Understanding ROT 13 Encryption In Network Security

Understanding ROT 13 Encryption In Network Security




In my previous article, I have looked at some of the facts that you need to know about encryption in network security. In this article, I want to look at some of the facts that you need to know about ROT 13 encryption in network security. Follow me as we are going to look at that together in this article.


ROT 13

ROT 13 is another single alphabet substitution cypher. All characters are rotated 13 characters through the alphabet. For example, the phrase “A CAT” will become “N PNG”.

Understanding ROT 13 Encryption In Network Security

Multi-Alphabet Substitution

Eventually, a slight improvement on the Ceasar cypher was developed, called multi-alphabet substitution. It is also called polyalphabetic substitution. In this scheme, you select multiple numbers by which you shift letters. For example, if you select three substitution alphabets (12,22,13), than “A CAT” becomes “C-ADV”.


SEE ALSO  Anyone got a Bitcion Wallet? Introduction on Bitcion Wallet!

Notice that the fourth letter starts with another 12, and you can see that the first A was transformed to C and the second A was transformed to D. This makes deciphering the underlying text more difficult. Although this is harder to decrypt more than Caesar Cypher, it is not overly difficult to decode.


It can be done with a simple pen and paper and a bit of effort. It can be cracked quickly with a computer. In fact, no one would use such a method today to send any secure message. This type of encryption is considered very weak.


SEE ALSO  How To Make Progress In Life | Boost Your Life


Multi-alphabet cypher are more secure than single substitution cyphers. However, they are still not acceptable for modern cryptographic usage. Computer-based cryptanalysts systems can crack historical cryptographic methods easily. The single substitution and multi substitution alphabet ciphers are discussed to show you the history of cryptography and to help you understand how cryptography works. 


Now Tell Us Your Own Side Of This Story.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.

You can also become part of our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.


You can also become part of our WhatsApp Group Here.

Download Our App Here.

Enjoy Latest Music From across the globe. Download TubeNaira.

Share This Post