Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Vistula university Encryption/decryption with Playfair, Vigenere and simple columnar ciphers Please HELP ME SOLVE THE TASKS BELOW FOR cryptology. -- Task 1 Encrypt the plaintext

image text in transcribedVistula universityimage text in transcribed

Encryption/decryption with Playfair, Vigenere and simple columnar ciphers Please HELP ME SOLVE THE TASKS BELOW FOR cryptology. -- Task 1 Encrypt the plaintext EXERCISE' using Playfair cipher and the key that is transformation of my ID number ( 53263 } to the set of 26 alphabet characters: MY ID 5 3 2 6 3 MY letters = key E B (134 Answer: Task 2 Decrypt the ciphertext ZOBGWNFUQBCGUY' created by the Playfair cipher if the key is the name of deadly dangerous disease that caused the break in studying process in March 2020. One word is needed. Answer: Task 3 Decrypt the ciphertext NBSRUHATNJHGLCJCYACYGKMJLIY' created by one of popular polyalphabe- tic substitution ciphers if a key is the name of the university you are studying at. Answer: Task 4 Decrypt the ciphertext KIESOSNPESATMFOEETTOERTRPALFTOHSANETEMEODCAWRARN' if it was created by the simple columnar transposition cipher together with the key 'TWENTY'. Show encryption/decryption tables on the second side of page. Answer: Task 5 Encrypt the plaintext 'STAY AWAY FROM THE COUGHING PERSON' using the simple columnar transposition cipher and the key being the number of characters of the word, that names the last digit of your ID number. For instance: 7 seven + 5 characters key = 5 columns. Answer: It is another type of cipher where the order of the alphabets in the plaintext is rearranged to create the ciphertext. The actual plaintext alphabets are not replaced. It is the cipher where the plaintext is written horizontally with a certain alphabet width. Then the ciphertext is read vertically as shown. For example, the plaintext is "GOLDEN STATUE IS IN ELEVENTH CAVE" and the secret randomly chosen key is "FIVE. We arrange this text horizontally in table with number of columns equal to the key value (FIVE => 5 columns). The resulting text is shown below. 1 G 2 0 S 3 L 4 D 5 E T N T A S E U E N E E N Av I L T E I V The ciphertext is obtained by reading column vertically downward from the first to the last column. The ciphertext (or better to say: ciphertext alphabet) is 'GNUNEAOSEENVLTILTEDASEHETIVC' and counts 28 letters. To decrypt, the receiver prepares similar table. The number of columns is equal to key number (FIVE = 5 characters = 5 columns). The number of rows is obtained by dividing number of total ciphertext alphabets (28 characters) by the key value (5) and rounding the quotient to the next integer value. So [ 28/57=[5,67 = 6 rows. This function is called a roof function. The receiver then writes the received ciphertext vertically downward, from the first to the last column. To obtain the plaintext, he reads horizontally by rows from the top to the bottom

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

WHAT IS AUTOMATION TESTING?

Answered: 1 week ago

Question

What is Selenium? What are the advantages of Selenium?

Answered: 1 week ago

Question

Explain the various collection policies in receivables management.

Answered: 1 week ago

Question

What is the most important part of any HCM Project Map and why?

Answered: 1 week ago