harith food blog

this is for the brazilian fish stew

this link is for the world best Lasagana

this link is for the simple chili recipe

Algorithm of Reverse Cipher

The algorithm of reverse cipher holds the following features −

  • Reverse Cipher uses a pattern of reversing the string of plain text to convert as cipher text.
  • The process of encryption and decryption is same.
  • To decrypt cipher text, the user simply needs to reverse the cipher text to get the plain text.

.daed era meht fo owt fi ,terces a peek nac eerhT =example

three can keep a secret,if two of them are dead

CAESAR CIPHER

Caesar cipher, also known as Caesar’s cipher, the shift cipherCaesar’s code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.[1]

EXAMPLE

Plain:    ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher:   XYZABCDEFGHIJKLMNOPQRSTUVW

PIGPEN CIPHER

The pigpen cipher (alternately referred to as the masonic cipherFreemason’s cipherNapoleon cipher, and tic-tac-toe cipher)[2][3] is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.

EXAMPLE

Create your website at WordPress.com
Get started