a normal alphabet compare julius caesar cipher … Useful english dictionary
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEngˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia
Classical cipher — A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical cipher is a type of cipher that was used… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
National Cipher Challenge — The National Cipher Challenge is an annual cryptographic competition organised by the University of Southampton School of Mathematics. Competitors attempt to break cryptograms published on the competition website. In the 2007/08 challenge, 1301… … Wikipedia
Alberti cipher disk — The Alberti cipher disk, also called formula, is a cipher disc which was described by Leon Battista Alberti in his treatise De Cifris of 1467. The device embodies the first example of polyalphabetic substitution with mixed alphabets and variable… … Wikipedia
Hill cipher — Hill s cipher machine, from figure 4 of the patent In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which it was… … Wikipedia