(Cesarean Cipher: mentioned good ol' julius)
(Added a reference)
Line 4: Line 4:
 
==Simple encryption==
 
==Simple encryption==
 
===Cesarean Cipher===
 
===Cesarean Cipher===
This encryption technique was allegedly used in the times of the Roman emperor Julius Caesar who made carriers of the message swear never to reveal the key.{{citation needed}} A simple encryption program can use the following technique to create a Cesarean Cipher.
+
This encryption technique was allegedly used in the times of the Roman emperor Julius Caesar who made carriers of the message swear never to reveal the key.<ref>http://en.wikipedia.org/wiki/Caesar_cipher</ref> A simple encryption program can use the following technique to create a Cesarean Cipher.
 
*First, convert the string into a [[list]] of letters
 
*First, convert the string into a [[list]] of letters
 
*Then, iterating through each item of the list, use many [[if () (block)|if]] blocks to replace each character with a unique other character
 
*Then, iterating through each item of the list, use many [[if () (block)|if]] blocks to replace each character with a unique other character
Line 20: Line 20:
 
Complex encryption systems generally return a fixed length string, no matter how long the input is. These kinds of encryptions, often called [[wikipedia:Hash function|hashes]], are widely used to securely store passwords in a database.
 
Complex encryption systems generally return a fixed length string, no matter how long the input is. These kinds of encryptions, often called [[wikipedia:Hash function|hashes]], are widely used to securely store passwords in a database.
  
 +
==References==
 +
<references/>
 
[[Category:Other]]
 
[[Category:Other]]

Revision as of 14:24, 12 May 2012

Document stub.png This article is a stub. It may be incomplete, unfinished, or have missing parts/sections. If the article can be expanded, please do so! There may be suggestions on its talk page. (Date?)

Encryption is a technique used to transform a string into another such that the algorithm to reverse the transformation is complex and only decipherable by the original encrypter.

Simple encryption

Cesarean Cipher

This encryption technique was allegedly used in the times of the Roman emperor Julius Caesar who made carriers of the message swear never to reveal the key.[1] A simple encryption program can use the following technique to create a Cesarean Cipher.

  • First, convert the string into a list of letters
  • Then, iterating through each item of the list, use many if blocks to replace each character with a unique other character
  • Finally, join these back into a string and report

To decode, do the same thing, except replace backwards: encrypted values to their keys, rather than keys to values.

This can be used to convert a string like: "Hello world" into "Rqbbwx wmbbf" Note how the lengths of words change. This is because the space was encoded as "X" and "W" was encoded as a space.

Complex encryption

Complex encryption systems generally return a fixed length string, no matter how long the input is. These kinds of encryptions, often called hashes, are widely used to securely store passwords in a database.

References

  1. http://en.wikipedia.org/wiki/Caesar_cipher