• Engineering and Architecture
• Medicine and Allied Sciences
• Law
• Animation and Design
• Media, Mass Communication and Journalism
• Finance & Accounts
• Computer Application and IT
• Pharmacy
• Hospitality and Tourism
• Competition
• School
• Arts, Commerce & Sciences
• Learn
• Online Courses and Certifications

# How Does WhatsApp Code Your Message? This Is Where Encryption Starts

###### Synopsis

Detecting patterns and interpreting them is at the heart of the process of encryption and decryption – a mathematical process of making communication secret and secure. The ability to identify patterns can help understand the principles behind cryptography, solve problems in a range of aptitude tests and even help students locate clues and patterns in exam questions. Here’s how it works.

###### Synopsis

Detecting patterns and interpreting them is at the heart of the process of encryption and decryption – a mathematical process of making communication secret and secure. The ability to identify patterns can help understand the principles behind cryptography, solve problems in a range of aptitude tests and even help students locate clues and patterns in exam questions. Here’s how it works.

We all know the legend of how Sir Isaac Newton discovered the force of gravitation after watching an apple fall from a tree. Were apples not falling to the ground before him? Of course they were! Gravitation had always existed, for anyone to discover it. But it needed a sharp mind who could see the everyday event of a ripe apple falling to the ground in a new light, from a different perspective and wonder about the process behind it.

In fact, most new discoveries and innovations in the world were the result of people viewing ordinary things from a different angle, asking questions and identifying patterns behind them. Patterns and their identification are at the heart of the technique of secure communication called cryptography.

Let us say you, Ramesh, are sitting in your classroom and observe something funny. You want to share it with your best friend, Suresh. But there is a problem. You like to break rules and make noise and to keep you out of trouble, your teacher has made a classmate, Dinesh, sit in between. How can you pass a message to Suresh without Dinesh reading the contents? During a break, you and Suresh devise a plan: you will shift each letter of the word by one letter. To represent the letter “a”, you will write “b”; for “b”, you will write “c” and so on.

After recess, you put your plan in action and code your message – a process called encrypting – and write the following on the chit and ask Dinesh to pass it on to Suresh.

Coding and decoding messages

As Dinesh does not understand it, he passes it to Suresh who decodes it – called decryption –. He translates “u” back to “t”, “f” back to “e” and so on. We would like you to pick up a pen and paper and decode the message.

If you are able to decrypt this, then congratulations, you could have decoded any secret message of Julius Caesar, the great Roman Emperor who ruled around 2000 years ago. Since this technique was used by him, this is called a Caesar Cipher. Using this technique, you can also switch each letter with any number from 1 to 26.

There is a very interesting story about how a way to decode a Caesar Cipher was found that worked almost every-time. 800 years after Caesar, an Arab mathematician noted that when a good number of sentences are written in any language, there is always a letter which is used the maximum number of times. For example, in English, the letter ‘e’ is used the maximum number of times. So, if we take a long enough Caesar Cipher message, and observe that “h” is the most-used letter in it, then it is probable that in this code, the letters are shifted by 3, as “h” is obtained by shifting “e” by 3.

Now let us go back inside our classroom. As the exchange of chits is frequent, Dinesh has started to observe some patterns and one day while in the process of passing the chit, you see Dinesh, too, trying to write something and then smiling. So, now he knows your trick and you need a new one.

Now, you devise another strategy. You pick a number – say, 23 – and decide that for the message the first letter will be shifted by 2 letters, second by 3 letters, then third again by 2 letters, fourth by 3 letters and so on. So, to encode the word ‘Teacher’

T: Shifted by 2 letters becomes V

e: Shifted by 3 letters becomes h

a: Shifted by 2 letters becomes c

c: Shifted by 3 letters becomes f

And so on…

This will be a lot more difficult for Dinesh to decode.

If you have a very large number, say 1793223456, it will become practically impossible to decode the message with pen and paper. We use computers for encrypting and decrypting on a large scale.

A very important application of encryption and decryption lies in sending personal messages and sensitive data over the internet. For example, if you are using internet banking and you send your password to the bank website to login to your bank account, you would not like some hacker to read the message. So, it is encrypted by using different mathematical tools so that it remains safe. All the secret communications between defence forces and intelligence agents utilize some form of encryption.

In your studies too, many times you have to identify patterns and markers in questions that give you a hint about the procedure to be used to solve it. Many students who are able to solve questions in the classroom, struggle during exams. One reason for this is that while studying, they solve questions related to a certain topic, and therefore, know they have to apply the formula or procedure related to that topic.

In an exam setting, where questions are not nested under topics, students struggle if they don’t develop the habit of identifying the markers in the questions themselves. And in the exam, they get many questions that are related to more than one concept. So, build the habit of looking at the questions and detecting traits that can give you a clue about the method to be used. And this habit only comes with a conscious effort and practice.

We leave you with some fun exercises based on the Caesar Cipher. Try to identify the original message in each of these

1. J uijol j bn hfuujoh uijt

2. Vjku ku vqq gcua

3. G fytc jcyplr rm zpcyi Aycqyp'q Ambc

4. Bfquzjmmx

5. Dfhlrnzlth

6. Swpenw

1. I think I am getting this

2. This is too easy

3. I have learnt to break Caesar's Code

4. Certainly

5. Definitely

6. Surely

• Human activities
• Technology
• Applied mathematics
• Communication
• Information Age
• Computer security
• Cyberwarfare
• Secure communication
• Security engineering

## Subscribe to Premium Membership Plan

##### *Unlock all premium content and benefits:
• Career Guidance

Plan ahead with clear directions on courses, careers and best ways to learn

• Fees & Scholarships

• Jobs & Internships

Prepare for employed life with tips on jobs, find paid & unpaid internship listings, summer jobs and career advice.

• Interactive Counselling Webinars

• College Placement Reports

Wondering what comes after college? Read placement reports of top universities, colleges.

• Sports and Extra Curricular Activities

Interested in music? Art? Summer camps? Start exploring here.

• Mental Health & Well Being

To help you deal with stress, face exams, stay focussed, experts share tips here.

• Career Foundation

It's not too early to train for work life. Read about building CVs, cracking job interviews; find paid & unpaid internship listings, summer jobs and career advice.

• Study Help

Understand concepts of Physics, Chemistry Maths and others through fun stories and illustrations

• NCERT, Exemplar, CBSE Previous year Solutions for Maths & Science

- Concept-oriented detailed solutions for NCERT (Class 6 to 12), Exemplar (Class 9 to 12) & CBSE Previous 5 year (Class 10 and 12)

- For Maths and Science

• 15+ B.Tech College Predictors

Analyses your exam performace to predict admission chances based on Domicile, Caste, Gender, etc. and Exam Result.

Get your personalised report with Top Predicted Colleges.

• NCHMJEE Hospitality College Predictor

- Get your NCHM JEE personalised report with Top Predicted IHMs, Government & Private Colleges delivered via email

• NIFT Design College Predictor

- Know your admission chances based on your Home State, Caste, etc. & exam result for NIFT campuses

- Get your NIFT personalised report for B.Des & B.FTech delivered via email

• CLAT, AILET, DUET L.L.B, MHCET Law College Predictors

- Know your admission chances in NLUs, Delhi University’s Faculty of Law for L.L.B (3Yr), National Law University, Delhi’s B.A-L.L.B course & Law colleges accross Maharashtra based on your Seat Type, Caste, etc. & exam results

- Get your personalised report delivered via email

Interactive webinars with experts for different countries will take you through all the basics.

• SOP Guidance

What should go into your statement of purpose (SOP)? Learn how to put together a winning application.

• English Proficiency Test

How can you ace the English proficiency test? Let the experts help you.

• Visa Regulations

• Career Support

Exams and scholarship alerts, test prep reviews, study plans, college selection

• Poor
• Weak
• Good
• Very Good
• Excellent

Students

Colleges

Exams

E-Books