 Tech Note #35: How Encryption and Digital Signatures Work
19 May 1999
http://www.tatanka.com
Page
2 of 10

If the key is 1, then chose the next letter: A becomes B, B becomes C, C becomes D, and so
on.

If the key is 2, then chose the letter two letters later: A becomes C, B becomes D, C
becomes E, and so on.

For other keys, use the key to skip the specified number of letters.
If the original message is
CATS HAVE FUR
then the encrypted version depends on the key as follows:
(key = 1) DBUT IBWF GVS
(key = 2) ECVU JCXG HWT
(key = 3) FDWV KDYH IXU
...and so forth
To decrypt the message, the recipient uses the key to shift the letters of the alphabet backwards
by the correct number.
This example is contrived and (obviously) too simple to use in real life. The key would be easy
to find, just by trying 25 possible numbers. However, it illustrates two points:

the total number of keys possible is 25; this is known as the size of the key space

the same key is used to encrypt the message, as is used to decrypt the message; such a
scheme is called a symmetric cryptosystem
In real life, the scrambling mechanisms are much more complex, and the key spaces are much
larger:

banks communicate with ATMs using a key space of 2
56