Question

In: Computer Science

Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL

Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL

Solutions

Expert Solution

Hi, here is your answer. Please give an upvote. If you have any doubts regarding my answer, please tell me in the comments. I would be very happy to help you.

3 rules of encryption in Playfair Cipher are:

  • If the 2 alphabets of a pair are in the same row, then replace each alphabet with an alphabet which is immediate right to it in the same row.
  • If the 2 alphabets of a pair are in the same column, then replace each alphabet with an alphabet which is immediate down to it in the same column.
  • If the 2 alphabets of a pair are neither in the same column or row, then first form an imaginary rectangle having the 2 alphabets as vertices of a diagonal, then encrypt each alphabet by replacing it with the alphabet in the other corner, but in the same row.

Here is my handwritten step by step solution.

Finally we get the ciphertext as BVEFHZ for the message JILL


Related Solutions

Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given that the Vigenere cipher of part (a) with the same keyword was used to produce the ciphertext: VFPUSVSNBVRCNQW Find the plaintext message.        
Construct a Playfair matrix with the key RHYME Use the playfair matrix you just constructed and...
Construct a Playfair matrix with the key RHYME Use the playfair matrix you just constructed and decrypt the following message: "PEYFQUGVHSMFPURHPERESUTG". Make sure you use your knowledge of the plaintext language and decide whether to use I or J in the decrypted message. Remove all filler letters, separate out the words when writing the final answer. Note: Place I and J in the same cell and assume filler letter is X.
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Write a small program to encrypt and decrypt a message using Python library.
Write a small program to encrypt and decrypt a message using Python library.
These questions are about math cryptography 1) Encrypt the plaintext "this is a secret message" using...
These questions are about math cryptography 1) Encrypt the plaintext "this is a secret message" using the affine function f(x) = 5x + 7 mod 26. 2) Determine the number of divisors of 2n, where n is a positive integer.
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e...
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e = 13, use A =10...Z = 35, work in blocks of one letter each. Part 2: Decrypt the message 088-164-051-164-021-074 using the same parameters from part 1.
Hello! I'm trying to write a code that will either encrypt/decrypt a message from an inputed...
Hello! I'm trying to write a code that will either encrypt/decrypt a message from an inputed text. I'm having the absolute hardest time getting stared and figuring out how to identify in the code if the input needs to be encrypted/decrypted and identifying the string to encrypt/decrypt with. These are the instructions: Objectives Command line input File input and output Rethrowing exceptions Program Description Gaius Julius Caesar encoded his battle messages so that the opponent could not read them should...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT