Hacking kiy hai

  Hacking 

πŸ’šencryption kiya hai.πŸ’˜

this is where encryption comes in. the message sent by communicator is the called plaintext or clear text.

the process of encoding the content of the plaintext in such a  way that its content cannot be ciphered or read by outsiders is called encryption.

encryption means 

the encrypted message is called ciphertext.

check out the following visuals.πŸ˜ŠπŸ‘πŸ‘πŸ‘πŸ‘✌

πŸ‘‰Decrytion kiya hai .

Before we process any further, we need to be familiar with another very important terms,- DECRYPTION. This means exactly the opposite of ENCRYPTION.

the sender encoded the plain text into a ciphertext with the aid of encryption and sends it to the receiver. the receiver, in turn needs to convert the ciphertext back to the plaintext to understand the meaning ot the message. the process of retrieving the plaintext from the ciphertext is called DECRYPTION.

thus, we can say that encryption and decryption work hand in hand. they make use of a key and the coding method is such that decryption can be performed only by knowing the proper key. this is discussed further in the next chapter.


↗public key↗ πŸ”‘πŸ”‘ private key

π‘‚½→πŸ”‘⬜◻◻◻⇨(insecure channel)⬜◻◻πŸ”‘

 ⭐Encryption Algorithms and Decryption algorithms:-

  Caesar (RoT 13);-

The caesar encryption algorithms is one of the simplest algorithms which can be used to encrypt a plain text composed of alphabetical characters only. The caesar encryption algorithms is also popularly known as Rot 13 . 

The reason will be very evident as you go into the details of the algorithms. The algorithms is not very popular because it is very simple to encode and decoded the plain text and cipher text, respectively. So it can used for dealing with not-so -sensitive or secret issues. For example, you can encrypt the contents of a large personal document so that another user, at the first sight, will not be able to make head or tail of that documents and will also not have the patience to decrypt the cipher text manually. But, fortunately or unfortunately, tools are readily available which can enable us to encrypt and decrypt the plain text and cipher text, respectively. Overall, the caesar encryption algorithms is a very weak algorithms. These tools will be discussed in the next chapter.

⏺  All these 26 letters are numbered serially from 1 to 26, i.e.,  

A B C D E F G H I J K L M

1  2  3 4  5  6  7  8  9 10 11 12 13

N O P Q R S T U V W X             Y               Z 

14 15 16 17 18 19 20 21 22 23 24 25             26  

⏺  The following is the most important step, i.e., the step encryption. Consider that the plain text is "My book is titled encryption". ROT stands for rotation, and 13 is the count about which you will rotate each of these alphabets.

Now, M is the first letter to be encrypted. The letter "M" corresponds to number 13. You need to count 13 letters from the letter "M" and the last letter will be the required result. Here, "Z"

corresponds to the 13th letter.

in case you reach the 26th letter "Z" before reaching the 13th letter, you must again begin from the first letter. This statement will becomes clearer when you encrypt the letter "y". In this case, on moving just one position, you will reach the 26th letter "Z", so you must begin with the first letter "A" again and thus the 13th letter in this case will be "L".

As 13 is exactly the half of 26, it does note matter whether you count forward or backward. To encode words or whole sentences just approach them letter by letter.

Thus, the cipher text, on applying the Caesar algorithm on the plaintext is: 

Zlobbxvfgvgyrqrapelcgvba. 

The step of encryption is also the same as that of encryption. since 13 is exactly the half of 26, it doesn't matter whether you count forward or backward. Thus, to decode words or whole sentences, just approach them letter by letter.

This is all about the Caesar encryption algorithm, which is the simplest encryption algorithm to implement..........





Comments