Question

Q1: Given a message “explanations” a) Define a key, which is a combination of last names...

Q1: Given a message “explanations”

a) Define a key, which is a combination of last names of all team members. For example, for a team of two persons ‘John Smith’ and ‘John Li’ the key will be ‘SmithLi’. You will use this key for encryption and decryption below

b) First encrypt the message using Vigenère cipher. Encrypt the resulting cipher-text using Playfair cipher.

c)Decrypt the ciphertext from part b above. Hint: First decrypt using Playfair cipher and then decrypt it again using Vigenère cipher

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) The random string of bits created to encrypt and decrypt the data or a message is the Key , In the given example the key is combination of last names Smith and Li that is SmithLi .

b) To encrypt the message "explanations" using key "SmithLi" by Vigenere cipher follow the steps:

Message : explanations

Key : SmithLi

Use the table given above , pair the first letter of message "e" with first letter of key "s" we get "w" as encryted letter , follow the same for second letter "x" pair with second letter of key "m" then the excrypted letter is j , by encrypting complete message we get " wjxehyiluwgz " encrypted message.

To further encrypt the message " wjxehyiluwgz" using playfair cipher with key SmithLi ,

The table used is :

S M I/J T H
L A B C D
E F G K N
O P Q R U
V W X Y Z

The message can be written as,

wj xe hy il uw gz

By using the rule of rectangle find the corresponding letters of w and j which form the rectangle in table , they are 'x' for 'w' an 'm' for 'j' , Hence find corresponding letters for all the pairs of message ,

The encrypted message is : xmvgtzsbpznx

c) To decrypt the message , first decrypt the message " xmvgtzsbpznx" using Playfair cipher ,

The table used is :

S M I T H
L A B C D
E F G K N
O P Q R U
V W X Y Z

Pair the letters of message as, xm vg tz sb pz nx

And follow the same process of encryption , the corresponding letters of xm is table are 'wi' like wise decrypt all the pairs to get " wixehyiluwgz " decrypted message .

The message obtained " wixehyiluwgz" from decryption is further decrypted using Vigenere cipher , To decrypt the message use the formula, p = c - k mod 26, where p is the plain text , c is the encoded text and k is the key = smithli,

For example : p = w-s mod 26 = 22- 18 = 4 ->e

By decoding using this formula the decoded message got is "ewplanations"

Add a comment
Know the answer?
Add Answer to:
Q1: Given a message “explanations” a) Define a key, which is a combination of last names...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is...

    1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is the resulting ciphertext? (b) What is the decryption function you can use to decipher each ciphertext character? (c) Use your decryption function to decrypt the message to confirm you get the ciphertext back. 2. Use the ADFGX cipher using the grid below and the keyword "place" to encrypt the plaintext "brandenburggate". FREE GX (a) (b) What is the resulting ciphertext? How does the ADFGC...

  • I need Help to Write a function in C that will Decrypt at least one word with a substitution cipher given cipher text an...

    I need Help to Write a function in C that will Decrypt at least one word with a substitution cipher given cipher text and key My Current Code is: void SubDecrypt(char *message, char *encryptKey) { int iteration; int iteration_Num_Two = 0; int letter; printf("Enter Encryption Key: \n");                                                           //Display the message to enter encryption key scanf("%s", encryptKey);                                                                   //Input the Encryption key for (iteration = 0; message[iteration] != '0'; iteration++)                               //loop will continue till message reaches to end { letter = message[iteration];                                                      ...

  • Write a javascript program which implements the following two classical cryptosystem which we covered in class:...

    Write a javascript program which implements the following two classical cryptosystem which we covered in class: Affine Cipher Vigenere Cipher Your program should consist of at least five functions: Two functions named encrypt, one for each of the two algorithms which accepts a lowercase alphabetical plaintext string and key as input and outputs a corresponding cipher text string. Two functions named decrypt, one for each of the two algorithms which accepts a lowercase alphabetical ciphertext string and a key as...

  • Write a Python program which implements the following two classical cryptosystem which we covered n class:...

    Write a Python program which implements the following two classical cryptosystem which we covered n class: a) Affine Cipher b) Vigenere Cipher Your program should consist of at least five functions: a) Two functions named encrypt, one for each of the two algorithms which accepts a lowercase alphabetical plaintext string and key as input and outputs a corresponding cipher text string. b) Two functions named decrypt, one for each of the two algorithms which accepts a lowercase alphabetical ciphertext string...

  • Caesar Cipher v3 Decription Description A Caesar cipher is one of the first and most simple...

    Caesar Cipher v3 Decription Description A Caesar cipher is one of the first and most simple encryption methods. It works by shifting all letters in the original message (plaintext) by a certain fixed amount (the amounts represents the encryption key). The resulting encoded text is called ciphertext. Example Key (Shift): 3 Plaintext: Abc Ciphertext: Def Task Your goal is to implement a Caesar cipher program that receives the key and an encrypted paragraph (with uppercase and lowercase letters, punctuations, and...

  • Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more...

    Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more difficult process. Indeed, the purpose of encryption is to make it as difficult as possible for anyone who does not know the key to read the plain text. We will be using an unsophisticated password cracking technique called a brute force attack. A brute force attack on the APCO cipher works by trying every possible four digit key (from 0000 to 9999) and keeping...

  • JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information...

    JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information being exposed, it is becoming more and more important to find ways to protect our sensitive data. In this program we will develop a simple tool that helps users generate strong passwords, encrypt and decrypt data using some cyphering techniques. You will need to create two classes. The first class is your driver for the application and contains the main method. Name this class...

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • Need help with number 3 the last one Need help with number 3 I have already...

    Need help with number 3 the last one Need help with number 3 I have already given the whole question MATH 1030 – Application Assignment 3 Cryptography Due: Thursday, June 4, 2020 at 11:59pm Atlantic time (submit through Brightspace) You must show your work for full marks. The goal of this assignment is to use our knowledge of linear algebra to do cryptography. We will encrypt a plaintext using a cipher where the resulting ciphertext should not be legible unless...

  • **DO IT AS PYTHON PLEASE** The Trifid Cipher General Problem Description The Trifid cipher (not to be confused with the...

    **DO IT AS PYTHON PLEASE** The Trifid Cipher General Problem Description The Trifid cipher (not to be confused with the creatures from the classic science-fiction film "The Day of the Triffids") is an algorithm that enciphers a plaintext message by encoding each letter as a three-digit number and then breaking up and rearranging the digits from each letter's encoded form. For this assignment, you will create a set of Python functions that can encode messages using this cipher (these functions...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT