Question

In: Computer Science

Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself

Use Vigenère Cipher to decrypt the following plaintext with the given key

key: deceptivedeceptivedeceptive

plaintext: wearediscoveredsaveyourself

Solutions

Expert Solution

ans) ( given in the question, there is an error/mistake,  cant decrypt the "plaintext "( which is not encrypted first ) so here one can encrypt the given plain text using the key mentioned. then can able to decrypt it also

Vigenere cipher :

Is an encryption method consist of alphabetic from A to Z, known as polyalphabetic substitution type method,( here cipher is made using multiple substitution alphabets ), encryption is performed using vigenere table.

For encryption the Vigenere table contains the letters from A to Z aligned in row wise , ie 26 letters are labeled in rowwise and coloumn wise , and below each coloumn and corresponding rows again the letters are arranged as : A TO Z , and in the second row the letter are left circular shifted by one , compared with the previous alphabet.

the table contains a total of 26*26 entries.

ENCRYPTION and DECRYPTION BY TABLE METHOD : ( PLAINTEXT = ABCFRDWERT )

if the plaintext first letter is A ( assume ) and if the key is of length 5 ( key= BNGRY ) then it should be repeated until equals to the size of the plain text, ie ( BNGRYBNGRY )

encryption :

-now to find the first letter of cipher text, take the fisrt letter of plaintext (= A ) and of the key ( = B ) now find the row labeled as " A ' and in that row find the coloumn named as "B" , now take the letter that comes in the entry as the cipher text

decryption :

take the first letter of the key and in the row locate it, and check for the entry named the first letter of cipher text , then see the label of the column( coloumn name at the top of the table ) now that will be the plain text.

A MORE EASY WAY OF FINDING ENCRYPTION AND DECRYPTION :

Assign value for alphabets as from [ 0 to 25 ] , ( A=0, B=1, C=2,,,,,,,,,,,,,,,Z=25 )

NOW JUST CONSIDER THIS EQUATION TO FIND THE CIPHERTEXT ( ENCRYPTION Ei ) and decryption ( Di )

encryption ------ Ei = ( Pi + Ki ) mod 26 - p = plain text , k= key , i= ith charecter of text

decryption -------- Di = ( Ei -  Ki + 26 ) mod 26

ANSWER FOR THE ABOVE QUESTION : ( USING THE EASY METHOD )

ENCRYPTION : ( GIVEN , key: deceptivedeceptivedeceptive , plaintext: wearediscoveredsaveyourself )

FOR DECRYPTION, TAKE THE CIPHER TEXT VALUE AND FIND THE CORRESPONDING PLAINTEXT USING THE DECRYPTION EQUATION - ( Ei - Ki + 26) mod 26


Related Solutions

Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key...
Based on Rectangle transposition techniques, decrypt the following cipher text “LTHBPEEMOSRAIAESIGCVDENTUUBWEFSONES”. Then use the same key to encrypt the following plain text “the automorphism group is more difficult”.           there is no given key
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the...
Part 1: Design a Cipher allow user to use a “key” to encrypt and decrypt the message. Use at least two ciphers combined to design your own cipher Specify the min. and max. length of the message user can enter to encrypt Specify the length of the “key” user can enter to encrypt and decrypt the message Part 2: Programme the cipher and make it available to validate. Cleartext for the original programming scripts has to submitted. A frontend webpage...
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep...
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep in mind that only letter j was used for padding. (Show your detailed work)
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key =...
Encipher the following emperors’ names using a Shift Cipher with the given key. Pompeii, key = D. ___________ Vespasian, key = P. _________ Caligula, key = H. _________ Nero, key = T. _____________
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Using playfair cipher, decrypt the ciphertext “GKSKHALTYZ” using the keyword “UNIVERSITY”
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE,...
Decipher the following. They have been enciphered using a Shift Cipher with the given key. OMFMOAYNE, key = 12. TJNXWNVM, key = 19. LHAXEWJ, key = 22. DBSLEXO, key = 10. GDBPC ATVXDC, key =15. Decipher the following. They have been enciphered using a Shift Cipher with the given key. QSBHIFWCB, key = O. CQN ADKRLXW ARENA, key = J. ZKBYQD SQBUDTQH, key = Q. VTXLTKBTG LXVMBHG, key = T.
Decipher the following names. They have been enciphered using a Shift cipher with the given key....
Decipher the following names. They have been enciphered using a Shift cipher with the given key. GULWOM UOLYFCOM, key = U. IRGAJOAY, key = G. TYESBUJYQD, key = Q. HFXXNZX, key = F.   Encipher the following words using a Shift Cipher with the given key. Appian Way, key = F. Punic Wars, key = B. Carthage, key = N. Gladiator, key = W.
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
decrypt the ciphertext xyatqyvaxpagjdpglax encrypted by the affine cipher. also explain is there alphabets which will...
decrypt the ciphertext xyatqyvaxpagjdpglax encrypted by the affine cipher. also explain is there alphabets which will not change after ecnryption
I need the code in python where I can encrypt and decrypt any plaintext. For example,...
I need the code in python where I can encrypt and decrypt any plaintext. For example, the plaintext "hello" from each of these Block Cipher modes of Operation. Electronic Code Block Mode (ECB) Cipher block Mode (CBC) Cipher Feedback Mode (CFB) Output feedback Mode (OFB) Counter Mode (CTR) Here is an example, Affine cipher expressed in C. Encryption: char cipher(unsigned char block, char key) { return (key+11*block) } Decryption: char invcipher(unsigned char block, char key) { return (163*(block-key+256)) }
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT