Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write a program that ciphers a plain text message using double transposition scheme and vice versa. The program should accept five tuples of input: plain

Write a program that ciphers a plain text message using double transposition scheme and vice versa. The program should accept five tuples of input: plain text, row, column, permutation of row and columns. An example of encrypted text for the plain text attack at dawn is shown below. Similarly, your program should decrypt the encrypted text given the encrypted text, matrix row and column sizes, row and column permutation order. An example snapshot of output is shown below: Coding using jGRASP.

image text in transcribed

The program should accept five tuples of input: plain text, row, column, permutation of row and columns. An example of encrypted text for the plain text "attack at dawn" is shown below Plain text: attack at dawn Matrix row size: 5 Matrix column size: 3 Row permutation order: 3, 5, 1, 4, 2 Column pernmutation order: 1, 3, 2 ted text: xtawxnattxadakc Similarly, your program should decrypt the encrypted text given the encrypted text, matrix row and column sizes, row and column permutation order. An example snapshot of output is shown below: Encrypted text: xtawxnattxadakc Matrix row size: 5 Matrix column size: 3 Row permutation order: 3, 5, 1, 4, 2 Column permutation order: 1, 3, 2 Plain text: attack at dawn

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions