Question

Consider the message '' WHY DONT YOU'' and the key =KEYWORD. Encrypt this message with the...

Consider the message '' WHY DONT YOU'' and the key =KEYWORD. Encrypt this message with the play fair cipher. The code answer should be " YL EA KT QO KI/J

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Table is:-

K E Y W O

R D A B C

F G H I/J L

M N P Q S

T U V X Z

Encrypting the message:- WH YD ON TY OU

WH is on a rectangle - YI/J

YD is on a rectangle - EA

ON is on a rectangle - ES

TY is on a rectangle - VK

OU is on a rectangle - EZ

Therefore encrypted code is YI/J EA ES VK EZ

Add a comment
Know the answer?
Add Answer to:
Consider the message '' WHY DONT YOU'' and the key =KEYWORD. Encrypt this message with the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The next two problems use a tabular transposition cipher with keyword "VENUS". 23.  Encrypt the message "MATHISSOMUCHFUN"...

    The next two problems use a tabular transposition cipher with keyword "VENUS". 23.  Encrypt the message "MATHISSOMUCHFUN" 24.  Decrypt the code "AOMRVOMEASRKEDEAHGUB".

  • 1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is...

    1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is the resulting ciphertext? (b) What is the decryption function you can use to decipher each ciphertext character? (c) Use your decryption function to decrypt the message to confirm you get the ciphertext back. 2. Use the ADFGX cipher using the grid below and the keyword "place" to encrypt the plaintext "brandenburggate". FREE GX (a) (b) What is the resulting ciphertext? How does the ADFGC...

  • Question 1: Encrypt the message “attackhmsfleet” using Playfair Cipher with key =”security”. Use filler “x” and...

    Question 1: Encrypt the message “attackhmsfleet” using Playfair Cipher with key =”security”. Use filler “x” and use “I” for the pair “I/J” in the table. Question 2: Using Vigenere cipher, encrypt the message “sendmoremoney” using the key “cipher”.

  • Cryptography 4. Consider a transposition cipher that needs to encrypt a message of length 15 using...

    Cryptography 4. Consider a transposition cipher that needs to encrypt a message of length 15 using [3, 1, 4, 5, 2] as the key. a) (5 pts) Show the process of encryption using the matrix representation of the key. You may pick any message of length 15 as your choice. b) (5 pts) Repeat Part (a) for the process of decryption. The output of the decryption should be the original message.

  • Write helpful comments for the following code: use Vigenere cipher tech to encrypt and decrypt message...

    Write helpful comments for the following code: use Vigenere cipher tech to encrypt and decrypt message The code: #include<stdio.h> #include <stdlib.h> char arr[26][26]; char message[22], key[22], emessage[22], retMessage[22]; int findRow(char); int findColumn(char); int findDecRow(char, int); int main() { int i = 0, j, k, r, c; k = 96; for (i = 0; i<26; i++) { k++; for (j = 0; j<26; j++) { arr[i][j] = k++; if (k == 123) k = 97; } } printf("\nEnter message\n"); fgets(message, 22,...

  • Can i get Playfair Cipher for python 3 that encrypts a message and decrypts it, could...

    Can i get Playfair Cipher for python 3 that encrypts a message and decrypts it, could you possibly make it as simple as you can without losing functionality. please include comments, that would help me better understand Example of PlayFair Cipher: https://en.wikipedia.org/wiki/Playfair_cipher The Playfair cipher uses a 5 by 5 table containing a key word or phrase. Memorization of the keyword and 4 simple rules was all that was required to create the 5 by 5 table and use the...

  • Why should you periodically change the key used to encrypt messages? What attack is more likely...

    Why should you periodically change the key used to encrypt messages? What attack is more likely to succeed if a key has been used frequently? How frequently should the key be changed?

  • JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information...

    JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information being exposed, it is becoming more and more important to find ways to protect our sensitive data. In this program we will develop a simple tool that helps users generate strong passwords, encrypt and decrypt data using some cyphering techniques. You will need to create two classes. The first class is your driver for the application and contains the main method. Name this class...

  • 1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do...

    1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do (SYD) are attributes that allow you to do what to a user? ___________ 2. Consider the primitive case of asymmetric encryption; no digital signature and no digital envelope. A person sends a message to a recipient using asymmetric encryption. What is the total number of keys used to send and receive the single message? _________________ 3. If the sender of a message encrypts the...

  • C++ Code

    "For two thousand years, codemakers have fought to preserve secrets while codebreakers have tried their best to reveal them." - taken from Code Book, The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography by Simon Singh.The idea for this machine problem came from this book.You will encrypt and decrypt some messages using a simplified version of a code in the book. The convention in cryptography is to write the plain text in lower case letters and the encrypted text in upper case...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT