Question

The ciphertext ’GOBBWZP’ was encrypted using the affine function. If the first two alphabets were fr....

The ciphertext ’GOBBWZP’ was encrypted using the affine function. If the first two alphabets were fr. Find the plaintext

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Hey

It is easy to see how each character in the plaintext is replaced with the corresponding letter in the cipher alphabet. Decryption is just as easy, by going from the cipher alphabet back to the plain alphabet.

plain alphabet : abcdefghijklmnopqrstuvwxyz
cipher alphabet: phqgiumeaylnofdxjkrcvstzwb

The Cipher text is FRBBWZP.

The plain text is NSZZYXA.

Thank You

Add a comment
Know the answer?
Add Answer to:
The ciphertext ’GOBBWZP’ was encrypted using the affine function. If the first two alphabets were fr....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is...

    1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is the resulting ciphertext? (b) What is the decryption function you can use to decipher each ciphertext character? (c) Use your decryption function to decrypt the message to confirm you get the ciphertext back. 2. Use the ADFGX cipher using the grid below and the keyword "place" to encrypt the plaintext "brandenburggate". FREE GX (a) (b) What is the resulting ciphertext? How does the ADFGC...

  • Polyalphabetic Ciphers   Suppose the following ciphertext was encrypted using Vignenere cipher with key size equal to...

    Polyalphabetic Ciphers   Suppose the following ciphertext was encrypted using Vignenere cipher with key size equal to 2. Try to find the two letters that were used in the encryption. SVSMHSCXGROFSLSOBDVOICIKZWSMVKBSGWPIKRWMVWCNSBBBSZFOGOBDODWFSNSWCMFKQIV KGYDOFKHOROZOQDWYBCAKMPWVZYTPWMSCWXHRSVSQWCZKHEFOGYAOHSAOGSBDVOSHSMID WFSKBNXERSQSOBMKBNTYFBSQWYBKZKBNZYQKZQCFSBBWSXHDVSGZFYQOGCWCOVGYICSNWXAK BICDVOFZFSJKHOOXRLICWXSCGYFQOXWJODWYBCTBCWQVILGDCFCVIXHKFIOCGYQSODWYBCOXR MCBDYFKHSCXGDVOIXWFSBGKZEGOCPSVSMHSCXGKGKHYCVTYFCSVSMHSBQFODBSCSXHKHSJOGSB WCNSBBBSZFOGOBDODWFSNSWCMFKQSSCWCWXQYBDFKGDKSHRHRSZFKQDWMSSBDVOROAYQB ODWMOBQRSDMZSKBMWOBDODVOBCKRSBSDVOSVSMHSCXGGSBSXCDICSNKOFOQYBCWNSBSNO XCVWQOBQRWMWXGDWDIDWYBKBNAYGDDYZSHSQKZYTPWMSCKOFOTSZVSNICWXUCCBHSHSCX OVGYYXCGBKGKZVCDAOBDPIKRWMVYTPWMSRCVROFCKOFOQRCCSXPIZYH

  • Decrypt the ciphertext 1369 1436 0119 0385 0434 1580 0690 that was encrypted by the RSA...

    Decrypt the ciphertext 1369 1436 0119 0385 0434 1580 0690 that was encrypted by the RSA algorithm using with key (n, e) = (2419, 211). (Hint: The decoding exponent is d = 11. Note that it may be necessary to fill out a plaintext block by adding zeros on the left).

  • Substitution Cipher Ke 1. Decipher the following ciphertext using the substitution cipher key shown above: (4 points) Ciphertext: DOVMYWOJAYJMYWZBAOXOADY!U I Plaintext: The following information was...

    Substitution Cipher Ke 1. Decipher the following ciphertext using the substitution cipher key shown above: (4 points) Ciphertext: DOVMYWOJAYJMYWZBAOXOADY!U I Plaintext: The following information was extracted from The BLACK Chamber's Pigpen Cipher page. The content is available at https:/simonsingh net The_Black Chamber'pigpen html. "The Pigpen Cipher was used by Freemasons in the l8th Century to keep their records private. The cipher does not substitute one letter for another; rather it substitutes each letter for a symbol The aiphabet is written...

  • Assume that Alice sends a message of 640 bits encrypted using DES to Bob and that...

    Assume that Alice sends a message of 640 bits encrypted using DES to Bob and that the 65th bit of the ciphertext is flipped during transmission. How many blocks of the plaintext at the Bob’s side are affected if the message is encrypted under ECB, CBC, 8-bit CFB, 8-bit OFB, and CTR modes, respectively?

  • Decrypt the following ciphertext using the double transposition cipher using a matrix of 9 rows and...

    Decrypt the following ciphertext using the double transposition cipher using a matrix of 9 rows and 8 columns. TAWETNSHENGAMINEQTNSUIOEFHYTUENLIUVOFHAYETCNSENEETSFRHIOOVOAUEGHENHUFDTO Hint: The first two words in the plaintext are “IF” and “YOU”.

  • Problem 4. The plaintext P has been encrypted with RSA n = 65, e = 29...

    Problem 4. The plaintext P has been encrypted with RSA n = 65, e = 29 to yield the ciphertext C = 3 = P29 mod 65. Find P using the decryption key d, and prove the congruence class of P that solves this congruence is unique.

  • do the following in python idle 3.5 or higher know nothing on this subject Eile Edit...

    do the following in python idle 3.5 or higher know nothing on this subject Eile Edit Yew Hbtory Bookmarks bols Help Microsoft Word-Situatio x S Female coaches: Why are. x a SakaieURI:csc 110 spri.. x O lab7-crypto-s17-labr-cry. x Writer The owing Code. x https sakai. 7-Cryptog rithms -10 28 /lab7-cryp 67k e a Search A Most visited e Getting started To decode an Affine cipher, we need to reverse the process. This is not a simple as reversing a Caesar...

  • Write a Python program which implements the following two classical cryptosystem which we covered n class:...

    Write a Python program which implements the following two classical cryptosystem which we covered n class: a) Affine Cipher b) Vigenere Cipher Your program should consist of at least five functions: a) Two functions named encrypt, one for each of the two algorithms which accepts a lowercase alphabetical plaintext string and key as input and outputs a corresponding cipher text string. b) Two functions named decrypt, one for each of the two algorithms which accepts a lowercase alphabetical ciphertext string...

  • Using Python; Caesar part of the homework: Write c_encrypt() and c_decrypt(), both of which take two...

    Using Python; Caesar part of the homework: Write c_encrypt() and c_decrypt(), both of which take two arguments, the first one a string and the second one an integer key. Both should return a string. Vigenère part of the homework: Write vig_encrypt() and vig_decrypt() functions. Each takes two strings as inputs, with the first being the plaintext/ciphertext, and the second being the key. Both should be calling functions you wrote earlier to help make the work easier. The key will be...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT