Question
Introduction Encryption is the way toward darkening data to make it indistinguishable without unique information. For quite a long time, individuals have concocted schemes to
Introduction
Encryption is the way toward darkening data to make it indistinguishable without unique information. For quite a long time, individuals have concocted schemes to scramble messages
some better than others however the appearance of the PC and the Internet upset the field. Nowadays, it's hard not to experience a type of encryption, regardless of whether you are purchasing something on the web or signing into Amazon. A cipher is an algorithm for performing encryption (and the opposite, decryption). The original message is called plaintext. After it is encoded, it is called ciphertext. The ciphertext message contains all the plaintext message data, however it's not in a configuration comprehensible by a human or PC without the legitimate system to decrypt it; it ought to look like arbitrary garbage to those not expected to understand it. A cipher typically relies upon a piece of secret information, called a key. The key is joined into the encryption process; the equivalent plaintext encoded with two distinct keys ought to have two diverse ciphertexts. Without the key, it ought not be to be easy to decrypt the subsequent ciphertext into intelligible plaintext. This task will manage three notable encryption techniques called the Caesar, Playfair, and Hill ciphers. In this problem set, you will need to design and implement the algorithms using your computer program and language choice.
Problem 1a.
Using the original plaintext below in bold quotes (e.g. use only alphabet characters, a-z), write a program to encrypt plaintext into ciphertext using the Caesar cipher.
If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out.
Getting started:
- Define the shift value i.e., the number of positions we want to shift from each character.
- Iterate over each character of the plain text:
- If the character is alphabet:
- Calculate the position/index of the character in the 0-25 range.
- Perform the positive shift using the modulo operation.
- Find the character at the new position.
- Replace the current letter by this new character.
- Else, If the character is not alphabet, ignore the character, and move to the next position in the plaintext. with no change.
- Your program is to print or graph results.
- If the character is alphabet:
Problem 2a. Using the original plaintext from Problem 1a, write a program to encrypt plaintext into cipher using the Playfair cipher. Getting started: 1. Use the 5 by 5 matrix with keyword monarchy. 2. Iterate over each character of the plain text: 1. If the character is alphabet: 1. Follow the four rules on page 39 of the course text to encrypt two plaintext letters at a time. 2. Calculate the position/index of the character in the 0-25 range. 3. Find the character at the new position. 4. Replace the current letter by this new character. 2. Else, If the character is not alphabet, ignore the character, and move to the next position in the plaintext. with no change. 3. Your program is to print or graph results Problem 2b. Using the ciphertext you generated from Problem 2a, write a program to decrypt ciphertext into plaintext using the Playfair cipher. Your program is to print or graph results
I need an answer (program code) for problem 2, not problem 1. But if you still wanna do all of them then that's great!
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started