Sender (Alice)
Generate and share a secret key, then encrypt a message for Bob.
Shared Key
Plaintext for Bob
Cyphertext for Bob
Frequency Analysis
Compare how often each symbol appears in the plaintext and in the ciphertext.
Recipient (Bob)
Receive the shared key and decrypt Alice's ciphertext back to plaintext.
Shared Key
Cyphertext from Alice
Plaintext from Alice
Eavesdropper (Eve)
Eve can steal the key or intercept the ciphertext to try to read the message.