Question

In: Computer Science

Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep...

Cryptography:

Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep in mind that only letter j was used for padding. (Show your detailed work)

Solutions

Expert Solution

In Column cipher the plain text will be divided into multiple rows each having the length of the key. If there is any row with length less than key size then it is padded with characters. Then the key is alphabetically order and in that order the columns of plain text are swapped.

Then we get the encrypted text by reading the characters row wise.

Here it is given that j is the only letter used for padding. So definitely it belongs to the last row last element.

Since the ciphertext obtained by reading the characters of plain text columnwise. The letters till j is the last column.

From this we get the last column of that plain text as

y

K

C

C

j

All the rows and columns are equal in columnar cipher. So we divide the cipher into blocks of length 5. So we will get 5 columns

O w. r. r

S . I. i . l

a . e. o . r

I . k. g. n

a . h. r. i

Since we don't know the key . We don't know how these 4 columns are to be ordered . So we can try for trial and error method.

The easy method to try to make a meaningful first word using the first elements of each column in some order.

When we try that we will get the the word worry.

Now order the columns in that order.we will get it as

W. O R .R. Y

I S L. I. K

E . A. R. O C

K I N G .C

H A. I. R . J

That is the plan text is worry is like a rocking chair. The key can be word of length 5 which is having the alpabetic order 32541(the order in which column were sorted) like

CBEDA


Related Solutions

1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times...
1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times  Decipher (convert ciphertext in to plaintext):  JR PHDQ JUHHQ 2. Polyalphabetic substitution (using the Vigenere Square in the lecture slide) Encipher: fall  Decipher:  VPX TWOKM
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
write a Java method that decrypts a keyword columnar transposition cipher with a given key
write a Java method that decrypts a keyword columnar transposition cipher with a given key
These questions are about math cryptography 1) Encrypt the plaintext "this is a secret message" using...
These questions are about math cryptography 1) Encrypt the plaintext "this is a secret message" using the affine function f(x) = 5x + 7 mod 26. 2) Determine the number of divisors of 2n, where n is a positive integer.
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
1) The ciphertext ESCLXYB has been obtained by using vigenere with key= (30 , 10 ,...
1) The ciphertext ESCLXYB has been obtained by using vigenere with key= (30 , 10 , 15 , 5). Find the plaintext? 2) the ciphertext OWRTLUFXRTLFTP by affine cipher , key=(21,5) find the plaintext?
Using Python, write a simple application that takes user input of plaintext and key, and encrypt...
Using Python, write a simple application that takes user input of plaintext and key, and encrypt the plaintext with Vigenere Cipher. The application should then print out the plaintext and the ciphertext.
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT