June 2020
Intermediate to advanced
382 pages
11h 39m
English
Substitution ciphers have been in use for hundreds of years in various forms. As the name indicates, substitution ciphers are based on a simple concept—substituting characters in plain text with other characters in a predetermined, organized way.
Let's look at the exact steps involved in this:
First, we map each character to a substitute character.
Then, encode and convert the plaintext into cipher text by replacing each character in the plain text with another character in the ciphertext using substitution mapping.
To decode, bring back the plaintext by using substitution mapping.
Let's look at some examples:
Caesar cipher:
In Caesar ciphers, the substitution mapping is created by replacing each character ...