Confess to someone you like with Caesar cipher

In cryptography, the Caesar cipher is one of the simplest and most well-known encryption techniques. It is a substitution encryption technique, in which all the letters in the plaintext are shifted backwards (or forwards) by a fixed number in the alphabet and then replaced by the ciphertext.

For example, when the offset is 3, all letters A will be replaced by D, B by E, and so on. This encryption method is named after Caesar, who used this method to communicate with his generals.

The Caesar cipher is often used as a step in other, more complex encryption methods. The Caesar cipher is also used in modern ROT13 systems. But like all encryption techniques that use alphabets to replace, the Caesar cipher is very easy to crack, and it is impossible to guarantee communication security in practical applications. If there is such a command:

RETURN TO ROME

After encrypting with the Caesar cipher, it becomes:

UHWXUA WR URPH

If this instruction is intercepted by the enemy, it will not be leaked, because literally nothing can be seen. This encryption method can also generate new changes according to the different shifts, such as 19 bits from the left of each letter, to generate such a clear and dense comparison table:

明:A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
密:T U V W X Y Z A B C D E F G H I J K L M N O P Q R S

Under this encryption table, the contrast between plaintext and ciphertext becomes:

明文:THE FAULT, DEAR BRUTUS, LIES NOT IN OUR STARS BUT IN OURSELVES.
密文:MAX YTNEM, WXTK UKNMNL, EBXL GHM BG HNK LMTKL UNM BG HNKLXEOXL.

After explaining so much, let's be honest, use Caesar encryption to express to the person you like: 19 digits from the left of each letter

明文:ILOVEU
密文:BEHOXN

dkplus professionally collects and writes practical computer software tutorials, collects various software resources and computer peripherals, independently produces videos, ppt and audio WeChat public account, click to enter  dkplus official blog , WeChat search dkplus follow the public account to obtain massive computer peripheral resources.


 

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=326871337&siteId=291194637