Question

In: Computer Science

Construct a Playfair matrix with the key RHYME Use the playfair matrix you just constructed and...

Construct a Playfair matrix with the key RHYME

Use the playfair matrix you just constructed and decrypt the following message: "PEYFQUGVHSMFPURHPERESUTG". Make sure you use your knowledge of the plaintext language and decide whether to use I or J in the decrypted message. Remove all filler letters, separate out the words when writing the final answer.

Note: Place I and J in the same cell and assume filler letter is X.

Solutions

Expert Solution

Key : RHYME

Playfair matrix

R H Y M E
A B C D F
G I/J K L N
O P Q S T
U V W X Z

Encrypted Message : "PEYFQUGVHSMFPURHPERESUTG"

Grouping the encrypted message as a pair of two letters each , the following will be the result :

PE YF QU GV HS MF PU RH PE RE SU TG

To decrypt the cipher we need to consider each pair mentioned above in reference with the playfair matrix.

  • Pair 1

PE - to decrypt this pair , first consider P’s row and E’s column which will encounter the cell that contains “T”.

Next consider the opposite i.e.; E’s row an P’s column which will encounter the cell that contains “H”.

   Therefore PE =TH

  

R H Y M E
A B C D F
G I/J K L N
O P Q S T
U V W X Z
R H Y M E
A B C D F
G I/J K L N
O P Q S T
U V W X Z
  • Pair 2

YF - to decrypt this pair , first consider Y’s row and F’s column which will encounter the cell that contains “E”. Next consider the opposite i.e.; F’s row and Y’s column which will encounter the cell that contains “C”.

Therefore PF =EC

  • Pair 3

QU -

Q’s row and U’s column=“O”.

U’s row and Q’s column =“W”.

   Therefore QU =OW

  • Pair 4

GV -

G’s row and V’s column=“I” (Here you can take either J or I, but after complete decryption the message should make some sense)

V’s row and G’s column =“U”.

Therefore GV =IU    

Likewise we need to decrypt each and every pair. In doing so the following pairs are decrypted as :

  • Pair 5 = “H S” = “MP”
  • Pair 6 = “M F” = “ED”
  • Pair 7 = “P U” = “OV”
  • Pair 8

RH =

Here,R and H come in the same row. Now in this case , take the letter to the left of each one (going back to the rightmost if at the leftmost position).   

The letter to the left of R is “E” and to the left of H is “R”   

Therefore “RH” is decrypted as “ER”

R H Y M E
A B C D F
G I/J K L N
O P Q S T
U V W X Z
R H Y M E
A B C D F
G I/J K L N
O P Q S T
U V W X Z

  • Pair 9 = “P E” = “T H”
  • Pair 10

RE comes in the same row as well . So , take the letter to the left of each one (going back to the rightmost if at the leftmost position).

The letter to the left of R is “E” and to the left of E is “M”

Therefore “RE” is decrypted as “EM”

  • Pair 11 = “S U” = “O X”
  • Pair 12 = “T G” = “O N”

The decrypted letters are : " THECOWIUMPEDOVERTHEMOXON "

Arranging the letters into meaningful words : " THE COW IUMPED OVER THE MOXON"

Now the above decrypted message seems similar to " The cow jumped over the moon"

So instead of taking "I" in the decrypted message , we need to take " J "

And It is given in the question that , all filler letter need to be removed which is " X " here.

Therefore our decrypted message is :

" THE COW JUMPED OVER THE MOON "

NOTE : In the playfair matrices shown, the blue coloured letter is used to indicate the selected row and column, while the red coloured elements are the corresponding decrypted letters.


Related Solutions

Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Complete the Playfair matrix for the keyword COMPSCI and then encrypt the message JILL
Construct an External Factor Evaluation (EFE) Matrix,Construct an Internal Factor Evaluation (IFE) Matrix
Construct an External Factor Evaluation (EFE) Matrix,Construct an Internal Factor Evaluation (IFE) Matrix
How to construct an impedance matrix and how to use its elements in troubleshooting situations?
How to construct an impedance matrix and how to use its elements in troubleshooting situations?
Programming: Use the generic Huffman_Tree<T> on Blackboard to encode the words in your favorite nursery rhyme.
Programming: Use the generic Huffman_Tree<T> on Blackboard to encode the words in your favorite nursery rhyme. 
Construct a generator matrix and a parity check matrix for a ternary Hamming code Ham(2, 3)....
Construct a generator matrix and a parity check matrix for a ternary Hamming code Ham(2, 3). Assume a codeword x from for the ternary Hamming code Ham(2, 3)$ was sent and the word y was received. Use the partiy check matrix you constructed in part (a) to decode y in each part using syndrome decoding: (b) y = ( 1 , 1 , 1 , 0 ), (c) y = ( 2 , 2 , 2 , 2 ), (d)...
exercise 4e Construct an IFE Matrix for Your University Purpose this exercise gives you the opportunity...
exercise 4e Construct an IFE Matrix for Your University Purpose this exercise gives you the opportunity to evaluate your online university’s major strengths and weaknesses. As will become clearer in the next chapter, an organization’s strategies are largely based on striving to take advantage of strengths and improving on weaknesses. Instructions Step 1 Join with two other individuals to form a three-person team. Develop a team IFE Matrix for your online university. You may use the strengths and weaknesses determined...
Brower, Inc. just constructed a manufacturing plant in Ghana. You are given the following information: The...
Brower, Inc. just constructed a manufacturing plant in Ghana. You are given the following information: The construction cost  (in billion Ghanian cedi): 11 Brower intends to leave the plant open for three years. Operating cash flows will begin one year from today and are remitted back to the parent at the end of each year. During the three years of operation, cedi operating cash flows are expected as follows: Year CF 1 4 2 5 3 4 At the end of...
Construct an External and Internal Factor Evaluation (EFE) Matrix for Hospital
Construct an External and Internal Factor Evaluation (EFE) Matrix for Hospital
You need to construct a dichotomous key for the following taxa from the protists (below). Make...
You need to construct a dichotomous key for the following taxa from the protists (below). Make sure that you follow the rules for the construction of dichotomous keys. Ulva, Volvox, Spirogyra, Red algae, Plasmodial slime mold, Dinoflagellates, Stentor, Plasmodium, Trypanosoma, diatoms, Radiolaria, Euglena Brown algae
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT