Question

In: Computer Science

Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”

Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”

Solutions

Expert Solution

The playfair square formed using the keyword "UNIVERSITY" is:

Algorithm to decrypt the ciphertext: The ciphertext is split into pairs of two letters (digraphs). The ciphertext will always have even number of characters.

Rules for Decryption:

1) Both the letters are in the same column: Take the letter above each one (going back to the bottom if at the top).

2)Both the letters are in the same row: Take the letter to the left of each one (going back to the rightmost if at the leftmost position).

3) Neither of the above rules is true: Form a rectangle with the two letters and take the letters on the horizontal opposite corner of the rectangle.

The ciphertext GKSKHALTYZ is broken down as : GK SK HA LT YZ

For the first pair, se see that in the square, The letter G and K are in different rows and columns, so Rule 3 is applied and we get CO as the result

For the second pair, SK, in the square we see that they are in the same column therefore Rule 1 is applied and we get NC as the decrypted text.

Similarly, applying the same procedure for all the pairs, we get the result:

Answer : CONCORDIAX


Related Solutions

Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
decrypt the ciphertext xyatqyvaxpagjdpglax encrypted by the affine cipher. also explain is there alphabets which will...
decrypt the ciphertext xyatqyvaxpagjdpglax encrypted by the affine cipher. also explain is there alphabets which will not change after ecnryption
Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
The Vigenère Cipher is an encryption algorithm that combines the use of a keyword with the...
The Vigenère Cipher is an encryption algorithm that combines the use of a keyword with the message to be encrypted. A tableau is provided that shows an encrypted character for each combination of characters in the message and the keyword. Using the Vigenère Tableau encryption scheme with a keyword of KEYWORD, encrypt the following message: IS INFORMATION SECURITY ESSENTIAL After encrypting the message, decrypt the following message, using KEYWORD as the keyword: YRJUW WWRIG JTFUW ERECE LCMKL CIWKR R For...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given that the Vigenere cipher of part (a) with the same keyword was used to produce the ciphertext: VFPUSVSNBVRCNQW Find the plaintext message.        
1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times...
1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times  Decipher (convert ciphertext in to plaintext):  JR PHDQ JUHHQ 2. Polyalphabetic substitution (using the Vigenere Square in the lecture slide) Encipher: fall  Decipher:  VPX TWOKM
If a Vigenere cipher uses the keyword CATS, what is the key used and what is...
If a Vigenere cipher uses the keyword CATS, what is the key used and what is the ciphertext that corresponds to the plaintext CATSCANS
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the...
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the message. Use at least two ciphers combined to design your own cipher Specify the min. and max. length of the message user can enter to encrypt Specify the length of the “key” user can enter to encrypt and decrypt the message Part 2: Programme the cipher and make it available to validate. Cleartext for the original programming scripts has to submitted. A frontend webpage...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT