Section 7.1 Private Key Cryptography
In single or private key cryptosystems the same key is used for both encrypting and decrypting messages. To encrypt a plaintext message, we apply to the message some function which is kept secret, sayExample 7.1.
One of the first and most famous private key cryptosystems was the shift code used by Julius Caesar. We first digitize the alphabet by letting
that is,
Suppose we receive the encoded message DOJHEUD. To decode this message, we first digitize it:
Next we apply the inverse transformation to get
or ALGEBRA. Notice here that there is nothing special about either of the numbers
Example 7.2.
Suppose we receive a message that we know was encrypted by using a shift transformation on single letters of the
The corresponding decrypting function is
It is now easy to determine whether or not our guess is correct.
Example 7.3.
Let us consider the affine cryptosystem
Example 7.4.
Suppose that we wish to encode the word HELP. The corresponding digit string is
then
If