![]() While it’s a clever technique for exchanging secret messages, there is still a possibility that someone could figure out the “secret rule”(in this case, shift by 3 rule) of unscrambling and obtain the original message.īut, if we hide the encrypted data itself, other people might never notice that there had been an exchange of secrets between two parties. ![]() And, the converted “secret data” itself is known as encrypted data. This method of converting original data to “secret” data is known as encryption. Only someone who knew the “shift by 3” rule could understand his messages. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. When Julius Caesar sent messages to his generals, he didn’t trust his messengers. ![]() Ever tried to speak to your friend in a secret code? We all have tried, right?Īnd it’s not only us.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |