Question

In: Computer Science

Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE,...

Decipher the following. They have been enciphered using a Shift Cipher with the given key.

  1. OMFMOAYNE, key = 12.
  2. TJNXWNVM, key = 19.
  3. LHAXEWJ, key = 22.
  4. DBSLEXO, key = 10.
  5. GDBPC ATVXDC, key =15.

Decipher the following. They have been enciphered using a Shift Cipher with the given key.

  1. QSBHIFWCB, key = O.
  2. CQN ADKRLXW ARENA, key = J.
  3. ZKBYQD SQBUDTQH, key = Q.
  4. VTXLTKBTG LXVMBHG, key = T.

Solutions

Expert Solution

In cipher encryption and decryption all the alphabets are in the number that matches its order in the alphabet starting from 0.

A=0, B=1, C=2, ... , Y=24, Z=25.

The formula to decrypt the cipher code is:

decrypt_alphabet = (encrypt_alphabet_number + key) mod 26

Step by step solution of all questions are in the below picture

  

So, the answer is:

1. OMFMOAYNE, key = 12.

CATACOMBS

2. TJNXWNVM, key = 19

AQUEDUCT

3. LHAXEWJ, key = 22.

PLEBIAN

4. DBSLEXO, key = 10.

TRIBUNE

5. GDBPC ATVXDC, key =15.

ROMAN LEGION

6. QSBHIFWCB, key = O.

CENTURION

7. CQN ADKRLXW ARENA, key = J.

THE RUBICON RIVER

8. ZKBYQD SQBUDTQH, key = Q.

JULIAN CALENDAR

9. VTXLTKBTG LXVMBHG, key = T.

CAESARIAN SECTION


Related Solutions

Decipher the following names. They have been enciphered using a Shift cipher with the given key....
Decipher the following names. They have been enciphered using a Shift cipher with the given key. GULWOM UOLYFCOM, key = U. IRGAJOAY, key = G. TYESBUJYQD, key = Q. HFXXNZX, key = F.   Encipher the following words using a Shift Cipher with the given key. Appian Way, key = F. Punic Wars, key = B. Carthage, key = N. Gladiator, key = W.
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key =...
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key = D. ___________ Vespasian, key = P. _________ Caligula, key = H. _________ Nero, key = T. _____________
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or...
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. Given an arbitrary cipher text file, you need to write a C++ program to find out the value of the shift going down the...
Assignment 1 – Cipher Situation. You have been employed as a cipher clerk for the Secret...
Assignment 1 – Cipher Situation. You have been employed as a cipher clerk for the Secret Service agency. The radio operators have intercepted a foreign transmission, which is heavily encrypted. They are currently attempting to decrypt this information and have requested your help. The contents of the encrypted message are as follows: Y [ZU [ XZWZ \ XXZjZ [ [ WWVWU Ogaqkxpgbqbfiof! Cyw'ss bun! Zqksxl cywd lnepwvs uozneh. Qjc mgabiy nfx vmz-djrhkfalfq. Xnjfx ai qjvi viqi uat pgw odjwp. The...
write a Java method that decrypts a keyword columnar transposition cipher with a given key
write a Java method that decrypts a keyword columnar transposition cipher with a given key
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep...
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep in mind that only letter j was used for padding. (Show your detailed work)
A Caesar cipher encrypts a message by shifting letters in the alphabet. For example, a shift...
A Caesar cipher encrypts a message by shifting letters in the alphabet. For example, a shift of 4 maps 'a' to 'e' and maps 'p' to 't' Here is a famous line from Shakespeare encrypted with a shift of 4: 'vq dg qt pqv vq dg: vjcv ku vjg swguvkqp.' (a) Write a program that takes as input a string to be encrypted and an integer encrpytion shift (such as 4 mentioned earlier), and prints the encrypted string. [Hint: zip()...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT