Determine whether there is a key for which the enciphering function for the shift cipher is the same as the deciphering function.

Leslie Ogu CSCI 4531 09/06/2016 Chapter 2: Encryption Symmetric Encryption + The universal technique for providing confidentiality for transmitted or stored data + Also referred to as conventional encryption or singlekey encryption + Two requirements to use: + Need a strong encryption algorithm + Sender and receiver must have obtained copies of the secret key in a secure fashion and and must keep the key secure + Only alternative before publickey encryption in 1970’s + Still most widely used alternative + 5 Ingredients + Plaintext + Encryption algorithm + Secret key + Ciphertext