Question

In: Computer Science

Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself

Use Vigenère Cipher to decrypt the following plaintext with the given key

key: deceptivedeceptivedeceptive

plaintext: wearediscoveredsaveyourself

Solutions

Expert Solution

ans) ( given in the question, there is an error/mistake,  cant decrypt the "plaintext "( which is not encrypted first ) so here one can encrypt the given plain text using the key mentioned. then can able to decrypt it also

Vigenere cipher :

Is an encryption method consist of alphabetic from A to Z, known as polyalphabetic substitution type method,( here cipher is made using multiple substitution alphabets ), encryption is performed using vigenere table.

For encryption the Vigenere table contains the letters from A to Z aligned in row wise , ie 26 letters are labeled in rowwise and coloumn wise , and below each coloumn and corresponding rows again the letters are arranged as : A TO Z , and in the second row the letter are left circular shifted by one , compared with the previous alphabet.

the table contains a total of 26*26 entries.

ENCRYPTION and DECRYPTION BY TABLE METHOD : ( PLAINTEXT = ABCFRDWERT )

if the plaintext first letter is A ( assume ) and if the key is of length 5 ( key= BNGRY ) then it should be repeated until equals to the size of the plain text, ie ( BNGRYBNGRY )

encryption :

-now to find the first letter of cipher text, take the fisrt letter of plaintext (= A ) and of the key ( = B ) now find the row labeled as " A ' and in that row find the coloumn named as "B" , now take the letter that comes in the entry as the cipher text

decryption :

take the first letter of the key and in the row locate it, and check for the entry named the first letter of cipher text , then see the label of the column( coloumn name at the top of the table ) now that will be the plain text.

A MORE EASY WAY OF FINDING ENCRYPTION AND DECRYPTION :

Assign value for alphabets as from [ 0 to 25 ] , ( A=0, B=1, C=2,,,,,,,,,,,,,,,Z=25 )

NOW JUST CONSIDER THIS EQUATION TO FIND THE CIPHERTEXT ( ENCRYPTION Ei ) and decryption ( Di )

encryption ------ Ei = ( Pi + Ki ) mod 26 - p = plain text , k= key , i= ith charecter of text

decryption -------- Di = ( Ei -  Ki + 26 ) mod 26

ANSWER FOR THE ABOVE QUESTION : ( USING THE EASY METHOD )

ENCRYPTION : ( GIVEN , key: deceptivedeceptivedeceptive , plaintext: wearediscoveredsaveyourself )

FOR DECRYPTION, TAKE THE CIPHER TEXT VALUE AND FIND THE CORRESPONDING PLAINTEXT USING THE DECRYPTION EQUATION - ( Ei - Ki + 26) mod 26


Related Solutions

Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key...
Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key to encrypt the following plain text “the automorphism group is more difficult”.           there is no given key
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the...
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the message. Use at least two ciphers combined to design your own cipher Specify the min. and max. length of the message user can enter to encrypt Specify the length of the “key” user can enter to encrypt and decrypt the message Part 2: Programme the cipher and make it available to validate. Cleartext for the original programming scripts has to submitted. A frontend webpage...
How to decrypt the cipher encrypted by the algorithm showed as below when clearText and key...
How to decrypt the cipher encrypted by the algorithm showed as below when clearText and key are not given: def encrypt(cleartext, key): to_return = bytearray(len(cleartext)) for i in xrange(len(cleartext)): to_return[i] = ord(cleartext[i]) ^ ord(key[i % len(key)]) return str(to_return)
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep...
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep in mind that only letter j was used for padding. (Show your detailed work)
Question The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and...
Question The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”. Write Java or Python code to implement either Monoalphabetic cipher or Hill cipher or Transposition Cipher (Encryption and Decryption) and test your code on given plaintext. User may enter value of key at the command prompt, if required.
The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”....
The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”. Write Java code to implement Shift cipher (Encryption and Decryption) and test your code on given plaintext. Your code must meet following conditions. 1. User must enter the value of key from command prompt and print it at command prompt. 2. Print the cipher text and the plaintext at the command prompt after encryption and decryption. 3. Test your algorithm for 5 different key...
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key =...
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key = D. ___________ Vespasian, key = P. _________ Caligula, key = H. _________ Nero, key = T. _____________
Encrypt the given plaintext with the key. Built the key matrix (big size). And show how...
Encrypt the given plaintext with the key. Built the key matrix (big size). And show how you get each letter ciphertext (you can do that by making shapes and arrows in key matrix). No need to draw key matric again and again.    Show all your work. If you just write cipher text and key matric without showing (shapes and arrow on key matrix) that how you get the ciphertext then your marks will be deducted. key :  alphabets plaintext :   smartness
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE,...
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE, key = 12. TJNXWNVM, key = 19. LHAXEWJ, key = 22. DBSLEXO, key = 10. GDBPC ATVXDC, key =15. Decipher the following. They have been enciphered using a Shift Cipher with the given key. QSBHIFWCB, key = O. CQN ADKRLXW ARENA, key = J. ZKBYQD SQBUDTQH, key = Q. VTXLTKBTG LXVMBHG, key = T.
Decipher the following names. They have been enciphered using a Shift cipher with the given key....
Decipher the following names. They have been enciphered using a Shift cipher with the given key. GULWOM UOLYFCOM, key = U. IRGAJOAY, key = G. TYESBUJYQD, key = Q. HFXXNZX, key = F.   Encipher the following words using a Shift Cipher with the given key. Appian Way, key = F. Punic Wars, key = B. Carthage, key = N. Gladiator, key = W.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT