Question

In: Computer Science

decrypt the ciphertext xyatqyvaxpagjdpglax encrypted by the affine cipher. also explain is there alphabets which will...

decrypt the ciphertext xyatqyvaxpagjdpglax encrypted by the affine cipher. also explain is there alphabets which will not change after ecnryption

Solutions

Expert Solution

Here this table shows the ciphertext letter for each of the plaintext letter that is given in alphabetic order. Here we have to perform (5x+8)mod 26 to find the ciphertext of the given plain text letter,where x is the number given for each of the plaintext letter and that is given in alphabetic order starting from 0, so A has 0 value and Z has value 25. Then perform (5X+8)mod26 to find a number and then write the letter that is represented by that number.Then we get the ciphertext.

Herer ciphertext is  xyatqyvaxpagjdpglax

corresponding plaintext after referring table is dyoxmynodrokvzrklod

here if we look at this plaintext we can see that for the ciphertext letters y and l we are getting the same letters to represent plain text.


Related Solutions

Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
Suppose an attacker obtained 128 bits of ciphertext that were encrypted using an encryption algorithm whose...
Suppose an attacker obtained 128 bits of ciphertext that were encrypted using an encryption algorithm whose keys are known to be 128 bits long. How effective is an exhaustive key search if the attacker does not know the encryption algorithm used? Provide an example of when data integrity is more important than data confidentiality? Suppose you have been asked at your new job to recommend the strength of encryption needed to protect the contents of a database. Draw up a...
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the...
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the message. Use at least two ciphers combined to design your own cipher Specify the min. and max. length of the message user can enter to encrypt Specify the length of the “key” user can enter to encrypt and decrypt the message Part 2: Programme the cipher and make it available to validate. Cleartext for the original programming scripts has to submitted. A frontend webpage...
Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key...
Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key to encrypt the following plain text “the automorphism group is more difficult”.           there is no given key
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Binary file IO Suppose a file has been encrypted using the Caesar cipher as described above,...
Binary file IO Suppose a file has been encrypted using the Caesar cipher as described above, and you know the secret key. Write a program to decrypt (or decode) the file. Your program will prompt the user to enter an input file name for the encrypted file, an output file name for the unencrypted version of the input file, and the secret key. Create a DataInputStream for the input file and a DataOutputStreams for the output file. Next, read the...
1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times...
1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times  Decipher (convert ciphertext in to plaintext):  JR PHDQ JUHHQ 2. Polyalphabetic substitution (using the Vigenere Square in the lecture slide) Encipher: fall  Decipher:  VPX TWOKM
Please explain all the steps! Let f : R2 → R2 be the affine transformation which...
Please explain all the steps! Let f : R2 → R2 be the affine transformation which reflects about the line x = 1, then rotates 90 degrees clockwise about the origin. Write f as a matrix M, and use it to calculate f(2, 2).
1 Introduction A cipher is an algorithm which encrypts a message into cipher text so that...
1 Introduction A cipher is an algorithm which encrypts a message into cipher text so that it can be safely transmitted without an eavesdropper being able to (easily) read it. For the purposes of this assignment the message and ciphertext will be stored as strings of ASCII characters. Cipher algorithms always perform two tasks: encryption and decryption. The encryption process takes a “message” and “key” as inputs and produces cipher text. The decryption process performs the reverse: it turns cipher...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT