Question

In: Computer Science

Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key...

Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key to encrypt the following plain text “the automorphism group is more difficult”.          

there is no given key

Solutions

Expert Solution

Transposition ciphers do not change any letters in a message, they simply rearrange them. Rectangular Transpositions start out by putting all of the letters of a message to be encrypted into a grid. Once the grid is constructed, we receive our result by reading the ciphertext off in a particular sequence one by one.

Some of the techniques involve:

  • Rail-Fence Technique
  • Rectangular Transposition technique (Columnar transposition)

Using Columnar Transposition technique for encryption and decryption of the following given text:

  • Decryption

The given cipher text is: LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES

As no key is given for the decryption of the ciphertext we'll assume it as: APPLE

The length of the key is: 5

Since there are 35 characters in the sequence: 35/5 = 7 rows are required to decrypt the text.

Order of alphabets in APPLE: 1 4 5 3 2

  

1 4 5 3 2
1 L E E E M
2 T N F S O
3 H T S I S
4 B U O G R
5 P U N C A
6 E B E V I
7 E W S D A

Now trace the rows respectively from up to down sequentially to decrypt the text.

Hence, our original message was: LEEEMTNFSOHTSISBUOGRPUNCAEBEVIEWSDA

  • Encryption

The given cipher text is :  the automorphism group is more difficult

NOTE: Ignoring the spaces between the words in text

As we have to use the same key used above, therefore the key is as follows: APPLE

The length of the key is: 5

Since there are 35 characters in the sequence: 35/5 = 7 rows are required to decrypt the text.

Permutation defined by the order of alphabets in APPLE: 1 4 5 3 2

1 4 5 3 2
1 t h e a u
2 t o m o r
3 p h i s m
4 g r o u p
5 i s m o r
6 e d i f f
7 i c u l t

In a transposition cipher, the order of the alphabets is re-arranged to obtain the cipher-text.

  1. The text is arranged in the rows and then noted out again column by column.
  2. Any spare spaces are filled with nulls or left blank or placed by a character until the grid is completely filled(Example: _).
  3. Finally, the encrypted text is read off in columns, the order is given in accordance with the key.

Hence the encrypted text is: TTPGIEIURMPRFTAOSUOFLHOHRSDCEMIOMIU


Related Solutions

Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the...
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the message. Use at least two ciphers combined to design your own cipher Specify the min. and max. length of the message user can enter to encrypt Specify the length of the “key” user can enter to encrypt and decrypt the message Part 2: Programme the cipher and make it available to validate. Cleartext for the original programming scripts has to submitted. A frontend webpage...
write a Java method that decrypts a keyword columnar transposition cipher with a given key
write a Java method that decrypts a keyword columnar transposition cipher with a given key
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking...
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking alike, then somebody isn't thinking." Is this a good key? Why or why not? 2.  Calculate the index of coincidence for the result. SHOW ALL WORK PLEASE
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE,...
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE, key = 12. TJNXWNVM, key = 19. LHAXEWJ, key = 22. DBSLEXO, key = 10. GDBPC ATVXDC, key =15. Decipher the following. They have been enciphered using a Shift Cipher with the given key. QSBHIFWCB, key = O. CQN ADKRLXW ARENA, key = J. ZKBYQD SQBUDTQH, key = Q. VTXLTKBTG LXVMBHG, key = T.
Decipher the following names. They have been enciphered using a Shift cipher with the given key....
Decipher the following names. They have been enciphered using a Shift cipher with the given key. GULWOM UOLYFCOM, key = U. IRGAJOAY, key = G. TYESBUJYQD, key = Q. HFXXNZX, key = F.   Encipher the following words using a Shift Cipher with the given key. Appian Way, key = F. Punic Wars, key = B. Carthage, key = N. Gladiator, key = W.
Programming Language C++ Encrypt a text file using Caesar Cipher. Perform the following operations: Read the...
Programming Language C++ Encrypt a text file using Caesar Cipher. Perform the following operations: Read the console input and create a file. ['$' character denotes end of content in file.] Close the file after creation. Now encrypt the text file using Caesar Cipher (Use key value as 5). Display the contents of the updated file. #include <iostream> using namespace std; int main() { // write code here }
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
Which block cipher mode to use? For each of the following scenarios, determine which of the...
Which block cipher mode to use? For each of the following scenarios, determine which of the four block cipher modes discussed in class would be most appropriate. Justify your answer. Encryption of the social security number field within every record of a database. Encryption of a Word document (.doc) that will be sent as an email attachment. Sector-by-sector encryption of an external hard drive. Real-time encryption of a non-packetized bit stream (e.g. raw digital video). Suppose a communication system encrypts...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT