Encryption Simulator
Visualise how Plaintext is transformed into Ciphertext using a Caesar Cipher shift key.
+3
The key determines the 'offset' of the alphabet shift
J277 Exam Context:
Even if a wireless transmission is intercepted, the data remains secure because the hacker only sees the Ciphertext. Without the Key, the data is unreadable and meaningless.