Question

In: Computer Science

2- Plain Text (Message): a) JERSEY b) CALIFORNIA Key: CSEC Scheme: Vigenere Cipher Cipher Text:

2- Plain Text (Message):

a) JERSEY

b) CALIFORNIA

Key: CSEC

Scheme: Vigenere Cipher

Cipher Text:

Solutions

Expert Solution

  • The encryption of the original text is done using the Vigenère Table. This table consists of the alphabets written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet. For easy understanding below is the image of Vigenère table.

PROCEDURE FOR GENERATING CIPHER TEXT

  • For the encryption process, we uses a different alphabet from one of the rows for every character of our Plane Text, and also the alphabet used for encrypting each character depends upon the key.
  • Be sure, length of key must be equal to length of plain text, if it is not then the given keyword is repeated in a circular manner unitl it matches the length of plain text.
  • Once we have generated our key properly, we can procced to encrypt every character of plain text one by one.
  • For encrypting a character we have to select a character from the table, and this selection of character is dependent upon both character of plain text as well as corrsopondind character of the key.
  • Plain text character is used to select the Row, while key is used to select the Column of the Vigenère Table.
  • This is what we have to do for every character of the Plain text and text formed by the combination of character selected from Vigenère Table for each character of plain text will be the resulting Cipher Text.

DETAILED SOLUTION

  • Answer / Explaination a)
    • Plain Text - JERSEY
    • As mentioned above our key length must be equal to that of plain text length. So, our resulting key will be CSECCS.
    • Key - CSECCS
    • Cipher Text - LWVUGQ
    • First Character of Plain text 'J' is paired with first character of key 'C'. So, 'J' row and 'C' column is selected and the value in the Vigenère Table is 'L'.
    • Second Character of Plain text 'E' is paired with second character of key 'S'. So, 'E' row and 'S' column is selected and the value in the Vigenère Table is 'W'.
    • Third Character of Plain text 'R' is paired with Third character of key 'E'. So, 'R' row and 'E' column is selected and the value in the Vigenère Table is 'V'.
    • Fourth Character of Plain text 'S' is paired with fourth character of key 'C'. So, 'S' row and 'C' column is selected and the value in the Vigenère Table is 'U'.
    • Fifth Character of Plain text 'E' is paired with fifth character of key 'C'. So, 'E' row and 'C' column is selected and the value in the Vigenère Table is 'G'.
    • Sixth Character of Plain text 'Y' is paired with sicth character of key 'S'. So, 'Y' row and 'S' column is selected and the value in the Vigenère Table is 'Q'.
    • Thus Cipher Text will be LWVUGQ.
  • Answer / Explaination b)
    • Plain Text - CALIFORNIA
    • As mentioned above our key length must be equal to that of plain text length. So, our resulting key will be CSECCSECCS.
    • Key - CSECCSECCS
    • Cipher Text - ESPKHGVPKS
    • Following the same steps as we have used in the above answer will we generate cipher text.
    • First char from plain text - 'C' (row), first char from key - 'C' (column), Cipher char - 'E'
    • Second char from plain text - 'A' (row), second char from key - 'S' (column), Cipher char - 'S'
    • Third char from plain text - 'L' (row), third char from key - 'E' (column), Cipher char - 'P'
    • Fourth char from plain text - 'I' (row), fourth char from key - 'C' (column), Cipher char - 'K'
    • fifth char from plain text - 'F' (row), fifth char from key - 'C' (column), Cipher char - 'H'
    • Sixth char from plain text - 'O' (row), sixth char from key - 'S' (column), Cipher char - 'G'
    • Seventh char from plain text - 'R' (row), seventh char from key - 'E' (column), Cipher char - 'V'
    • Eightieth  char from plain text - 'N' (row), eightieth char from key - 'C' (column), Cipher char - 'P'
    • Ninth char from plain text - 'I' (row), ninth char from key - 'C' (column), Cipher char - 'K'
    • Tenth char from plain text - 'A' (row), tenth char from key - 'S' (column), Cipher char - 'S'
    • Cipher Text will be the combination cipher char at respective postions thus Cipher text is ESPKHGVPKS.

Conclusion

  • Answer A) Cipher text : LWVUGQ
  • Answer B) Cipher text : ESPKHGVPKS

Related Solutions

!) Vigenere cipher Encode the text manybooksoninformationsecurity using the Vigenere cipher with the keyword fun
!) Vigenere cipher Encode the text manybooksoninformationsecurity using the Vigenere cipher with the keyword fun
Write a Java program that will encode plain text into cipher text and decode cipher text...
Write a Java program that will encode plain text into cipher text and decode cipher text into plain text. Create following methods and add them to your class: • a method named encode(String p, int key) that takes a plain text p and encodes it to a cipher text by adding the key value to each alphabet character of plain text p using the ASCII chart. The method should return the encoded String. For example, if p = "attack at...
If a Vigenere cipher uses the keyword CATS, what is the key used and what is...
If a Vigenere cipher uses the keyword CATS, what is the key used and what is the ciphertext that corresponds to the plaintext CATSCANS
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking...
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking alike, then somebody isn't thinking." Is this a good key? Why or why not? 2.  Calculate the index of coincidence for the result. SHOW ALL WORK PLEASE
1 Introduction A cipher is an algorithm which encrypts a message into cipher text so that...
1 Introduction A cipher is an algorithm which encrypts a message into cipher text so that it can be safely transmitted without an eavesdropper being able to (easily) read it. For the purposes of this assignment the message and ciphertext will be stored as strings of ASCII characters. Cipher algorithms always perform two tasks: encryption and decryption. The encryption process takes a “message” and “key” as inputs and produces cipher text. The decryption process performs the reverse: it turns cipher...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given that the Vigenere cipher of part (a) with the same keyword was used to produce the ciphertext: VFPUSVSNBVRCNQW Find the plaintext message.        
(a) Briefly describe what is meant by the word cryptography. (b) Briefly describe the Vigenere cipher,...
(a) Briefly describe what is meant by the word cryptography. (b) Briefly describe the Vigenere cipher, including a discussion of the encryption and decryption processes. (c) Describe what is meant by a ‘Feistel Cipher’. (d) DES includes S-boxes as part of its encryption and decryption steps. Each of eight S-boxes is a fixed 4 × 16 array, whose entries come from the integers 0, 1, . . . , 15. Describe in detail how DES transforms a 48-bit string into...
Write a Python program to implement Vignere Cipher. Take user input to get plain text and...
Write a Python program to implement Vignere Cipher. Take user input to get plain text and key. TRY TO MAKE IT AS EASY AS YOU CAN.
Using CrypTool2, display the results of encrypting the following plain text using the Caesar Cipher method...
Using CrypTool2, display the results of encrypting the following plain text using the Caesar Cipher method and a left shift value of 3. MEET YOU AT THE FOOTBALL MATCH
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT