You are on page 1of 3

Practical No.

2A
Aim-Implementation of various substitution stream ciphers. a) Caesar Cipher

Theory:-

Source Code:-

#include<stdio.h>

#include<string.h>

void Encryption(char * Strng);

void Decription(char * Strng);

char EString[40];

void main(void)

char Strng[40];

scanf("%s",&Strng);

printf("\n\nEncrypted String");

Encryption(Strng);

printf("\n\nDecrypted String");

Decription(EString);

void Encryption(char * Strng)

int i,j;

char Cipher[40]="ABCDEFGHIJKLMNOPQRSTUVWXYZABC";

i=0;

while(Strng[i]!='\0')

Source Code Design & Develop By- Mr. Ravi Asati


for(j=0;j<26;j++)

if(Strng[i]!=' ')

if(Strng[i]==Cipher[j])

EString[i]=Cipher[j+3];

printf("%c",Cipher[j+3]);

else

printf(" ");

i++;

void Decription(char * Strng)

int i,j;

char Cipher[40]="ABCDEFGHIJKLMNOPQRSTUVWXYZABC";

i=0;

while(Strng[i]!='\0')

Source Code Design & Develop By- Mr. Ravi Asati


for(j=3;j<29;j++)

if(Strng[i]!=' ')

if(Strng[i]==Cipher[j])

printf("%c",Cipher[j-3]);

else

printf(" ");

i++;

Sample Plain Text:- :- PRIYADARSHINI


Cipher Text-
Conclusion:
The concept of substitution stream ciphers ,Caesar Cipher has been studied
successfully.

Viva Questions:
Q. 1 What is Substitution Cipher?
Q. 2 What is Caesar Cipher?
Q. 3 What is Brute Force Attack?
Q. 4 What is disadvantage of Caesar Cipher ?

Source Code Design & Develop By- Mr. Ravi Asati

You might also like