In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with th...In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with the tradeoff that the encryption key is harder to describe; the key would now be the entire mapping, rather than just the shift amount. Because of the high frequency of the letter S in the encrypted text, it is very likely that the substitution maps E to S.
In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with th...In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with the tradeoff that the encryption key is harder to describe; the key would now be the entire mapping, rather than just the shift amount. Because of the high frequency of the letter S in the encrypted text, it is very likely that the substitution maps E to S.