Data Transmission · 4 question types
Past paper frequency (2018 to 2024)
This topic accounts for approximately 4% of your exam marks.
Symmetric vs asymmetric encryption questions are growing as cybersecurity becomes more prominent.
The Caesar cipher is one of the oldest encryption methods, named after Julius Caesar who reportedly used it for military messages. It is far too weak to use today, but the syllabus uses it as a teaching example of how a symmetric cipher works.
Each letter in the plaintext is replaced by the letter N positions further along the alphabet, where N is the agreed shift (the key). When the shift goes past Z, it wraps around back to A.
The shift N is the key. Both sender and receiver must agree on it before any messages are sent. Because the same key is used to encrypt and decrypt, the Caesar cipher is a symmetric cipher.
Example — Encrypt the plaintext PASS using a Caesar cipher with a shift of +3.
Walking through each letter:
Ciphertext: SDVV.
Example — Encrypt the plaintext EXAM using a Caesar cipher with a shift of +5.
Ciphertext: JCFR.
The wrap-around step is where most slips happen. A useful trick: write out the alphabet as a strip of paper that loops at the ends, so Z is followed by A again.
To decrypt a Caesar cipher with shift +N, shift each letter backwards by N positions, wrapping from A back to Z when needed.
Example — Decrypt the ciphertext SDVV with the agreed shift of +3.
Plaintext: PASS. ✓
A handy equivalent: shifting backwards by N is the same as shifting forwards by (26 − N). So decrypting a +3 cipher is the same as encrypting with +23.
The Caesar cipher is hopelessly insecure by modern standards:
The Caesar cipher is only used as a teaching example, not for real-world security. Modern symmetric ciphers like AES use 128-bit or 256-bit keys, giving roughly 10³⁸ to 10⁷⁷ possible combinations, far beyond what any attacker can search.