Question

In: Computer Science

Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key...

Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key to encrypt the following plain text “the automorphism group is more difficult”.          

there is no given key

Solutions

Expert Solution

Transposition ciphers do not change any letters in a message, they simply rearrange them. Rectangular Transpositions start out by putting all of the letters of a message to be encrypted into a grid. Once the grid is constructed, we receive our result by reading the ciphertext off in a particular sequence one by one.

Some of the techniques involve:

  • Rail-Fence Technique
  • Rectangular Transposition technique (Columnar transposition)

Using Columnar Transposition technique for encryption and decryption of the following given text:

  • Decryption

The given cipher text is: LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES

As no key is given for the decryption of the ciphertext we'll assume it as: APPLE

The length of the key is: 5

Since there are 35 characters in the sequence: 35/5 = 7 rows are required to decrypt the text.

Order of alphabets in APPLE: 1 4 5 3 2

  

1 4 5 3 2
1 L E E E M
2 T N F S O
3 H T S I S
4 B U O G R
5 P U N C A
6 E B E V I
7 E W S D A

Now trace the rows respectively from up to down sequentially to decrypt the text.

Hence, our original message was: LEEEMTNFSOHTSISBUOGRPUNCAEBEVIEWSDA

  • Encryption

The given cipher text is :  the automorphism group is more difficult

NOTE: Ignoring the spaces between the words in text

As we have to use the same key used above, therefore the key is as follows: APPLE

The length of the key is: 5

Since there are 35 characters in the sequence: 35/5 = 7 rows are required to decrypt the text.

Permutation defined by the order of alphabets in APPLE: 1 4 5 3 2

1 4 5 3 2
1 t h e a u
2 t o m o r
3 p h i s m
4 g r o u p
5 i s m o r
6 e d i f f
7 i c u l t

In a transposition cipher, the order of the alphabets is re-arranged to obtain the cipher-text.

  1. The text is arranged in the rows and then noted out again column by column.
  2. Any spare spaces are filled with nulls or left blank or placed by a character until the grid is completely filled(Example: _).
  3. Finally, the encrypted text is read off in columns, the order is given in accordance with the key.

Hence the encrypted text is: TTPGIEIURMPRFTAOSUOFLHOHRSDCEMIOMIU


Related Solutions

Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the...
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the message. Use at least two ciphers combined to design your own cipher Specify the min. and max. length of the message user can enter to encrypt Specify the length of the “key” user can enter to encrypt and decrypt the message Part 2: Programme the cipher and make it available to validate. Cleartext for the original programming scripts has to submitted. A frontend webpage...
write a Java method that decrypts a keyword columnar transposition cipher with a given key
write a Java method that decrypts a keyword columnar transposition cipher with a given key
In cryptography, Caesar cipher is one of the simplest encryption techniques. The key idea of this...
In cryptography, Caesar cipher is one of the simplest encryption techniques. The key idea of this method is to replace each plaintext letter with one fixed number of places down the alphabet. Below is an example with a shift of three: Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz Cipher: DEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzABC To cipher a string, ‘A’ is replaced by ‘D’, ‘B’ is substituted by ‘E’, and so on. To decode a string, ‘A’ is replaced by ‘x’, etc. By using python with vs code: Write a...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
Create a class called Cipher. Make the constructor accept some text and a key. Encrypt the...
Create a class called Cipher. Make the constructor accept some text and a key. Encrypt the given text using the key. Use the following cipher: Take the key and mod it by 26. Example: a key of 30 becomes 4. If the character is a letter, shift it by the key, but 'wrap around' the alphabet if necessary. If the character is not a letter, then shift it by the key but do not wrap. Check the test cases for...
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking...
1. Use a Vigenere cipher with a key of "Patton" to encrypt: "If everyone is thinking alike, then somebody isn't thinking." Is this a good key? Why or why not? 2.  Calculate the index of coincidence for the result. SHOW ALL WORK PLEASE
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key =...
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key = D. ___________ Vespasian, key = P. _________ Caligula, key = H. _________ Nero, key = T. _____________
What are the common key and block sizes used by AES? Decrypt the following message. What...
What are the common key and block sizes used by AES? Decrypt the following message. What is the message? What is the cipher? What is the key? Who is the author? ZW ERKLIV YRJ DRUV REP FEV KYZEX CVJJ JLJTVGKZSCV KYRE RCC FKYVIJ FW VOTCLJZMV GIFGVIKP, ZK ZJ KYV RTKZFE FW KYV KYZEBZEX GFNVI TRCCVU RE ZUVR, NYZTY RE ZEUZMZULRC DRP VOTCLJZMVCP GFJJVJJ RJ CFEX RJ YV BVVGJ ZK KF YZDJVCW; SLK KYV DFDVEK ZK ZJ UZMLCXVU, ZK WFITVJ ZKJVCW...
7. Substantiate or refute the following: As the cipher text sample size becomes smaller, cryptanalysis becomes...
7. Substantiate or refute the following: As the cipher text sample size becomes smaller, cryptanalysis becomes easier.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT