Question

In: Computer Science

Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE,...

Decipher the following. They have been enciphered using a Shift Cipher with the given key.

  1. OMFMOAYNE, key = 12.
  2. TJNXWNVM, key = 19.
  3. LHAXEWJ, key = 22.
  4. DBSLEXO, key = 10.
  5. GDBPC ATVXDC, key =15.

Decipher the following. They have been enciphered using a Shift Cipher with the given key.

  1. QSBHIFWCB, key = O.
  2. CQN ADKRLXW ARENA, key = J.
  3. ZKBYQD SQBUDTQH, key = Q.
  4. VTXLTKBTG LXVMBHG, key = T.

Solutions

Expert Solution

In cipher encryption and decryption all the alphabets are in the number that matches its order in the alphabet starting from 0.

A=0, B=1, C=2, ... , Y=24, Z=25.

The formula to decrypt the cipher code is:

decrypt_alphabet = (encrypt_alphabet_number + key) mod 26

Step by step solution of all questions are in the below picture

  

So, the answer is:

1. OMFMOAYNE, key = 12.

CATACOMBS

2. TJNXWNVM, key = 19

AQUEDUCT

3. LHAXEWJ, key = 22.

PLEBIAN

4. DBSLEXO, key = 10.

TRIBUNE

5. GDBPC ATVXDC, key =15.

ROMAN LEGION

6. QSBHIFWCB, key = O.

CENTURION

7. CQN ADKRLXW ARENA, key = J.

THE RUBICON RIVER

8. ZKBYQD SQBUDTQH, key = Q.

JULIAN CALENDAR

9. VTXLTKBTG LXVMBHG, key = T.

CAESARIAN SECTION


Related Solutions

Decipher the following names. They have been enciphered using a Shift cipher with the given key....
Decipher the following names. They have been enciphered using a Shift cipher with the given key. GULWOM UOLYFCOM, key = U. IRGAJOAY, key = G. TYESBUJYQD, key = Q. HFXXNZX, key = F.   Encipher the following words using a Shift Cipher with the given key. Appian Way, key = F. Punic Wars, key = B. Carthage, key = N. Gladiator, key = W.
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
write a Java method that decrypts a keyword columnar transposition cipher with a given key
write a Java method that decrypts a keyword columnar transposition cipher with a given key
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key...
Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key to encrypt the following plain text “the automorphism group is more difficult”.           there is no given key
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given that the Vigenere cipher of part (a) with the same keyword was used to produce the ciphertext: VFPUSVSNBVRCNQW Find the plaintext message.        
If a Vigenere cipher uses the keyword CATS, what is the key used and what is...
If a Vigenere cipher uses the keyword CATS, what is the key used and what is the ciphertext that corresponds to the plaintext CATSCANS
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking...
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking alike, then somebody isn't thinking." Is this a good key? Why or why not? 2.  Calculate the index of coincidence for the result. SHOW ALL WORK PLEASE
Binary file IO Suppose a file has been encrypted using the Caesar cipher as described above,...
Binary file IO Suppose a file has been encrypted using the Caesar cipher as described above, and you know the secret key. Write a program to decrypt (or decode) the file. Your program will prompt the user to enter an input file name for the encrypted file, an output file name for the unencrypted version of the input file, and the secret key. Create a DataInputStream for the input file and a DataOutputStreams for the output file. Next, read the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT