Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CRYPTOGRAPHY IN PYTHON - CIPHERING AND DECIPHERING 1. You are to write a custom rail fence ciphering program in Python. The plain text is written

image text in transcribed

CRYPTOGRAPHY IN PYTHON - CIPHERING AND DECIPHERING 1. You are to write a custom rail fence ciphering program in Python. The plain text is written as shown in the following where the plain text is written on different rails in this order: rail 1 > rail 2 > rail 3 > rail 4 > rail 3 > rail 2 > rail 3 > rail 4 > rail 3 > rail 2 > rail 1 > rail 2 > rail 3 > rail 2 > rail 1 and this order is repeated until the plain text is processed entirely. Then the cipher text is constructed by writing the letters on rail 1, then rail 2, then rail 3, and lastly rail 4 as shown in the following: THE ONLY BLUE MARBLE OF OURS BEAUTIFUL T E B E I H L UMRL 0 BATF ENYL A E FUS U U 0 B OR L TEBEI HLUMRLOBATF ENYLAEFUSUU OBORL You may choose to write your program by using state machines as we did in the class or you can use some other methods. For instance you may write a function that takes letters from the plain text and completes only a single cycle of writing 14 letters over 4 rails as described above and returns the content of four rails which are accumulated. 2. Ceaser ciphering method is used with a key and this cipher text is obtained: "ASFQIFM VOG BC ACCBG where the space characters exist in their original position in the plain text. In other words, we didn't drop the space characters at the beginning of the ciphering; instead, we simply copied the space character to the cipher text. Find the key and decipher this cipher text by writing and using functions in Python. Include your work in the report. 3. In Double-Ceaser cipher we use Ceaser ciphering twice: First ciphering accepts the plain text and a key shift value and then produces the ciphering text C1, which becomes the input of the second ciphering with another key shift value, to produce the final cipher text C2. By using two different key shift values, this ciphering produces C2 of "YJEXITG WPH BPCN BDDCH". Find the plain text by using Python and include your work in the report. If you don't use a dictionary, you may print all the possible plain text for different key combinations and check with your own eyes whether a plain text makes sense or not. If it makes sense, then you found the plain text

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Management Databases And Organizations

Authors: Watson Watson

5th Edition

0471715360, 978-0471715368

More Books

Students also viewed these Databases questions

Question

2. What should an employer do when facing an OSHA inspection?

Answered: 1 week ago