Question

Using a ROT5 cipher encrypt the following plaintext. Prove your answer by showing the steps for...

  1. Using a ROT5 cipher encrypt the following plaintext. Prove your answer by showing the steps for both the encryption and decryption. (20 points)

Meet at the baseball field at three oclock

2.

Using a ROT3 cipher decrypt the following ciphertext.

      WKHF RUYH WWHL VUHG

0 0
Add a comment Improve this question Transcribed image text
Answer #1

we have plain text
Meet at the baseball field at three oclock

After ROT5

Cipher text:

Rjjy fy ymj gfxjgfqq knjqi fy ymwjj thqthp

as adding 5 on M gives R similarly we can do it for all the letters

2)
Decrypting is also easy using ROT3, by reducing the letter by 3 places
so for example we have R as encrypted letter, then plain text is M

so to decrypt
WKHF RUYH WWHL VUHG

we have plain text is:
THEC ORVE TTEI SRED

as when reduced 3 letters from w we get t, similary we can decrypt other letters as well.

if you like the answer please provide a thumbs up

Add a comment
Know the answer?
Add Answer to:
Using a ROT5 cipher encrypt the following plaintext. Prove your answer by showing the steps for...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is...

    1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is the resulting ciphertext? (b) What is the decryption function you can use to decipher each ciphertext character? (c) Use your decryption function to decrypt the message to confirm you get the ciphertext back. 2. Use the ADFGX cipher using the grid below and the keyword "place" to encrypt the plaintext "brandenburggate". FREE GX (a) (b) What is the resulting ciphertext? How does the ADFGC...

  • The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”....

    The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”. Write Java code to implement Shift cipher (Encryption and Decryption) and test your code on given plaintext. Your code must meet following conditions. 1. User must enter the value of key from command prompt and print it at command prompt. 2. Print the cipher text and the plaintext at the command prompt after encryption and decryption. 3. Test your algorithm for 5 different key...

  • Computer science encryption please refer to the chart to help For the remaining questions, consider a...

    Computer science encryption please refer to the chart to help For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 4 You can think of this as a simple substitution cipher for hexadecimal digits. The table itself serves as the "key" s (6 pts) For this question, you will perform encryption and 5. decryption using the same cipher described above, but in CBC mode. Recall that you can convert hexadecimal...

  • Substitution Cipher Ke 1. Decipher the following ciphertext using the substitution cipher key shown above: (4 points) Ciphertext: DOVMYWOJAYJMYWZBAOXOADY!U I Plaintext: The following information was...

    Substitution Cipher Ke 1. Decipher the following ciphertext using the substitution cipher key shown above: (4 points) Ciphertext: DOVMYWOJAYJMYWZBAOXOADY!U I Plaintext: The following information was extracted from The BLACK Chamber's Pigpen Cipher page. The content is available at https:/simonsingh net The_Black Chamber'pigpen html. "The Pigpen Cipher was used by Freemasons in the l8th Century to keep their records private. The cipher does not substitute one letter for another; rather it substitutes each letter for a symbol The aiphabet is written...

  • Write a javascript program which implements the following two classical cryptosystem which we covered in class:...

    Write a javascript program which implements the following two classical cryptosystem which we covered in class: Affine Cipher Vigenere Cipher Your program should consist of at least five functions: Two functions named encrypt, one for each of the two algorithms which accepts a lowercase alphabetical plaintext string and key as input and outputs a corresponding cipher text string. Two functions named decrypt, one for each of the two algorithms which accepts a lowercase alphabetical ciphertext string and a key as...

  • Change the following Shift Cipher program so that it uses OOP(constructor, ect.) import java.util...

    Change the following Shift Cipher program so that it uses OOP(constructor, ect.) import java.util.*; import java.lang.*; /** * * @author STEP */ public class ShiftCipher { /** * @param args the command line arguments */ public static void main(String[] args) { // TODO code application logic here Scanner input = new Scanner(System.in); String plainText; System.out.print("Please enter your string: "); // get message plainText = input.nextLine(); System.out.print("Please enter your shift cipher key: "); // get s int s = input.nextInt(); int...

  • Write a Python program which implements the following two classical cryptosystem which we covered n class:...

    Write a Python program which implements the following two classical cryptosystem which we covered n class: a) Affine Cipher b) Vigenere Cipher Your program should consist of at least five functions: a) Two functions named encrypt, one for each of the two algorithms which accepts a lowercase alphabetical plaintext string and key as input and outputs a corresponding cipher text string. b) Two functions named decrypt, one for each of the two algorithms which accepts a lowercase alphabetical ciphertext string...

  • Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustra...

    Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using the prim es p 13 and q 17 and secret decryption key d 103 to (i) decrypt the ciphertext z2; (ii) compute the public encryption key e corresponding to d (ii) encrypt the plaintext m-. (c) Discuss the security of the RSA public-key cryptosystem Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using...

  • Cryptography 4. Consider a transposition cipher that needs to encrypt a message of length 15 using...

    Cryptography 4. Consider a transposition cipher that needs to encrypt a message of length 15 using [3, 1, 4, 5, 2] as the key. a) (5 pts) Show the process of encryption using the matrix representation of the key. You may pick any message of length 15 as your choice. b) (5 pts) Repeat Part (a) for the process of decryption. The output of the decryption should be the original message.

  • Decrypt the following ciphertext using the double transposition cipher using a matrix of 9 rows and...

    Decrypt the following ciphertext using the double transposition cipher using a matrix of 9 rows and 8 columns. TAWETNSHENGAMINEQTNSUIOEFHYTUENLIUVOFHAYETCNSENEETSFRHIOOVOAUEGHENHUFDTO Hint: The first two words in the plaintext are “IF” and “YOU”.

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT