Question

In: Computer Science

Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key =...

Encipher the following emperors’ names using a Shift Cipher with the given key.

  1. Pompeii, key = D. ___________
  2. Vespasian, key = P. _________
  3. Caligula, key = H. _________
  4. Nero, key = T. _____________

Solutions

Expert Solution

Solution

Step 1

Convert the letters into the numbers that matches alphabet

(A=0,B=1,C=2,D=3,E=4,….Y=24,Z=25)

Step 2

Calculate

Y=(X+K) mod 26

Step 3

Now convert the Y into letter matches

a)

Pompeii, key = D

P

O

M

P

E

I

I

                      15

14

12

15

4

8

8

Now Key=D

D=3

P

O

M

P

E

I

I

                      15

14

12

15

4

8

8

3

3

3

3

3

3

3

18

17

15

18

7

11

11

Step4

P

O

M

P

E

I

I

                      15

14

12

15

4

8

8

3

3

3

3

3

3

3

(mod 26)

18

17

15

18

7

11

11

18

17

15

18

7

11

11

Step 5

Now convert back to letters

P

O

M

P

E

I

I

                      15

14

12

15

4

8

8

3

3

3

3

3

3

3

(mod 26)

18

17

15

18

7

11

11

18

17

15

18

7

11

11

S

R

P

S

H

K

K

Therefore Answer is

SRPSHKK

---

b)

Vespasian, key = P

V

E

S

P

A

S

I

A

N

21

4

18

15

0

18

8

0

13

key P

15

15

15

15

15

15

15

15

15

36

19

33

30

15

33

23

15

28

(mod 26)

10

19

7

4

15

7

23

15

2

K

U

H

E

P

H

X

P

C

Therefore Answer is

KUHEPHXPC

---

c)

Caligula, key = H

C

A

L

I

G

U

L

A

2

0

11

8

6

20

11

0

key H

7

7

7

7

7

7

7

7

9

7

18

15

13

27

18

7

(mod 26)

9

7

18

15

13

1

18

7

J

H

S

P

N

B

S

H

Therefore Answer is

JHSPNBSH

---

d)

Nero, key = T

N

E

R

O

13

4

17

14

key T

19

19

19

19

32

23

36

33

(mod 26)

6

23

10

7

G

X

K

H

Therefore Answer is

GXKH


Related Solutions

Decipher the following names. They have been enciphered using a Shift cipher with the given key....
Decipher the following names. They have been enciphered using a Shift cipher with the given key. GULWOM UOLYFCOM, key = U. IRGAJOAY, key = G. TYESBUJYQD, key = Q. HFXXNZX, key = F.   Encipher the following words using a Shift Cipher with the given key. Appian Way, key = F. Punic Wars, key = B. Carthage, key = N. Gladiator, key = W.
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE,...
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE, key = 12. TJNXWNVM, key = 19. LHAXEWJ, key = 22. DBSLEXO, key = 10. GDBPC ATVXDC, key =15. Decipher the following. They have been enciphered using a Shift Cipher with the given key. QSBHIFWCB, key = O. CQN ADKRLXW ARENA, key = J. ZKBYQD SQBUDTQH, key = Q. VTXLTKBTG LXVMBHG, key = T.
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or...
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. Given an arbitrary cipher text file, you need to write a C++ program to find out the value of the shift going down the...
write a Java method that decrypts a keyword columnar transposition cipher with a given key
write a Java method that decrypts a keyword columnar transposition cipher with a given key
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep...
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep in mind that only letter j was used for padding. (Show your detailed work)
A Caesar cipher encrypts a message by shifting letters in the alphabet. For example, a shift...
A Caesar cipher encrypts a message by shifting letters in the alphabet. For example, a shift of 4 maps 'a' to 'e' and maps 'p' to 't' Here is a famous line from Shakespeare encrypted with a shift of 4: 'vq dg qt pqv vq dg: vjcv ku vjg swguvkqp.' (a) Write a program that takes as input a string to be encrypted and an integer encrpytion shift (such as 4 mentioned earlier), and prints the encrypted string. [Hint: zip()...
Please provide a step by step solution Key the names in indexing order using the ARMA...
Please provide a step by step solution Key the names in indexing order using the ARMA rules. In the upper right corner of each card, key the corresponding number for each name James R. Larsen Bob O’Donald Helen Vandermallie Martha Odell-Ryan Sister Catherine George Harris, Ph.D. Mrs. Georgia Harris Father Jenkins Ty Chen Martha Odellman Allens Swap Shop J. T. Larson Herbert Vander Mallie George Harris, M.D. Mary Allen’s Beauty Shop Marshall Field & Company Georgia Harris Allens’ Print Shop...
!) Vigenere cipher Encode the text manybooksoninformationsecurity using the Vigenere cipher with the keyword fun
!) Vigenere cipher Encode the text manybooksoninformationsecurity using the Vigenere cipher with the keyword fun
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT