Question

In: Computer Science

Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep...

Cryptography:

Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep in mind that only letter j was used for padding. (Show your detailed work)

Solutions

Expert Solution

In Column cipher the plain text will be divided into multiple rows each having the length of the key. If there is any row with length less than key size then it is padded with characters. Then the key is alphabetically order and in that order the columns of plain text are swapped.

Then we get the encrypted text by reading the characters row wise.

Here it is given that j is the only letter used for padding. So definitely it belongs to the last row last element.

Since the ciphertext obtained by reading the characters of plain text columnwise. The letters till j is the last column.

From this we get the last column of that plain text as

y

K

C

C

j

All the rows and columns are equal in columnar cipher. So we divide the cipher into blocks of length 5. So we will get 5 columns

O w. r. r

S . I. i . l

a . e. o . r

I . k. g. n

a . h. r. i

Since we don't know the key . We don't know how these 4 columns are to be ordered . So we can try for trial and error method.

The easy method to try to make a meaningful first word using the first elements of each column in some order.

When we try that we will get the the word worry.

Now order the columns in that order.we will get it as

W. O R .R. Y

I S L. I. K

E . A. R. O C

K I N G .C

H A. I. R . J

That is the plan text is worry is like a rocking chair. The key can be word of length 5 which is having the alpabetic order 32541(the order in which column were sorted) like

CBEDA


Related Solutions

1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times...
1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times  Decipher (convert ciphertext in to plaintext):  JR PHDQ JUHHQ 2. Polyalphabetic substitution (using the Vigenere Square in the lecture slide) Encipher: fall  Decipher:  VPX TWOKM
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
In cryptography, Caesar cipher is one of the simplest encryption techniques. The key idea of this...
In cryptography, Caesar cipher is one of the simplest encryption techniques. The key idea of this method is to replace each plaintext letter with one fixed number of places down the alphabet. Below is an example with a shift of three: Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz Cipher: DEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzABC To cipher a string, ‘A’ is replaced by ‘D’, ‘B’ is substituted by ‘E’, and so on. To decode a string, ‘A’ is replaced by ‘x’, etc. By using python with vs code: Write a...
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
write a Java method that decrypts a keyword columnar transposition cipher with a given key
write a Java method that decrypts a keyword columnar transposition cipher with a given key
These questions are about math cryptography 1) Encrypt the plaintext "this is a secret message" using...
These questions are about math cryptography 1) Encrypt the plaintext "this is a secret message" using the affine function f(x) = 5x + 7 mod 26. 2) Determine the number of divisors of 2n, where n is a positive integer.
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key =...
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key = D. ___________ Vespasian, key = P. _________ Caligula, key = H. _________ Nero, key = T. _____________
1) The ciphertext ESCLXYB has been obtained by using vigenere with key= (30 , 10 ,...
1) The ciphertext ESCLXYB has been obtained by using vigenere with key= (30 , 10 , 15 , 5). Find the plaintext? 2) the ciphertext OWRTLUFXRTLFTP by affine cipher , key=(21,5) find the plaintext?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT