Data Encryption: How Encryption Works

Data Encryption pervades all aspects of our lives today

Fill this out to continue

About the Whitepaper

Data Encryption: How Encryption Works

The desire to keep and hold secrets is ageless. Cryptography in the form of basic ciphers has existed from the times of the Greek and Roman civilizations. These were rudimentary in nature and mainly designed to obfuscate messages so they didn’t make sense if they fell into the wrong hands. An early example called the Caesar Cipher basically shifted characters by 3 places (e.g. A = D, B = E, C = F, and so on). Such a cipher is called a substitution cipher. A modern example, called ROT13 is a modified version of the Caesar cipher that simply shifts characters by 13 places (instead of 3).

ROT13 is interesting because there are 26 letters in the alphabet – and as a result, it is its own inverse. Basically, the same algorithm (shifting 13 places) can be used for both data encryption and decryption?

Scroll to Top