Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
41 views1 page

Week 2 Discussion

The document discusses the Caesar ROT3 cipher for encrypting and decrypting data to prevent unauthorized access. It provides an example of encrypting the name 'Srinivas' which decrypts to 'My name is Srinivas'. ROT13 is also mentioned as an encryption method used by companies to protect sensitive information.

Uploaded by

Srinivas Aditya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views1 page

Week 2 Discussion

The document discusses the Caesar ROT3 cipher for encrypting and decrypting data to prevent unauthorized access. It provides an example of encrypting the name 'Srinivas' which decrypts to 'My name is Srinivas'. ROT13 is also mentioned as an encryption method used by companies to protect sensitive information.

Uploaded by

Srinivas Aditya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Caesar ROT3 Cipher

When it comes to encrypting and decrypting the data, it is important to ensure the sensitive
data, or the entire data is masked for the user. That way, any unwanted access for any
unauthorized users can be prevented. Ciphers are basically referred to as substitutions for the
words (Goodwin, S. 2003). These are initially used by Julius Cipher and later on, substitutions
for all the words have been found.

An example of encryption can be seen below after encrypting my name. Caesar Cipher works as
the plain text is shifted to a certain number of places in the word. So that, it cannot be easily
tracked or found by the people who try to read the text.

After Decryption of “My name is Srinivas”, the decrypted cipher text result is rd sfrj nx xwnsnafx

The same method can also be followed if the user wants to view the encrypted data by
decrypting it. This operation can only be done if the user has enough access to that particular
data as only selected users can perform this operation. Likewise, ROT13 is used for serious
encryption procedures of data where most companies use this methodology to protect their
sensitive information such as PHI and PII.

Reference

Goodwin, S. (2003). CODES AND CIPHERS: Julius Caesar, the Enigma, and the Internet (Book).
Computing & Control Engineering, 14(3), 46.

You might also like