Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write a python program that ciphers a plain text message using double transposition scheme and vice versa. The program should accept five tuples of

Write a python program that ciphers a plain text message using double transposition scheme and vice versa. The program should accept five tuples of input: plain text, row, column, permutation of row and columns. An example of encrypted text for the plain text attack at dawn is shown below. Plain text: attack at dawn Matrix row size: 5 Matrix column size: 3 Row permutation order: 3, 5, 1, 4, 2 Column permutation order: 1, 3,2 Encrypted text: xtawxnattxadakc Similarly, your program should decrypt the encrypted text given the encrypted text, matrix row and column sizes, row and column permutation order. An example snapshot of output is shown below: Encrypted text: xtawxnattkadake Matrix row size: 5 Matrix column size: 3 Row permutation order 3,5.1.4. 2 Column permutation order 1, 3, 2 Plain text attack at dawn

Write a python program that ciphers a plain text message using double transposition scheme and vice versa. The program should accept five tuples of input: plain text, row, column, permutation of row and columns. An example of encrypted text for the plain text "attack at dawn" is shown below. Plain text: attack at dawn Matrix row size: 5 Matrix column size: 3 Row permutation order: 3, 5, 1, 4, 2 Column permutation order: 1, 3, 2 Encrypted text: xtawxnattxadakc Similarly, your program should decrypt the encrypted text given the encrypted text, matrix row is shown and column sizes, row, and column permutation order. An example snapshot of output below: Encrypted text: xtawxnattxadake Matrix row size: 5 Matrix column size: 3 Row permutation order: 3, 5, 1, 4, 2 Column permutation order: 1. 3. 2 Plain text: attack at dawn

Step by Step Solution

3.42 Rating (158 Votes )

There are 3 Steps involved in it

Step: 1

Encryption Transposition Cipher Encryption import pyperclip def main myMessage attack at dawn myKey 8 ciphertext encryptMessagemyKey myMessage Print t... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Structures and Algorithms in Python

Authors: Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser

1st edition

1118290275, 1-118-54958-2, 978-1118290279

More Books

Students also viewed these Programming questions