Published Jun 9, 2021
2 mins read
431 words
This blog has been marked as read.
Read more
Communication
Knowledge Sharing

Cipher Languages

Published Jun 9, 2021
2 mins read
431 words

There are many languages spoken all over the world. There are some encrypted ,code languages used especially when a secret is to be communicated. Such language is called as cipher language. People who developed a cipher language know how difficult it is to do so. One way is to attach a certain syllable after the vowels used in a word. For examples “sche” after “a” ; “blo” after “e” ; "ning" after “u” and so on. Apple pie then becomes as “Ascheppleblo pieblo". The substitution can be of any random code for any of the letter. It varies with the users and purpose of being used.

If we don't know to decipher or decode the text ,then it is almost impossible to understand what is written. At the same time both the sending and receiving ends must be aware of the text/message .

The first known cipher use was with “scytale”, this has been employed by the ancient Greeks for secret communications.

In 1941, the Japanese secret service cracked the code used by Americans , and Japan attacked USA. The Navajo-Indians in the Us offered to develop a new radio code from their language ,which was understood by the Navajo at that time. The interesting fact is that no one was able to crack or decode the code till the end of the war.

Julius Ceaser, a famous roman general also used this cipher language to send secret messages to his armies. He used “3 Decipher ”, where each letter of the plain text is shifted by an amount specified by the key. The key can be of any value.

With development in science and technology ,this cipher language was used with improved and highly efficient coding. It become difficult to decode it . In this case Vernam Cipher was a algorithm used in 1917 to encrypt telecommunication .This combines plaintext with some random series of alphabetic characters to form a secret text using a XOR function.

Even existing social media apps ensure this secret communication like transmitting our messages in encrypted form , so that no third party can easily access our message . The sent message is received in original text, only during the transmission process it takes form of this cipher text.

The basic elements of this cipher texting is 

    1)A basic algorithm for creating the secret code or message .

    2)A algorithm for decoding the received message.

Also for a good and efficient communication with cipher we should make sure that the coded message is not so long than the original text.

Thanks for reading ! Try Ciphering with your friends and family !

#communication
#code
#secretcode
#messages
13
3
sumitsing 6/9/21, 4:15 AM
1
Very nice blog 👏well written 👏👏 I Am A " LEVEL 1, SEEKER" .
1
raswin007 6/9/21, 4:55 AM
2
Nice... plz do rd and lik my blgs to...
2
tkratika 6/10/21, 10:49 AM
1
Informative 👍
1

Candlemonk | Earn By Blogging | The Bloggers Social Network | Gamified Blogging Platform

Candlemonk is a reward-driven, gamified writing and blogging platform. Blog your ideas, thoughts, knowledge and stories. Candlemonk takes your words to a bigger audience around the globe, builds a follower base for you and aids in getting the recognition and appreciation you deserve. Monetize your words and earn from your passion to write.