Question

The following ciphertext was generated using the Vignere method with a key length at most 6....

The following ciphertext was generated using the Vignere method with a key length at most 6. If anyone would be willing to decrpyt it and describe all steps of their thought process and how the results guided you towards the key would be greatly appreciated it! Also, comment on what is unusual about the plaintext and how did it affect the results:

hdsfgvmkoowafweetcmfthskucaqbilgjofmaqlgspvatvxqbiryscpcfrmvswrvnqlszdmgao

qsakmlupsqforvtwvdfcjzvgsoaoqsacjkbrsevbelvbksarlscdcaarmnvrysywxqgvellcyl

uwwveoafgclazowafojdlhssfiksepsoywxafowlbfcsocylngqsyzxgjbmlvgrggokgfgmhlm

ejabsjvgmlnrvqzcrggcrghgeupcyfgtydycjkhqluhgxgzovqswpdvbwsffsenbxapasgazmy

uhgsfhmftayjxmwznrsofrsoaopgauaaarmftqsmahvqecevvfsifzpbumppndzeneeb

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The easiest way is to have a double-entry grid,

Google it to find the Vigenere Cipher using a table

When the alphabet is ABCDEFGHIJKLMNOPQRSTUVWXYZ

Locate the first letter of the plaintext message in the first line of the table and the first letter of the key on the left column. The cipher letter is at the intersection.

How to decrypt Vigenere cipher?

Vigenere decryption requires a key (and an alphabet). As for encryption, two ways are possible.

Decryption of Vigenere by subtracting letters

Example: To decrypt NGMNI, the key is KEY and the alphabet is ABCDEFGHIJKLMNOPQRSTUVWXYZ.

To decrypt, take the first letter of the ciphertext and the first letter of the key, and subtract their value (letters have a value equals to their position in the alphabet starting from 0). If the result is negative, add 26 (26=the number of letters in the alphabet), the result gives the rank of the plain letter.

Example: Take the first letters of the ciphertext N (value = 13) and the key K (value = 10) and subtract them (13-10=3), the letter of value 3 is D.

Continue with the next letters of the message and the next letters of the key, when arrived at the end of the key, go back the the first key of the key.

Example: NGMNI
KEYKE

Example: DCODE is the plain text.

Add a comment
Know the answer?
Add Answer to:
The following ciphertext was generated using the Vignere method with a key length at most 6....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more...

    Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more difficult process. Indeed, the purpose of encryption is to make it as difficult as possible for anyone who does not know the key to read the plain text. We will be using an unsophisticated password cracking technique called a brute force attack. A brute force attack on the APCO cipher works by trying every possible four digit key (from 0000 to 9999) and keeping...

  • how does changing saline concentration affect enzyme activity? (only saline not ph) what is the hypothesis...

    how does changing saline concentration affect enzyme activity? (only saline not ph) what is the hypothesis Enzyme Activity Design Investigation The compound hydrogen peroxide, Hou by product of the reaction in most living organisms. However, Hydrogen peroxide is damaging to delicate molecules inside ces As a result, nearly all organisms produce the enzyme catalase, which breaks down H,O, it is formed Potatoes are one source of catalase Catalase speeds up the breakdown of hydrogen peroxide into water and gaseoul sxygen...

  • JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information...

    JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information being exposed, it is becoming more and more important to find ways to protect our sensitive data. In this program we will develop a simple tool that helps users generate strong passwords, encrypt and decrypt data using some cyphering techniques. You will need to create two classes. The first class is your driver for the application and contains the main method. Name this class...

  • Persuasion is a constant in each of our lives. No matter where we look, what we...

    Persuasion is a constant in each of our lives. No matter where we look, what we read, what we see, or who we interact with, we are inevitably going to encounter some form of persuasion. Advertisements want us to buy things. Newspapers and television want to convince us of how we should feel about events. We are put into positions where we must defend our thoughts and beliefs to others, and the process we apply is typically some form of...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Eight studies are described briefly below. What research method was employed in these studies, also write...

    Eight studies are described briefly below. What research method was employed in these studies, also write the rationale of your choice of response. 1. A researcher is interested in whether drinking water right before bed increases the likelihood that children will wet the bed at night. The researcher recruits 50 5-year-old children to participate in her study. Twenty-five children are given two glasses of water two hours before their bedtime (one glass per hour) and twenty-five children are prohibited from...

  • Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are...

    Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are multiple GVV documents in this Module. Review them all. You may do the exercises suggested in the documents but you do not have to post them in Canvas. You will learn how to factor your personal values into your ethical decisions from the method, you will still use the IDEA case analysis method when analyzing the GVV case, The Client Who Fell Through The...

  • Make a program using Java that asks the user to input an integer "size". That integer...

    Make a program using Java that asks the user to input an integer "size". That integer makes and prints out an evenly spaced, size by size 2D array (ex: 7 should make an index of 0-6 for col and rows). The array must be filled with random positive integers less than 100. Then, using recursion, find a "peak" and print out its number and location. (A peak is basically a number that is bigger than all of its "neighbors" (above,...

  • The Mayo clinic is one of the most respected names in medicine world. Founded in the...

    The Mayo clinic is one of the most respected names in medicine world. Founded in the 1880s in Rochester, Minnesota, the Mayo clinic embraced innovation from the beginning. It is believed to be America’s first integrated group practice as it employed the concept of coordinated, specialized care and sought out the best expertise. At the core of the Mayo culture, from its inception to today, is a team approach and physician decision making rooted in shared responsibility and consensus building....

  • Hello! Could you please write a 6 paragraph summary (5-6 sentences each paragraph) of the below?...

    Hello! Could you please write a 6 paragraph summary (5-6 sentences each paragraph) of the below? In the overview, if you could please describe the information in detail. Please have completed in 6 days if possible. Thank you! In 50 Words Or LesS .6TOC combines lean Six Sigma (LSS) and the theory of constraints (TOC) for bottom-line benefits . The method's metrics pyramids and communi- cations allow organiza- tions to retain gains and monitor benefits. · 6TOC goes beyond fac-...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT