March 2003
Intermediate to advanced
912 pages
27h 17m
English
Cryptographic algorithms traditionally substituted characters for one another or transposed characters. Successful algorithms typically did multiple substitutions or transpositions. Computerized algorithms work on bits instead of characters but the algorithms still employ substitution and transposition.
In a simple substitution cipher each character in the plaintext is replaced by another character to form the ciphertext. Decryption is simply the reverse substitution. In the Caesar cipher, each character is replaced by the character three places to its right, mod 26, in the alphabet. In UNIX systems ROT13 replaces each character by that 13 places to the right, mod 26, in the alphabet.
Figure 8.3 shows ...