Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Introduction Encryption is the way toward darkening data to make it indistinguishable without unique information. For quite a long time, individuals have concocted schemes to

Introduction

Encryption is the way toward darkening data to make it indistinguishable without unique information. For quite a long time, individuals have concocted schemes to scramble messages

some better than others however the appearance of the PC and the Internet upset the field. Nowadays, it's hard not to experience a type of encryption, regardless of whether you are purchasing something on the web or signing into Amazon. A cipher is an algorithm for performing encryption (and the opposite, decryption). The original message is called plaintext. After it is encoded, it is called ciphertext. The ciphertext message contains all the plaintext message data, however it's not in a configuration comprehensible by a human or PC without the legitimate system to decrypt it; it ought to look like arbitrary garbage to those not expected to understand it. A cipher typically relies upon a piece of secret information, called a key. The key is joined into the encryption process; the equivalent plaintext encoded with two distinct keys ought to have two diverse ciphertexts. Without the key, it ought not be to be easy to decrypt the subsequent ciphertext into intelligible plaintext. This task will manage three notable encryption techniques called the Caesar, Playfair, and Hill ciphers. In this problem set, you will need to design and implement the algorithms using your computer program and language choice.

Problem 1a.

Using the original plaintext below in bold quotes (e.g. use only alphabet characters, a-z), write a program to encrypt plaintext into ciphertext using the Caesar cipher.

If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out.

Getting started:

  1. Define the shift value i.e., the number of positions we want to shift from each character.
  2. Iterate over each character of the plain text:
    1. If the character is alphabet:
      1. Calculate the position/index of the character in the 0-25 range.
      2. Perform the positive shift using the modulo operation.
      3. Find the character at the new position.
      4. Replace the current letter by this new character.
    2. Else, If the character is not alphabet, ignore the character, and move to the next position in the plaintext. with no change.
    3. Your program is to print or graph results.

Problem 2a. Using the original plaintext from Problem 1a, write a program to encrypt plaintext into cipher using the Playfair cipher. Getting started: 1. Use the 5 by 5 matrix with keyword monarchy. 2. Iterate over each character of the plain text: 1. If the character is alphabet: 1. Follow the four rules on page 39 of the course text to encrypt two plaintext letters at a time. 2. Calculate the position/index of the character in the 0-25 range. 3. Find the character at the new position. 4. Replace the current letter by this new character. 2. Else, If the character is not alphabet, ignore the character, and move to the next position in the plaintext. with no change. 3. Your program is to print or graph results Problem 2b. Using the ciphertext you generated from Problem 2a, write a program to decrypt ciphertext into plaintext using the Playfair cipher. Your program is to print or graph results

I need an answer (program code) for problem 2, not problem 1. But if you still wanna do all of them then that's great!

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Programming With Visual Basic .NET

Authors: Carsten Thomsen

2nd Edition

1590590325, 978-1590590324

More Books

Students also viewed these Databases questions

Question

5. Tell how job experiences can be used for skill development.

Answered: 1 week ago